Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2023:3721-1

Опубликовано: 21 сент. 2023
Источник: suse-cvrf

Описание

Security update for qemu

This update for qemu fixes the following issues:

  • CVE-2022-26354: Fixed a memory leak due to a missing virtqueue detach on error. (bsc#1198712)
  • CVE-2021-3929: Fixed an use-after-free in nvme DMA reentrancy issue. (bsc#1193880)
  • CVE-2023-0330: Fixed a stack overflow due to a DMA reentrancy issue. (bsc#1207205)
  • CVE-2020-13754: Fixed a DoS due to an OOB access during mmio operations. (bsc#1172382)
  • CVE-2023-3354: Fixed a remote unauthenticated DoS due to an improper I/O watch removal in VNC TLS handshake. (bsc#1212850)
  • CVE-2023-3180: Fixed a heap buffer overflow in virtio_crypto_sym_op_helper(). (bsc#1213925)
  • CVE-2021-3638: Fixed an out-of-bounds write due to an inconsistent check in ati_2d_blt(). (bsc#1188609)
  • CVE-2021-3750: Fixed an use-after-free in DMA reentrancy issue. (bsc#1190011)
  • CVE-2023-2861: Fixed improper access control on special files in 9pfs (bsc#1212968).
  • CVE-2022-1050: Fixed use-after-free issue in pvrdma_exec_cmd() (bsc#1197653).

The following non-security bug was fixed:

  • Prepare for binutils update to 2.41 update (bsc#1215311).

Список пакетов

SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS
qemu-4.2.1-150200.79.1
qemu-arm-4.2.1-150200.79.1
qemu-audio-alsa-4.2.1-150200.79.1
qemu-audio-pa-4.2.1-150200.79.1
qemu-block-curl-4.2.1-150200.79.1
qemu-block-iscsi-4.2.1-150200.79.1
qemu-block-rbd-4.2.1-150200.79.1
qemu-block-ssh-4.2.1-150200.79.1
qemu-guest-agent-4.2.1-150200.79.1
qemu-ipxe-1.0.0+-150200.79.1
qemu-kvm-4.2.1-150200.79.1
qemu-lang-4.2.1-150200.79.1
qemu-microvm-4.2.1-150200.79.1
qemu-seabios-1.12.1+-150200.79.1
qemu-sgabios-8-150200.79.1
qemu-tools-4.2.1-150200.79.1
qemu-ui-curses-4.2.1-150200.79.1
qemu-ui-gtk-4.2.1-150200.79.1
qemu-ui-spice-app-4.2.1-150200.79.1
qemu-vgabios-1.12.1+-150200.79.1
qemu-x86-4.2.1-150200.79.1
SUSE Linux Enterprise Server 15 SP2-LTSS
qemu-4.2.1-150200.79.1
qemu-arm-4.2.1-150200.79.1
qemu-audio-alsa-4.2.1-150200.79.1
qemu-audio-pa-4.2.1-150200.79.1
qemu-block-curl-4.2.1-150200.79.1
qemu-block-iscsi-4.2.1-150200.79.1
qemu-block-rbd-4.2.1-150200.79.1
qemu-block-ssh-4.2.1-150200.79.1
qemu-guest-agent-4.2.1-150200.79.1
qemu-ipxe-1.0.0+-150200.79.1
qemu-kvm-4.2.1-150200.79.1
qemu-lang-4.2.1-150200.79.1
qemu-microvm-4.2.1-150200.79.1
qemu-ppc-4.2.1-150200.79.1
qemu-s390-4.2.1-150200.79.1
qemu-seabios-1.12.1+-150200.79.1
qemu-sgabios-8-150200.79.1
qemu-tools-4.2.1-150200.79.1
qemu-ui-curses-4.2.1-150200.79.1
qemu-ui-gtk-4.2.1-150200.79.1
qemu-ui-spice-app-4.2.1-150200.79.1
qemu-vgabios-1.12.1+-150200.79.1
qemu-x86-4.2.1-150200.79.1
SUSE Linux Enterprise Server for SAP Applications 15 SP2
qemu-4.2.1-150200.79.1
qemu-audio-alsa-4.2.1-150200.79.1
qemu-audio-pa-4.2.1-150200.79.1
qemu-block-curl-4.2.1-150200.79.1
qemu-block-iscsi-4.2.1-150200.79.1
qemu-block-rbd-4.2.1-150200.79.1
qemu-block-ssh-4.2.1-150200.79.1
qemu-guest-agent-4.2.1-150200.79.1
qemu-ipxe-1.0.0+-150200.79.1
qemu-kvm-4.2.1-150200.79.1
qemu-lang-4.2.1-150200.79.1
qemu-microvm-4.2.1-150200.79.1
qemu-ppc-4.2.1-150200.79.1
qemu-seabios-1.12.1+-150200.79.1
qemu-sgabios-8-150200.79.1
qemu-tools-4.2.1-150200.79.1
qemu-ui-curses-4.2.1-150200.79.1
qemu-ui-gtk-4.2.1-150200.79.1
qemu-ui-spice-app-4.2.1-150200.79.1
qemu-vgabios-1.12.1+-150200.79.1
qemu-x86-4.2.1-150200.79.1
openSUSE Leap 15.4
qemu-s390-4.2.1-150200.79.1

Описание

hw/pci/msix.c in QEMU 4.2.0 allows guest OS users to trigger an out-of-bounds access via a crafted address in an msi-x mmio operation.


