Revision Date: | 2020-12-01 | Version: | 1 |
Title: | Security update for qemu (Important) |
Description: |
This update for qemu fixes several issues.
These security issues were fixed:
- CVE-2017-9330: USB OHCI Emulation in qemu allowed local guest OS users to cause a denial of service (infinite loop) by leveraging an incorrect return value (bsc#1042159). - CVE-2017-8379: Memory leak in the keyboard input event handlers support allowed local guest OS privileged users to cause a denial of service (host memory consumption) by rapidly generating large keyboard events (bsc#1037334). - CVE-2017-8309: Memory leak in the audio/audio.c allowed remote attackers to cause a denial of service (memory consumption) by repeatedly starting and stopping audio capture (bsc#1037242). - CVE-2017-7493: The VirtFS, host directory sharing via Plan 9 File System(9pfs) support, was vulnerable to an improper access control issue. It could occur while accessing virtfs metadata files in mapped-file security mode. A guest user could have used this flaw to escalate their privileges inside guest (bsc#1039495). - CVE-2017-7377: The v9fs_create and v9fs_lcreate functions in hw/9pfs/9p.c allowed local guest OS privileged users to cause a denial of service (file descriptor or memory consumption) via vectors related to an already in-use fid (bsc#1032075). - CVE-2017-8086: A memory leak in the v9fs_list_xattr function in hw/9pfs/9p-xattr.c allowed local guest OS privileged users to cause a denial of service (memory consumption) via vectors involving the orig_value variable (bsc#1035950). - CVE-2017-5973: A infinite loop while doing control transfer in xhci_kick_epctx allowed privileged user inside the guest to crash the host process resulting in DoS (bsc#1025109) - CVE-2017-5987: The sdhci_sdma_transfer_multi_blocks function in hw/sd/sdhci.c allowed local OS guest privileged users to cause a denial of service (infinite loop and QEMU process crash) via vectors involving the transfer mode register during multi block transfer (bsc#1025311). - CVE-2017-6505: The ohci_service_ed_list function in hw/usb/hcd-ohci.c allowed local guest OS users to cause a denial of service (infinite loop) via vectors involving the number of link endpoint list descriptors (bsc#1028184) - CVE-2016-9603: A privileged user within the guest VM could have caused a heap overflow in the device model process, potentially escalating their privileges to that of the device model process (bsc#1028656) - CVE-2017-7718: hw/display/cirrus_vga_rop.h allowed local guest OS privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) via vectors related to copying VGA data via the cirrus_bitblt_rop_fwd_transp_ and cirrus_bitblt_rop_fwd_ functions (bsc#1034908) - CVE-2017-7980: An out-of-bounds r/w access issues in the Cirrus CLGD 54xx VGA Emulator support allowed privileged user inside guest to use this flaw to crash the Qemu process resulting in DoS or potentially execute arbitrary code on a host with privileges of Qemu process on the host (bsc#1035406) - CVE-2017-8112: hw/scsi/vmw_pvscsi.c allowed local guest OS privileged users to cause a denial of service (infinite loop and CPU consumption) via the message ring page count (bsc#1036211). - CVE-2017-9375: The USB xHCI controller emulator support was vulnerable to an infinite recursive call loop issue, which allowed a privileged user inside guest to crash the Qemu process resulting in DoS (bsc#1042800). - CVE-2017-9374: Missing free of 's->ipacket', causes a host memory leak, allowing for DoS (bsc#1043073). - CVE-2017-9373: The IDE AHCI Emulation support was vulnerable to a host memory leakage issue, which allowed a privileged user inside guest to leak host memory resulting in DoS (bsc#1042801). - CVE-2017-8380: The MegaRAID SAS 8708EM2 Host Bus Adapter emulation support was vulnerable to an out-of-bounds read access issue which allowed a privileged user inside guest to read host memory resulting in DoS (bsc#1037336). - CVE-2016-9602: The VirtFS host directory sharing via Plan 9 File System(9pfs) support was vulnerable to an improper link following issue which allowed a privileged user inside guest to access host file system beyond the shared folder and potentially escalating their privileges on a host (bsc#1020427). - CVE-2017-7471: The VirtFS host directory sharing via Plan 9 File System(9pfs) support was vulnerable to an improper access control issue which allowed a privileged user inside guest to access host file system beyond the shared folder and potentially escalating their privileges on a host (bsc#1034866). - Fix privilege escalation in TCG mode of QEMU. This is not considered a security issue by the upstream project, but is included as additional hardening (bsc#1030624) - Fix potential DoS in virtfs - CVE-2016-10028: The Virtio GPU Device emulator support was vulnerable to an out of bounds memory access issue allowing a guest user to crash the Qemu process instance on a host, resulting in DoS (bsc#1017084, bsc#1016503) - CVE-2016-10029: The Virtio GPU Device emulator support was vulnerable to an OOB read issue allowing a guest user to crash the Qemu process instance resulting in Dos (bsc#1017081, bsc#1016504) - CVE-2017-5579: The 16550A UART serial device emulation support was vulnerable to a memory leakage issue allowing a privileged user to cause a DoS and/or potentially crash the Qemu process on the host (bsc#1021741) - CVE-2017-9503: The MegaRAID SAS 8708EM2 Host Bus Adapter emulation support was vulnerable to a null pointer dereference issue which allowed a privileged user inside guest to crash the Qemu process on the host resulting in DoS (bsc#1043296).
This non-security issue was fixed:
- Enable MONITOR/MWAIT support for guests (bsc#1031142)
|
Family: | unix | Class: | patch |
Status: | | Reference(s): | 1016503 1016504 1017081 1017084 1020427 1021741 1025109 1025311 1028184 1028656 1030624 1031142 1032075 1032647 1034866 1034908 1035406 1035950 1036211 1037242 1037334 1037336 1039495 1042159 1042800 1042801 1043073 1043296 1052009 1060877 1064069 1064070 1064071 1064072 1064073 1064075 1064077 1064078 1064079 1064080 1064081 1064082 1064083 1064084 1064085 1064086 1097108 1099306 1149294 1149295 1149296 1149297 1149298 1149299 1149303 1149304 1149324 1163985 843509 912607 951376 970072 970073 979261 979906 980364 980377 CVE-2008-3825 CVE-2009-1384 CVE-2011-2729 CVE-2012-2737 CVE-2012-5783 CVE-2013-1982 CVE-2013-2061 CVE-2015-4734 