Описание
Security update for qemu
This update for qemu fixes the following issues:
- CVE-2024-3447: Fix heap buffer overflow in sdhci_write_dataport(). (bsc#1218485)
- CVE-2023-6693: Fix stack buffer overflow in virtio_net_flush_tx(). (bsc#1218484)
Список пакетов
Image SLES12-SP5-EC2-ECS-On-Demand
SUSE Linux Enterprise Server 12 SP5
SUSE Linux Enterprise Server for SAP Applications 12 SP5
Ссылки
- Link for SUSE-SU-2024:3229-1
- E-Mail link for SUSE-SU-2024:3229-1
- SUSE Security Ratings
- SUSE Bug 1218484
- SUSE Bug 1222845
- SUSE Bug 1223955
- SUSE CVE CVE-2023-6693 page
- SUSE CVE CVE-2024-3447 page
Описание
A stack based buffer overflow was found in the virtio-net device of QEMU. This issue occurs when flushing TX in the virtio_net_flush_tx function if guest features VIRTIO_NET_F_HASH_REPORT, VIRTIO_F_VERSION_1 and VIRTIO_NET_F_MRG_RXBUF are enabled. This could allow a malicious user to overwrite local variables allocated on the stack. Specifically, the `out_sg` variable could be used to read a part of process memory and send it to the wire, causing an information leak.
Затронутые продукты
Ссылки
- CVE-2023-6693
- SUSE Bug 1218484
Описание
A heap-based buffer overflow was found in the SDHCI device emulation of QEMU. The bug is triggered when both `s->data_count` and the size of `s->fifo_buffer` are set to 0x200, leading to an out-of-bound access. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition.
Затронутые продукты
Ссылки
- CVE-2024-3447
- SUSE Bug 1222845