Затронутые продукты
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:qemu-4.2.1-150200.79.1
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:qemu-arm-4.2.1-150200.79.1
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:qemu-audio-alsa-4.2.1-150200.79.1
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:qemu-audio-pa-4.2.1-150200.79.1

Ссылки

Описание

An out-of-bounds memory access flaw was found in the ATI VGA device emulation of QEMU. This flaw occurs in the ati_2d_blt() routine while handling MMIO write operations when the guest provides invalid values for the destination display parameters. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service.


Затронутые продукты
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:qemu-4.2.1-150200.79.1
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:qemu-arm-4.2.1-150200.79.1
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:qemu-audio-alsa-4.2.1-150200.79.1
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:qemu-audio-pa-4.2.1-150200.79.1

Ссылки

Описание

A DMA reentrancy issue was found in the USB EHCI controller emulation of QEMU. EHCI does not verify if the Buffer Pointer overlaps with its MMIO region when it transfers the USB packets. Crafted content may be written to the controller's registers and trigger undesirable actions (such as reset) while the device is still transferring packets. This can ultimately lead to a use-after-free issue. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition, or potentially execute arbitrary code within the context of the QEMU process on the host. This flaw affects QEMU versions before 7.0.0.


Затронутые продукты
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:qemu-4.2.1-150200.79.1
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:qemu-arm-4.2.1-150200.79.1
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:qemu-audio-alsa-4.2.1-150200.79.1
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:qemu-audio-pa-4.2.1-150200.79.1

Ссылки

Описание

A DMA reentrancy issue was found in the NVM Express Controller (NVME) emulation in QEMU. This CVE is similar to CVE-2021-3750 and, just like it, when the reentrancy write triggers the reset function nvme_ctrl_reset(), data structs will be freed leading to a use-after-free issue. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition or, potentially, executing arbitrary code within the context of the QEMU process on the host.


Затронутые продукты
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:qemu-4.2.1-150200.79.1
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:qemu-arm-4.2.1-150200.79.1
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:qemu-audio-alsa-4.2.1-150200.79.1
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:qemu-audio-pa-4.2.1-150200.79.1

Ссылки

Описание

A flaw was found in the QEMU implementation of VMWare's paravirtual RDMA device. This flaw allows a crafted guest driver to execute HW commands when shared buffers are not yet allocated, potentially leading to a use-after-free condition.


Затронутые продукты
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:qemu-4.2.1-150200.79.1
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:qemu-arm-4.2.1-150200.79.1
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:qemu-audio-alsa-4.2.1-150200.79.1
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:qemu-audio-pa-4.2.1-150200.79.1

Ссылки

Описание

A flaw was found in the vhost-vsock device of QEMU. In case of error, an invalid element was not detached from the virtqueue before freeing its memory, leading to memory leakage and other unexpected results. Affected QEMU versions <= 6.2.0.


Затронутые продукты
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:qemu-4.2.1-150200.79.1
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:qemu-arm-4.2.1-150200.79.1
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:qemu-audio-alsa-4.2.1-150200.79.1
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:qemu-audio-pa-4.2.1-150200.79.1

Ссылки

Описание

A vulnerability in the lsi53c895a device affects the latest version of qemu. A DMA-MMIO reentrancy problem may lead to memory corruption bugs like stack overflow or use-after-free.


Затронутые продукты
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:qemu-4.2.1-150200.79.1
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:qemu-arm-4.2.1-150200.79.1
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:qemu-audio-alsa-4.2.1-150200.79.1
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:qemu-audio-pa-4.2.1-150200.79.1

Ссылки

Описание

A flaw was found in the 9p passthrough filesystem (9pfs) implementation in QEMU. The 9pfs server did not prohibit opening special files on the host side, potentially allowing a malicious client to escape from the exported 9p tree by creating and opening a device file in the shared folder.


Затронутые продукты
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:qemu-4.2.1-150200.79.1
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:qemu-arm-4.2.1-150200.79.1
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:qemu-audio-alsa-4.2.1-150200.79.1
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:qemu-audio-pa-4.2.1-150200.79.1

Ссылки

Описание

A flaw was found in the QEMU virtual crypto device while handling data encryption/decryption requests in virtio_crypto_handle_sym_req. There is no check for the value of `src_len` and `dst_len` in virtio_crypto_sym_op_helper, potentially leading to a heap buffer overflow when the two values differ.


Затронутые продукты
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:qemu-4.2.1-150200.79.1
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:qemu-arm-4.2.1-150200.79.1
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:qemu-audio-alsa-4.2.1-150200.79.1
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:qemu-audio-pa-4.2.1-150200.79.1

Ссылки

Описание

A flaw was found in the QEMU built-in VNC server. When a client connects to the VNC server, QEMU checks whether the current number of connections crosses a certain threshold and if so, cleans up the previous connection. If the previous connection happens to be in the handshake phase and fails, QEMU cleans up the connection again, resulting in a NULL pointer dereference issue. This could allow a remote unauthenticated client to cause a denial of service.


Затронутые продукты
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:qemu-4.2.1-150200.79.1
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:qemu-arm-4.2.1-150200.79.1
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:qemu-audio-alsa-4.2.1-150200.79.1
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:qemu-audio-pa-4.2.1-150200.79.1

Ссылки
Уязвимость SUSE-SU-2023:3721-1