Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

openSUSE-SU-2021:1043-1

Опубликовано: 13 июл. 2021
Источник: suse-cvrf

Описание

Security update for qemu

This update for qemu fixes the following issues:

Security issues fixed:

  • CVE-2021-3546: Fix out-of-bounds write in virgl_cmd_get_capset (bsc#1185981)
  • CVE-2021-3544: Fix memory leaks found in the virtio vhost-user GPU device (bsc#1186010)
  • CVE-2021-3545: Fix information disclosure due to uninitialized memory read (bsc#1185990)
  • CVE-2020-25085: Fix out-of-bounds access issue while doing multi block SDMA (bsc#1176681)
  • CVE-2020-10756: Fix out-of-bounds read information disclosure in icmp6_send_echoreply(bsc#1172380)
  • For the record, these issues are fixed in this package already. Most are alternate references to previously mentioned issues: (CVE-2019-15890, bsc#1149813, CVE-2020-8608, bsc#1163019, CVE-2020-14364, bsc#1175534, CVE-2020-25707, bsc#1178683, CVE-2020-25723, bsc#1178935, CVE-2020-29130, bsc#1179477, CVE-2020-29129, bsc#1179484, CVE-2021-20257, bsc#1182846, CVE-2021-3419, bsc#1182975)

Non-security issues fixed:

  • Fix issue where s390 guest fails to find zipl boot menu index (bsc#1183979)
  • QEMU BIOS fails to read stage2 loader on s390x (bsc#1186290)
  • Host CPU microcode revision will be visible inside VMs when the proper CPU-model is used (jsc#SLE-17785):
  • Fix testsuite error (bsc#1184574)
  • Fix qemu crash with iothread when block commit after snapshot (bsc#1187013)
  • Fix qemu hang while cancelling migrating hugepage vm (bsc#1185591)
  • Use RCU to avoid race during scsi hotplug/hotunplug (bsc#1184574)

This update was imported from the SUSE:SLE-15-SP2:Update update project.

Список пакетов

openSUSE Leap 15.2
qemu-4.2.1-lp152.9.16.2
qemu-arm-4.2.1-lp152.9.16.2
qemu-audio-alsa-4.2.1-lp152.9.16.2
qemu-audio-pa-4.2.1-lp152.9.16.2
qemu-audio-sdl-4.2.1-lp152.9.16.2
qemu-block-curl-4.2.1-lp152.9.16.2
qemu-block-dmg-4.2.1-lp152.9.16.2
qemu-block-gluster-4.2.1-lp152.9.16.2
qemu-block-iscsi-4.2.1-lp152.9.16.2
qemu-block-nfs-4.2.1-lp152.9.16.2
qemu-block-rbd-4.2.1-lp152.9.16.2
qemu-block-ssh-4.2.1-lp152.9.16.2
qemu-extra-4.2.1-lp152.9.16.2
qemu-guest-agent-4.2.1-lp152.9.16.2
qemu-ipxe-1.0.0+-lp152.9.16.2
qemu-ksm-4.2.1-lp152.9.16.2
qemu-kvm-4.2.1-lp152.9.16.2
qemu-lang-4.2.1-lp152.9.16.2
qemu-linux-user-4.2.1-lp152.9.16.1
qemu-microvm-4.2.1-lp152.9.16.2
qemu-ppc-4.2.1-lp152.9.16.2
qemu-s390-4.2.1-lp152.9.16.2
qemu-seabios-1.12.1+-lp152.9.16.2
qemu-sgabios-8-lp152.9.16.2
qemu-testsuite-4.2.1-lp152.9.16.7
qemu-tools-4.2.1-lp152.9.16.2
qemu-ui-curses-4.2.1-lp152.9.16.2
qemu-ui-gtk-4.2.1-lp152.9.16.2
qemu-ui-sdl-4.2.1-lp152.9.16.2
qemu-ui-spice-app-4.2.1-lp152.9.16.2
qemu-vgabios-1.12.1+-lp152.9.16.2
qemu-vhost-user-gpu-4.2.1-lp152.9.16.2
qemu-x86-4.2.1-lp152.9.16.2

Описание

libslirp 4.0.0, as used in QEMU 4.1.0, has a use-after-free in ip_reass in ip_input.c.


