Описание
Security update for qemu
This update for qemu fixes the following issues:
- CVE-2024-3447: Fixed heap buffer overflow in sdhci_write_dataport() (bsc#1222845)
- CVE-2023-6683: Fixed NULL pointer dereference in qemu_clipboard_request() (bsc#1218889)
- CVE-2024-3446: Fixed DMA reentrancy issue leads to double free vulnerability (bsc#1222843)
- CVE-2023-3019: Fixed heap use-after-free in e1000e_write_packet_to_guest() (bsc#1213269)
Список пакетов
Container suse/sle-micro/kvm-5.5:latest
SUSE Linux Enterprise Micro 5.5
SUSE Linux Enterprise Module for Basesystem 15 SP5
SUSE Linux Enterprise Module for Package Hub 15 SP5
SUSE Linux Enterprise Module for Server Applications 15 SP5
openSUSE Leap 15.5
Ссылки
- Link for SUSE-SU-2024:1438-1
- E-Mail link for SUSE-SU-2024:1438-1
- SUSE Security Ratings
- SUSE Bug 1213269
- SUSE Bug 1218889
- SUSE Bug 1222843
- SUSE Bug 1222845
- SUSE CVE CVE-2023-3019 page
- SUSE CVE CVE-2023-6683 page
- SUSE CVE CVE-2024-3446 page
- SUSE CVE CVE-2024-3447 page
Описание
A DMA reentrancy issue leading to a use-after-free error was found in the e1000e NIC emulation code in QEMU. This issue could allow a privileged guest user to crash the QEMU process on the host, resulting in a denial of service.
Затронутые продукты
Ссылки
- CVE-2023-3019
- SUSE Bug 1213269
Описание
A flaw was found in the QEMU built-in VNC server while processing ClientCutText messages. The qemu_clipboard_request() function can be reached before vnc_server_cut_text_caps() was called and had the chance to initialize the clipboard peer, leading to a NULL pointer dereference. This could allow a malicious authenticated VNC client to crash QEMU and trigger a denial of service.
Затронутые продукты
Ссылки
- CVE-2023-6683
- SUSE Bug 1218889
Описание
A double free vulnerability was found in QEMU virtio devices (virtio-gpu, virtio-serial-bus, virtio-crypto), where the mem_reentrancy_guard flag insufficiently protects against DMA reentrancy issues. This issue could allow a malicious privileged guest user to crash the QEMU process on the host, resulting in a denial of service or allow arbitrary code execution within the context of the QEMU process on the host.
Затронутые продукты
Ссылки
- CVE-2024-3446
- SUSE Bug 1222843
Описание
A heap-based buffer overflow was found in the SDHCI device emulation of QEMU. The bug is triggered when both `s->data_count` and the size of `s->fifo_buffer` are set to 0x200, leading to an out-of-bound access. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition.
Затронутые продукты
Ссылки
- CVE-2024-3447
- SUSE Bug 1222845