Описание
Security update for qemu
This update for qemu fixes the following issues:
- CVE-2023-3019: Fixed heap use-after-free in e1000e_write_packet_to_guest() (bsc#1213269)
- CVE-2023-6683: Fixed NULL pointer dereference in qemu_clipboard_request() (bsc#1218889)
- CVE-2024-24474: Fixed integer overflow results in buffer overflow via SCSI command (bsc#1220134)
- CVE-2024-3446: Fixed DM reentrancy issue that could lead to double free vulnerability (bsc#1222843)
- CVE-2024-3447: Fixed heap buffer overflow in sdhci_write_dataport() (bsc#1222845)
Список пакетов
Container suse/sle-micro-rancher/5.3:latest
Container suse/sle-micro-rancher/5.4:latest
SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
SUSE Linux Enterprise Micro 5.3
SUSE Linux Enterprise Micro 5.4
SUSE Linux Enterprise Server 15 SP4-LTSS
SUSE Linux Enterprise Server for SAP Applications 15 SP4
SUSE Manager Proxy 4.3
SUSE Manager Server 4.3
openSUSE Leap Micro 5.3
openSUSE Leap Micro 5.4
Ссылки
- Link for SUSE-SU-2024:1394-1
- E-Mail link for SUSE-SU-2024:1394-1
- SUSE Security Ratings
- SUSE Bug 1213269
- SUSE Bug 1218889
- SUSE Bug 1220134
- SUSE Bug 1222843
- SUSE Bug 1222845
- SUSE CVE CVE-2023-3019 page
- SUSE CVE CVE-2023-6683 page
- SUSE CVE CVE-2024-24474 page
- SUSE CVE CVE-2024-3446 page
- SUSE CVE CVE-2024-3447 page
Описание
A DMA reentrancy issue leading to a use-after-free error was found in the e1000e NIC emulation code in QEMU. This issue could allow a privileged guest user to crash the QEMU process on the host, resulting in a denial of service.
Затронутые продукты
Ссылки
- CVE-2023-3019
- SUSE Bug 1213269
Описание
A flaw was found in the QEMU built-in VNC server while processing ClientCutText messages. The qemu_clipboard_request() function can be reached before vnc_server_cut_text_caps() was called and had the chance to initialize the clipboard peer, leading to a NULL pointer dereference. This could allow a malicious authenticated VNC client to crash QEMU and trigger a denial of service.
Затронутые продукты
Ссылки
- CVE-2023-6683
- SUSE Bug 1218889
Описание
QEMU before 8.2.0 has an integer underflow, and resultant buffer overflow, via a TI command when an expected non-DMA transfer length is less than the length of the available FIFO data. This occurs in esp_do_nodma in hw/scsi/esp.c because of an underflow of async_len.
Затронутые продукты
Ссылки
- CVE-2024-24474
- SUSE Bug 1220134
Описание
A double free vulnerability was found in QEMU virtio devices (virtio-gpu, virtio-serial-bus, virtio-crypto), where the mem_reentrancy_guard flag insufficiently protects against DMA reentrancy issues. This issue could allow a malicious privileged guest user to crash the QEMU process on the host, resulting in a denial of service or allow arbitrary code execution within the context of the QEMU process on the host.
Затронутые продукты
Ссылки
- CVE-2024-3446
- SUSE Bug 1222843
Описание
A heap-based buffer overflow was found in the SDHCI device emulation of QEMU. The bug is triggered when both `s->data_count` and the size of `s->fifo_buffer` are set to 0x200, leading to an out-of-bound access. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition.
Затронутые продукты
Ссылки
- CVE-2024-3447
- SUSE Bug 1222845