Затронутые продукты
openSUSE Leap 15.2:qemu-4.2.1-lp152.9.16.2
openSUSE Leap 15.2:qemu-arm-4.2.1-lp152.9.16.2
openSUSE Leap 15.2:qemu-audio-alsa-4.2.1-lp152.9.16.2
openSUSE Leap 15.2:qemu-audio-pa-4.2.1-lp152.9.16.2

Ссылки

Описание

An out-of-bounds read vulnerability was found in the SLiRP networking implementation of the QEMU emulator. This flaw occurs in the icmp6_send_echoreply() routine while replying to an ICMP echo request, also known as ping. This flaw allows a malicious guest to leak the contents of the host memory, resulting in possible information disclosure. This flaw affects versions of libslirp before 4.3.1.


Затронутые продукты
openSUSE Leap 15.2:qemu-4.2.1-lp152.9.16.2
openSUSE Leap 15.2:qemu-arm-4.2.1-lp152.9.16.2
openSUSE Leap 15.2:qemu-audio-alsa-4.2.1-lp152.9.16.2
openSUSE Leap 15.2:qemu-audio-pa-4.2.1-lp152.9.16.2

Ссылки

Описание

An out-of-bounds read/write access flaw was found in the USB emulator of the QEMU in versions before 5.2.0. This issue occurs while processing USB packets from a guest when USBDevice 'setup_len' exceeds its 'data_buf[4096]' in the do_token_in, do_token_out routines. This flaw allows a guest user to crash the QEMU process, resulting in a denial of service, or the potential execution of arbitrary code with the privileges of the QEMU process on the host.


Затронутые продукты
openSUSE Leap 15.2:qemu-4.2.1-lp152.9.16.2
openSUSE Leap 15.2:qemu-arm-4.2.1-lp152.9.16.2
openSUSE Leap 15.2:qemu-audio-alsa-4.2.1-lp152.9.16.2
openSUSE Leap 15.2:qemu-audio-pa-4.2.1-lp152.9.16.2

Ссылки

Описание

QEMU 5.0.0 has a heap-based Buffer Overflow in flatview_read_continue in exec.c because hw/sd/sdhci.c mishandles a write operation in the SDHC_BLKSIZE case.


Затронутые продукты
openSUSE Leap 15.2:qemu-4.2.1-lp152.9.16.2
openSUSE Leap 15.2:qemu-arm-4.2.1-lp152.9.16.2
openSUSE Leap 15.2:qemu-audio-alsa-4.2.1-lp152.9.16.2
openSUSE Leap 15.2:qemu-audio-pa-4.2.1-lp152.9.16.2

Ссылки

Описание

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate is a duplicate of CVE-2020-28916


Затронутые продукты
openSUSE Leap 15.2:qemu-4.2.1-lp152.9.16.2
openSUSE Leap 15.2:qemu-arm-4.2.1-lp152.9.16.2
openSUSE Leap 15.2:qemu-audio-alsa-4.2.1-lp152.9.16.2
openSUSE Leap 15.2:qemu-audio-pa-4.2.1-lp152.9.16.2

Ссылки

Описание

A reachable assertion issue was found in the USB EHCI emulation code of QEMU. It could occur while processing USB requests due to missing handling of DMA memory map failure. A malicious privileged user within the guest may abuse this flaw to send bogus USB requests and crash the QEMU process on the host, resulting in a denial of service.


Затронутые продукты
openSUSE Leap 15.2:qemu-4.2.1-lp152.9.16.2
openSUSE Leap 15.2:qemu-arm-4.2.1-lp152.9.16.2
openSUSE Leap 15.2:qemu-audio-alsa-4.2.1-lp152.9.16.2
openSUSE Leap 15.2:qemu-audio-pa-4.2.1-lp152.9.16.2

Ссылки

Описание

ncsi.c in libslirp through 4.3.1 has a buffer over-read because it tries to read a certain amount of header data even if that exceeds the total packet length.


Затронутые продукты
openSUSE Leap 15.2:qemu-4.2.1-lp152.9.16.2
openSUSE Leap 15.2:qemu-arm-4.2.1-lp152.9.16.2
openSUSE Leap 15.2:qemu-audio-alsa-4.2.1-lp152.9.16.2
openSUSE Leap 15.2:qemu-audio-pa-4.2.1-lp152.9.16.2

Ссылки

Описание

slirp.c in libslirp through 4.3.1 has a buffer over-read because it tries to read a certain amount of header data even if that exceeds the total packet length.


