Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

openSUSE-SU-2017:2513-1

Опубликовано: 17 сент. 2017
Источник: suse-cvrf

Описание

Security update for qemu

This update for qemu fixes the following issues:

Security issues fixed:

  • CVE-2017-10664: Fix DOS vulnerability in qemu-nbd (bsc#1046636)
  • CVE-2017-10806: Fix DOS from stack overflow in debug messages of usb redirection support (bsc#1047674)
  • CVE-2017-11334: Fix OOB access during DMA operation (bsc#1048902)
  • CVE-2017-11434: Fix OOB access parsing dhcp slirp options (bsc#1049381)

Following non-security issues were fixed:

  • Postrequire acl for setfacl
  • Prerequire shadow for groupadd
  • The recent security fix for CVE-2017-11334 adversely affects Xen. Include two additional patches to make sure Xen is going to be OK.
  • Pre-add group kvm for qemu-tools (bsc#1011144)
  • Fixed a few more inaccuracies in the support docs.
  • Fix support docs to indicate ARM64 is now fully L3 supported in SLES 12 SP3. Apply a few additional clarifications in the support docs. (bsc#1050268)
  • Adjust to libvdeplug-devel package naming changes.
  • Fix migration with xhci (bsc#1048296)
  • Increase VNC delay to fix missing keyboard input events (bsc#1031692)
  • Remove build dependency package iasl used for seabios

This update was imported from the SUSE:SLE-12-SP3:Update update project.

Список пакетов

openSUSE Leap 42.3
qemu-2.9.0-32.4
qemu-arm-2.9.0-32.4
qemu-block-curl-2.9.0-32.4
qemu-block-dmg-2.9.0-32.4
qemu-block-iscsi-2.9.0-32.4
qemu-block-rbd-2.9.0-32.4
qemu-block-ssh-2.9.0-32.4
qemu-extra-2.9.0-32.4
qemu-guest-agent-2.9.0-32.4
qemu-ipxe-1.0.0-32.4
qemu-ksm-2.9.0-32.4
qemu-kvm-2.9.0-32.4
qemu-lang-2.9.0-32.4
qemu-linux-user-2.9.0-32.1
qemu-ppc-2.9.0-32.4
qemu-s390-2.9.0-32.4
qemu-seabios-1.10.2-32.4
qemu-sgabios-8-32.4
qemu-testsuite-2.9.0-32.4
qemu-tools-2.9.0-32.4
qemu-vgabios-1.10.2-32.4
qemu-x86-2.9.0-32.4

Описание

qemu-nbd in QEMU (aka Quick Emulator) does not ignore SIGPIPE, which allows remote attackers to cause a denial of service (daemon crash) by disconnecting during a server-to-client reply attempt.


Затронутые продукты
openSUSE Leap 42.3:qemu-2.9.0-32.4
openSUSE Leap 42.3:qemu-arm-2.9.0-32.4
openSUSE Leap 42.3:qemu-block-curl-2.9.0-32.4
openSUSE Leap 42.3:qemu-block-dmg-2.9.0-32.4

Ссылки

Описание

Stack-based buffer overflow in hw/usb/redirect.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (QEMU process crash) via vectors related to logging debug messages.


Затронутые продукты
openSUSE Leap 42.3:qemu-2.9.0-32.4
openSUSE Leap 42.3:qemu-arm-2.9.0-32.4
openSUSE Leap 42.3:qemu-block-curl-2.9.0-32.4
openSUSE Leap 42.3:qemu-block-dmg-2.9.0-32.4

Ссылки

Описание

The address_space_write_continue function in exec.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (out-of-bounds access and guest instance crash) by leveraging use of qemu_map_ram_ptr to access guest ram block area.


Затронутые продукты
openSUSE Leap 42.3:qemu-2.9.0-32.4
openSUSE Leap 42.3:qemu-arm-2.9.0-32.4
openSUSE Leap 42.3:qemu-block-curl-2.9.0-32.4
openSUSE Leap 42.3:qemu-block-dmg-2.9.0-32.4

Ссылки

Описание

The dhcp_decode function in slirp/bootp.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (out-of-bounds read and QEMU process crash) via a crafted DHCP options string.


Затронутые продукты
openSUSE Leap 42.3:qemu-2.9.0-32.4
openSUSE Leap 42.3:qemu-arm-2.9.0-32.4
openSUSE Leap 42.3:qemu-block-curl-2.9.0-32.4
openSUSE Leap 42.3:qemu-block-dmg-2.9.0-32.4

Ссылки
Уязвимость openSUSE-SU-2017:2513-1