CVE-2015-4803 CVE-2015-4805 CVE-2015-4806 CVE-2015-4835 CVE-2015-4840 CVE-2015-4842 CVE-2015-4843 CVE-2015-4844 CVE-2015-4860 CVE-2015-4872 CVE-2015-4881 CVE-2015-4882 CVE-2015-4883 CVE-2015-4893 CVE-2015-4903 CVE-2015-4911 CVE-2015-8872 CVE-2016-10028 CVE-2016-10029 CVE-2016-10165 CVE-2016-1285 CVE-2016-1286 CVE-2016-4574 CVE-2016-4579 CVE-2016-4804 CVE-2016-9602 CVE-2016-9603 CVE-2016-9840 CVE-2016-9841 CVE-2016-9842 CVE-2016-9843 CVE-2017-10274 CVE-2017-10281 CVE-2017-10285 CVE-2017-10295 CVE-2017-10345 CVE-2017-10346 CVE-2017-10347 CVE-2017-10348 CVE-2017-10349 CVE-2017-10350 CVE-2017-10355 CVE-2017-10356 CVE-2017-10357 CVE-2017-10388 CVE-2017-12166 CVE-2017-5579 CVE-2017-5973 CVE-2017-5987 CVE-2017-6505 CVE-2017-7377 CVE-2017-7471 CVE-2017-7493 CVE-2017-7718 CVE-2017-7980 CVE-2017-8086 CVE-2017-8112 CVE-2017-8309 CVE-2017-8379 CVE-2017-8380 CVE-2017-9330 CVE-2017-9373 CVE-2017-9374 CVE-2017-9375 CVE-2017-9503 CVE-2018-10853 CVE-2018-3646 CVE-2019-11740 CVE-2019-11742 CVE-2019-11743 CVE-2019-11744 CVE-2019-11746 CVE-2019-11752 CVE-2019-11753 CVE-2019-9812 CVE-2020-1720 SUSE-SU-2015:1875-1 SUSE-SU-2016:0825-1 SUSE-SU-2016:1510-1 SUSE-SU-2016:2145-1 SUSE-SU-2017:1774-1 SUSE-SU-2017:2839-1 SUSE-SU-2017:2989-1 SUSE-SU-2018:2358-1 SUSE-SU-2019:2436-1 SUSE-SU-2020:0715-1
|
Platform(s): | openSUSE Leap 15.0 openSUSE Leap 15.1 openSUSE Leap 15.1 NonFree SUSE Linux Enterprise Desktop 11 SP3 SUSE Linux Enterprise Desktop 11 SP4 SUSE Linux Enterprise Desktop 12 SP2 SUSE Linux Enterprise Server 12 SP1 SUSE Linux Enterprise Server 12 SP1-LTSS SUSE Linux Enterprise Server 12 SP2 SUSE Linux Enterprise Server 12 SP2-BCL SUSE Linux Enterprise Server 12 SP2-ESPOS SUSE Linux Enterprise Server 12 SP2-LTSS SUSE Linux Enterprise Server 12 SP3 SUSE Linux Enterprise Server 12 SP3-ESPOS SUSE Linux Enterprise Server 12 SP3-TERADATA SUSE Linux Enterprise Server 12 SP4 SUSE OpenStack Cloud 7 SUSE OpenStack Cloud 8 SUSE OpenStack Cloud Crowbar 8
| Product(s): | |
Definition Synopsis |
openSUSE Leap 15.0 is installed AND Package Information
PackageKit-1.1.10-lp150.2 is installed
OR PackageKit-backend-zypp-1.1.10-lp150.2 is installed
OR PackageKit-gstreamer-plugin-1.1.10-lp150.2 is installed
OR PackageKit-gtk3-module-1.1.10-lp150.2 is installed
OR PackageKit-lang-1.1.10-lp150.2 is installed
OR libpackagekit-glib2-18-1.1.10-lp150.2 is installed
OR typelib-1_0-PackageKitGlib-1_0-1.1.10-lp150.2 is installed
|
Definition Synopsis |
openSUSE Leap 15.1 is installed
AND Package Information
libwireshark9-2.4.15-lp151.2.3 is installed
OR libwiretap7-2.4.15-lp151.2.3 is installed
OR libwscodecs1-2.4.15-lp151.2.3 is installed
OR libwsutil8-2.4.15-lp151.2.3 is installed
OR wireshark-2.4.15-lp151.2.3 is installed
OR wireshark-devel-2.4.15-lp151.2.3 is installed
OR wireshark-ui-qt-2.4.15-lp151.2.3 is installed
|
Definition Synopsis |
openSUSE Leap 15.1 NonFree is installed
AND opera-65.0.3467.62-lp151.2.9 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Desktop 11 SP3 is installed
AND openvpn-2.0.9-143.40 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Desktop 11 SP4 is installed
AND Package Information
bind-9.9.6P1-0.25 is installed
OR bind-libs-9.9.6P1-0.25 is installed