Затронутые продукты
openSUSE Leap 15.2:qemu-4.2.1-lp152.9.16.2
openSUSE Leap 15.2:qemu-arm-4.2.1-lp152.9.16.2
openSUSE Leap 15.2:qemu-audio-alsa-4.2.1-lp152.9.16.2
openSUSE Leap 15.2:qemu-audio-pa-4.2.1-lp152.9.16.2

Ссылки

Описание

In libslirp 4.1.0, as used in QEMU 4.2.0, tcp_subr.c misuses snprintf return values, leading to a buffer overflow in later code.


Затронутые продукты
openSUSE Leap 15.2:qemu-4.2.1-lp152.9.16.2
openSUSE Leap 15.2:qemu-arm-4.2.1-lp152.9.16.2
openSUSE Leap 15.2:qemu-audio-alsa-4.2.1-lp152.9.16.2
openSUSE Leap 15.2:qemu-audio-pa-4.2.1-lp152.9.16.2

Ссылки

Описание

An infinite loop flaw was found in the e1000 NIC emulator of the QEMU. This issue occurs while processing transmits (tx) descriptors in process_tx_desc if various descriptor fields are initialized with invalid values. This flaw allows a guest to consume CPU cycles on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.


Затронутые продукты
openSUSE Leap 15.2:qemu-4.2.1-lp152.9.16.2
openSUSE Leap 15.2:qemu-arm-4.2.1-lp152.9.16.2
openSUSE Leap 15.2:qemu-audio-alsa-4.2.1-lp152.9.16.2
openSUSE Leap 15.2:qemu-audio-pa-4.2.1-lp152.9.16.2

Ссылки

Описание

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.


Затронутые продукты
openSUSE Leap 15.2:qemu-4.2.1-lp152.9.16.2
openSUSE Leap 15.2:qemu-arm-4.2.1-lp152.9.16.2
openSUSE Leap 15.2:qemu-audio-alsa-4.2.1-lp152.9.16.2
openSUSE Leap 15.2:qemu-audio-pa-4.2.1-lp152.9.16.2

Ссылки

Описание

Several memory leaks were found in the virtio vhost-user GPU device (vhost-user-gpu) of QEMU in versions up to and including 6.0. They exist in contrib/vhost-user-gpu/vhost-user-gpu.c and contrib/vhost-user-gpu/virgl.c due to improper release of memory (i.e., free) after effective lifetime.


Затронутые продукты
openSUSE Leap 15.2:qemu-4.2.1-lp152.9.16.2
openSUSE Leap 15.2:qemu-arm-4.2.1-lp152.9.16.2
openSUSE Leap 15.2:qemu-audio-alsa-4.2.1-lp152.9.16.2
openSUSE Leap 15.2:qemu-audio-pa-4.2.1-lp152.9.16.2

Ссылки

Описание

An information disclosure vulnerability was found in the virtio vhost-user GPU device (vhost-user-gpu) of QEMU in versions up to and including 6.0. The flaw exists in virgl_cmd_get_capset_info() in contrib/vhost-user-gpu/virgl.c and could occur due to the read of uninitialized memory. A malicious guest could exploit this issue to leak memory from the host.


Затронутые продукты
openSUSE Leap 15.2:qemu-4.2.1-lp152.9.16.2
openSUSE Leap 15.2:qemu-arm-4.2.1-lp152.9.16.2
openSUSE Leap 15.2:qemu-audio-alsa-4.2.1-lp152.9.16.2
openSUSE Leap 15.2:qemu-audio-pa-4.2.1-lp152.9.16.2

Ссылки

Описание

An out-of-bounds write vulnerability was found in the virtio vhost-user GPU device (vhost-user-gpu) of QEMU in versions up to and including 6.0. The flaw occurs while processing the 'VIRTIO_GPU_CMD_GET_CAPSET' command from the guest. It could allow a privileged guest user to crash the QEMU process on the host, resulting in a denial of service condition, or potential code execution with the privileges of the QEMU process.


Затронутые продукты
openSUSE Leap 15.2:qemu-4.2.1-lp152.9.16.2
openSUSE Leap 15.2:qemu-arm-4.2.1-lp152.9.16.2
openSUSE Leap 15.2:qemu-audio-alsa-4.2.1-lp152.9.16.2
openSUSE Leap 15.2:qemu-audio-pa-4.2.1-lp152.9.16.2

Ссылки