Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

openSUSE-SU-2021:1461-1

Опубликовано: 08 нояб. 2021
Источник: suse-cvrf

Описание

Security update for qemu

This update for qemu fixes the following issues:

Security issues fixed:

  • CVE-2021-3713: Fix out-of-bounds write in UAS (USB Attached SCSI) device emulation (bsc#1189702)
  • CVE-2021-3748: Fix heap use-after-free in virtio_net_receive_rcu (bsc#1189938)

Non-security issues fixed:

  • Add transfer length item in block limits page of scsi vpd (bsc#1190425)
  • Fix qemu crash while deleting xen-block (bsc#1189234)

This update was imported from the SUSE:SLE-15-SP2:Update update project.

Список пакетов

openSUSE Leap 15.2
qemu-4.2.1-lp152.9.23.1
qemu-arm-4.2.1-lp152.9.23.1
qemu-audio-alsa-4.2.1-lp152.9.23.1
qemu-audio-pa-4.2.1-lp152.9.23.1
qemu-audio-sdl-4.2.1-lp152.9.23.1
qemu-block-curl-4.2.1-lp152.9.23.1
qemu-block-dmg-4.2.1-lp152.9.23.1
qemu-block-gluster-4.2.1-lp152.9.23.1
qemu-block-iscsi-4.2.1-lp152.9.23.1
qemu-block-nfs-4.2.1-lp152.9.23.1
qemu-block-rbd-4.2.1-lp152.9.23.1
qemu-block-ssh-4.2.1-lp152.9.23.1
qemu-extra-4.2.1-lp152.9.23.1
qemu-guest-agent-4.2.1-lp152.9.23.1
qemu-ipxe-1.0.0+-lp152.9.23.1
qemu-ksm-4.2.1-lp152.9.23.1
qemu-kvm-4.2.1-lp152.9.23.1
qemu-lang-4.2.1-lp152.9.23.1
qemu-linux-user-4.2.1-lp152.9.23.1
qemu-microvm-4.2.1-lp152.9.23.1
qemu-ppc-4.2.1-lp152.9.23.1
qemu-s390-4.2.1-lp152.9.23.1
qemu-seabios-1.12.1+-lp152.9.23.1
qemu-sgabios-8-lp152.9.23.1
qemu-testsuite-4.2.1-lp152.9.23.1
qemu-tools-4.2.1-lp152.9.23.1
qemu-ui-curses-4.2.1-lp152.9.23.1
qemu-ui-gtk-4.2.1-lp152.9.23.1
qemu-ui-sdl-4.2.1-lp152.9.23.1
qemu-ui-spice-app-4.2.1-lp152.9.23.1
qemu-vgabios-1.12.1+-lp152.9.23.1
qemu-vhost-user-gpu-4.2.1-lp152.9.23.1
qemu-x86-4.2.1-lp152.9.23.1

Описание

An out-of-bounds write flaw was found in the UAS (USB Attached SCSI) device emulation of QEMU in versions prior to 6.2.0-rc0. The device uses the guest supplied stream number unchecked, which can lead to out-of-bounds access to the UASDevice->data3 and UASDevice->status3 fields. A malicious guest user could use this flaw to crash QEMU or potentially achieve code execution with the privileges of the QEMU process on the host.


Затронутые продукты
openSUSE Leap 15.2:qemu-4.2.1-lp152.9.23.1
openSUSE Leap 15.2:qemu-arm-4.2.1-lp152.9.23.1
openSUSE Leap 15.2:qemu-audio-alsa-4.2.1-lp152.9.23.1
openSUSE Leap 15.2:qemu-audio-pa-4.2.1-lp152.9.23.1

Ссылки

Описание

A use-after-free vulnerability was found in the virtio-net device of QEMU. It could occur when the descriptor's address belongs to the non direct access region, due to num_buffers being set after the virtqueue elem has been unmapped. A malicious guest could use this flaw to crash QEMU, resulting in a denial of service condition, or potentially execute code on the host with the privileges of the QEMU process.


Затронутые продукты
openSUSE Leap 15.2:qemu-4.2.1-lp152.9.23.1
openSUSE Leap 15.2:qemu-arm-4.2.1-lp152.9.23.1
openSUSE Leap 15.2:qemu-audio-alsa-4.2.1-lp152.9.23.1
openSUSE Leap 15.2:qemu-audio-pa-4.2.1-lp152.9.23.1

Ссылки