OR bind-libs-32bit-9.9.6P1-0.25 is installed
OR bind-utils-9.9.6P1-0.25 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Desktop 12 SP2 is installed
AND Package Information
qemu-2.6.2-41.16 is installed
OR qemu-block-curl-2.6.2-41.16 is installed
OR qemu-ipxe-1.0.0-41.16 is installed
OR qemu-kvm-2.6.2-41.16 is installed
OR qemu-seabios-1.9.1-41.16 is installed
OR qemu-sgabios-8-41.16 is installed
OR qemu-tools-2.6.2-41.16 is installed
OR qemu-vgabios-1.9.1-41.16 is installed
OR qemu-x86-2.6.2-41.16 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP1 is installed
AND Package Information
accountsservice-0.6.35-3 is installed
OR accountsservice-lang-0.6.35-3 is installed
OR libaccountsservice0-0.6.35-3 is installed
OR typelib-1_0-AccountsService-1_0-0.6.35-3 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP1-LTSS is installed
AND Package Information
java-1_8_0-openjdk-1.8.0.151-27.8 is installed
OR java-1_8_0-openjdk-demo-1.8.0.151-27.8 is installed
OR java-1_8_0-openjdk-devel-1.8.0.151-27.8 is installed
OR java-1_8_0-openjdk-headless-1.8.0.151-27.8 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP2 is installed
AND Package Information
apache-commons-daemon-1.0.15-4 is installed
OR apache-commons-daemon-javadoc-1.0.15-4 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP2-BCL is installed
AND Package Information
libdcerpc-binding0-4.4.2-38.20 is installed
OR libdcerpc-binding0-32bit-4.4.2-38.20 is installed
OR libdcerpc0-4.4.2-38.20 is installed
OR libdcerpc0-32bit-4.4.2-38.20 is installed
OR libndr-krb5pac0-4.4.2-38.20 is installed
OR libndr-krb5pac0-32bit-4.4.2-38.20 is installed
OR libndr-nbt0-4.4.2-38.20 is installed
OR libndr-nbt0-32bit-4.4.2-38.20 is installed
OR libndr-standard0-4.4.2-38.20 is installed
OR libndr-standard0-32bit-4.4.2-38.20 is installed
OR libndr0-4.4.2-38.20 is installed
OR libndr0-32bit-4.4.2-38.20 is installed
OR libnetapi0-4.4.2-38.20 is installed
OR libnetapi0-32bit-4.4.2-38.20 is installed
OR libsamba-credentials0-4.4.2-38.20 is installed
OR libsamba-credentials0-32bit-4.4.2-38.20 is installed
OR libsamba-errors0-4.4.2-38.20 is installed
OR libsamba-errors0-32bit-4.4.2-38.20 is installed
OR libsamba-hostconfig0-4.4.2-38.20 is installed
OR libsamba-hostconfig0-32bit-4.4.2-38.20 is installed
OR libsamba-passdb0-4.4.2-38.20 is installed
OR libsamba-passdb0-32bit-4.4.2-38.20 is installed
OR libsamba-util0-4.4.2-38.20 is installed
OR libsamba-util0-32bit-4.4.2-38.20 is installed
OR libsamdb0-4.4.2-38.20 is installed
OR libsamdb0-32bit-4.4.2-38.20 is installed
OR libsmbclient0-4.4.2-38.20 is installed
OR libsmbclient0-32bit-4.4.2-38.20 is installed
OR libsmbconf0-4.4.2-38.20 is installed
OR libsmbconf0-32bit-4.4.2-38.20 is installed
OR libsmbldap0-4.4.2-38.20 is installed
OR libsmbldap0-32bit-4.4.2-38.20 is installed
OR libtevent-util0-4.4.2-38.20 is installed
OR libtevent-util0-32bit-4.4.2-38.20 is installed
OR libwbclient0-4.4.2-38.20 is installed
OR libwbclient0-32bit-4.4.2-38.20 is installed
OR samba-4.4.2-38.20 is installed
OR samba-client-4.4.2-38.20 is installed
OR samba-client-32bit-4.4.2-38.20 is installed
OR samba-doc-4.4.2-38.20 is installed
OR samba-libs-4.4.2-38.20 is installed
OR samba-libs-32bit-4.4.2-38.20 is installed
