Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

openSUSE-SU-2018:3709-1

Опубликовано: 09 нояб. 2018
Источник: suse-cvrf

Описание

Security update for qemu

This update for qemu fixes the following issues:

These security issues were fixed:

  • CVE-2018-12617: qmp_guest_file_read had an integer overflow that could have been exploited by sending a crafted QMP command (including guest-file-read with a large count value) to the agent via the listening socket causing DoS (bsc#1098735).
  • CVE-2018-11806: Prevent heap-based buffer overflow via incoming fragmented datagrams (bsc#1096223).

With this release the mitigations for Spectre v4 are moved the the patches from upstream (CVE-2018-3639, bsc#1092885).

This feature was added:

  • Add support for block resize support for disks through the monitor (bsc#1094725).

This update was imported from the SUSE:SLE-12-SP3:Update update project.

Список пакетов

openSUSE Leap 42.3
qemu-2.9.1-47.1
qemu-arm-2.9.1-47.1
qemu-block-curl-2.9.1-47.1
qemu-block-dmg-2.9.1-47.1
qemu-block-iscsi-2.9.1-47.1
qemu-block-rbd-2.9.1-47.1
qemu-block-ssh-2.9.1-47.1
qemu-extra-2.9.1-47.1
qemu-guest-agent-2.9.1-47.1
qemu-ipxe-1.0.0-47.1
qemu-ksm-2.9.1-47.1
qemu-kvm-2.9.1-47.1
qemu-lang-2.9.1-47.1
qemu-linux-user-2.9.1-47.1
qemu-ppc-2.9.1-47.1
qemu-s390-2.9.1-47.1
qemu-seabios-1.10.2-47.1
qemu-sgabios-8-47.1
qemu-testsuite-2.9.1-47.2
qemu-tools-2.9.1-47.1
qemu-vgabios-1.10.2-47.1
qemu-x86-2.9.1-47.1

Описание

m_cat in slirp/mbuf.c in Qemu has a heap-based buffer overflow via incoming fragmented datagrams.


Затронутые продукты
openSUSE Leap 42.3:qemu-2.9.1-47.1
openSUSE Leap 42.3:qemu-arm-2.9.1-47.1
openSUSE Leap 42.3:qemu-block-curl-2.9.1-47.1
openSUSE Leap 42.3:qemu-block-dmg-2.9.1-47.1

Ссылки

Описание

qmp_guest_file_read in qga/commands-posix.c and qga/commands-win32.c in qemu-ga (aka QEMU Guest Agent) in QEMU 2.12.50 has an integer overflow causing a g_malloc0() call to trigger a segmentation fault when trying to allocate a large memory chunk. The vulnerability can be exploited by sending a crafted QMP command (including guest-file-read with a large count value) to the agent via the listening socket.


Затронутые продукты
openSUSE Leap 42.3:qemu-2.9.1-47.1
openSUSE Leap 42.3:qemu-arm-2.9.1-47.1
openSUSE Leap 42.3:qemu-block-curl-2.9.1-47.1
openSUSE Leap 42.3:qemu-block-dmg-2.9.1-47.1

Ссылки

Описание

Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.


Затронутые продукты
openSUSE Leap 42.3:qemu-2.9.1-47.1
openSUSE Leap 42.3:qemu-arm-2.9.1-47.1
openSUSE Leap 42.3:qemu-block-curl-2.9.1-47.1
openSUSE Leap 42.3:qemu-block-dmg-2.9.1-47.1

Ссылки