OR samba-winbind-4.4.2-38.20 is installed
OR samba-winbind-32bit-4.4.2-38.20 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP2-ESPOS is installed
AND Package Information
MozillaFirefox-60.4.0esr-109.55 is installed
OR MozillaFirefox-devel-60.4.0esr-109.55 is installed
OR MozillaFirefox-translations-common-60.4.0esr-109.55 is installed
OR libfreebl3-3.40.1-58.18 is installed
OR libfreebl3-32bit-3.40.1-58.18 is installed
OR libsoftokn3-3.40.1-58.18 is installed
OR libsoftokn3-32bit-3.40.1-58.18 is installed
OR mozilla-nspr-4.20-19.6 is installed
OR mozilla-nspr-32bit-4.20-19.6 is installed
OR mozilla-nss-3.40.1-58.18 is installed
OR mozilla-nss-32bit-3.40.1-58.18 is installed
OR mozilla-nss-certs-3.40.1-58.18 is installed
OR mozilla-nss-certs-32bit-3.40.1-58.18 is installed
OR mozilla-nss-sysinit-3.40.1-58.18 is installed
OR mozilla-nss-sysinit-32bit-3.40.1-58.18 is installed
OR mozilla-nss-tools-3.40.1-58.18 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP2-LTSS is installed
AND Package Information
kgraft-patch-4_4_121-92_85-default-2-2 is installed
OR kgraft-patch-SLE12-SP2_Update_23-2-2 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP3 is installed
AND Package Information
java-1_7_1-ibm-1.7.1_sr4.5-37 is installed
OR java-1_7_1-ibm-alsa-1.7.1_sr4.5-37 is installed
OR java-1_7_1-ibm-jdbc-1.7.1_sr4.5-37 is installed
OR java-1_7_1-ibm-plugin-1.7.1_sr4.5-37 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP3-ESPOS is installed
AND Package Information
kgraft-patch-4_4_178-94_91-default-8-2 is installed
OR kgraft-patch-SLE12-SP3_Update_25-8-2 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP3-TERADATA is installed
AND Package Information
curl-7.37.0-37.26 is installed
OR libcurl4-7.37.0-37.26 is installed
OR libcurl4-32bit-7.37.0-37.26 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP4 is installed
AND Package Information
libfreetype6-2.6.3-7.15 is installed
OR libfreetype6-32bit-2.6.3-7.15 is installed
|
Definition Synopsis |
SUSE OpenStack Cloud 7 is installed
AND Package Information
ruby2.1-rubygem-actionmailer-4_2-4.2.9-3.3 is installed
OR ruby2.1-rubygem-actionpack-4_2-4.2.9-7.3 is installed
OR ruby2.1-rubygem-actionview-4_2-4.2.9-9.3 is installed
OR ruby2.1-rubygem-activejob-4_2-4.2.9-3.3 is installed
OR ruby2.1-rubygem-activemodel-4_2-4.2.9-6.3 is installed
OR ruby2.1-rubygem-activerecord-4_2-4.2.9-6.3 is installed
OR ruby2.1-rubygem-activesupport-4_2-4.2.9-7.3 is installed
OR ruby2.1-rubygem-rails-4_2-4.2.9-3.3 is installed
OR ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.3 is installed
OR ruby2.1-rubygem-railties-4_2-4.2.9-3.3 is installed
OR rubygem-actionmailer-4_2-4.2.9-3.3 is installed
OR rubygem-actionpack-4_2-4.2.9-7.3 is installed
OR rubygem-actionview-4_2-4.2.9-9.3 is installed
OR rubygem-activejob-4_2-4.2.9-3.3 is installed
OR rubygem-activemodel-4_2-4.2.9-6.3 is installed
OR rubygem-activerecord-4_2-4.2.9-6.3 is installed
OR rubygem-activesupport-4_2-4.2.9-7.3 is installed
OR rubygem-rails-4_2-4.2.9-3.3 is installed
OR rubygem-rails-html-sanitizer-1.0.3-8.3 is installed
OR rubygem-railties-4_2-4.2.9-3.3 is installed
|
Definition Synopsis |
SUSE OpenStack Cloud 8 is installed
AND python-cryptography-2.0.3-3.3 is installed
|
Definition Synopsis |
SUSE OpenStack Cloud Crowbar 8 is installed
AND Package Information
ansible-2.4.6.0-3.9 is installed
OR caasp-openstack-heat-templates-1.0+git.1560518045.ad7dc6d-4.18 is installed
OR crowbar-core-5.0+git.1593156248.55bbdb26d-3.41 is installed
OR crowbar-core-branding-upstream-5.0+git.1593156248.55bbdb26d-3.41 is installed
OR crowbar-openstack-5.0+git.1593085772.64c4ab43c-4.40 is installed
OR documentation-suse-openstack-cloud-deployment-8.20200527-1.26 is installed
OR documentation-suse-openstack-cloud-supplement-8.20200527-1.26 is installed
OR documentation-suse-openstack-cloud-upstream-admin-8.20200527-1.26 is installed
OR documentation-suse-openstack-cloud-upstream-user-8.20200527-1.26 is installed
OR grafana-4.6.5-4.9 is installed
OR kibana-4.6.3-3.3 is installed
OR openstack-dashboard-12.0.5~dev3-3.26 is installed
OR openstack-heat-templates-0.0.0+git.1582270132.8a20477-3.15 is installed
OR openstack-keystone-12.0.4~dev11-5.33 is installed
OR openstack-keystone-doc-12.0.4~dev11-5.33 is installed
OR openstack-monasca-agent-2.2.6~dev4-3.18 is installed
OR openstack-monasca-installer-20190923_16.32-3.12 is installed
OR openstack-neutron-11.0.9~dev65-3.33 is installed
OR openstack-neutron-dhcp-agent-11.0.9~dev65-3.33 is installed
OR openstack-neutron-doc-11.0.9~dev65-3.33 is installed
OR openstack-neutron-ha-tool-11.0.9~dev65-3.33 is installed
OR openstack-neutron-l3-agent-11.0.9~dev65-3.33 is installed
OR openstack-neutron-linuxbridge-agent-11.0.9~dev65-3.33 is installed
OR openstack-neutron-macvtap-agent-11.0.9~dev65-3.33 is installed
OR openstack-neutron-metadata-agent-11.0.9~dev65-3.33 is installed
OR openstack-neutron-metering-agent-11.0.9~dev65-3.33 is installed
OR openstack-neutron-openvswitch-agent-11.0.9~dev65-3.33 is installed
OR openstack-neutron-server-11.0.9~dev65-3.33 is installed
OR openstack-octavia-amphora-image-0.1.4-3.12 is installed
OR openstack-octavia-amphora-image-x86_64-0.1.4-3.12 is installed
OR python-Django-1.11.23-3.15 is installed
OR python-Flask-0.12.1-3.3 is installed
OR python-Pillow-4.2.1-3.5 is installed
OR python-amqp-2.4.2-3.12 is installed
OR python-apicapi-1.6.0-3.6 is installed
OR python-horizon-12.0.5~dev3-3.26 is installed
OR python-keystone-12.0.4~dev11-5.33 is installed
OR python-keystoneauth1-3.1.2~dev2-3.3 is installed
OR python-monasca-agent-2.2.6~dev4-3.18 is installed
OR python-neutron-11.0.9~dev65-3.33 is installed
OR python-oslo.messaging-5.30.8-3.11 is installed
OR python-psutil-5.2.2-3.3 is installed
OR python-pyroute2-0.4.21-3.3 is installed
OR python-pysaml2-4.0.2-5.6 is installed
OR python-tooz-1.58.1-3.3 is installed
OR python-waitress-1.4.3-3.3 is installed
OR ruby2.1-rubygem-activeresource-4.0.0-3.3 is installed
OR ruby2.1-rubygem-crowbar-client-3.9.2-3.12 is installed
OR ruby2.1-rubygem-json-1_7-1.7.7-3.3 is installed
OR ruby2.1-rubygem-puma-2.16.0-3.9 is installed
OR rubygem-activeresource-4.0.0-3.3 is installed
OR rubygem-crowbar-client-3.9.2-3.12 is installed
OR rubygem-json-1_7-1.7.7-3.3 is installed
OR rubygem-puma-2.16.0-3.9 is installed
OR storm-1.1.3-3.3 is installed
OR storm-nimbus-1.1.3-3.3 is installed
OR storm-supervisor-1.1.3-3.3 is installed
|