Oval Definition:oval:org.opensuse.security:def:58571
Revision Date:2020-12-01Version:1
Title:Security update for qemu (Important)
Description:

This update for qemu fixes several issues.

These security issues were fixed:

- CVE-2017-15268: Qemu allowed remote attackers to cause a memory leak by triggering slow data-channel read operations, related to io/channel-websock.c (bsc#1062942). - CVE-2017-9524: The qemu-nbd server when built with the Network Block Device (NBD) Server support allowed remote attackers to cause a denial of service (segmentation fault and server crash) by leveraging failure to ensure that all initialization occurs talking to a client in the nbd_negotiate function (bsc#1043808). - CVE-2017-15289: The mode4and5 write functions allowed local OS guest privileged users to cause a denial of service (out-of-bounds write access and Qemu process crash) via vectors related to dst calculation (bsc#1063122) - CVE-2017-15038: Race condition in the v9fs_xattrwalk function local guest OS users to obtain sensitive information from host heap memory via vectors related to reading extended attributes (bsc#1062069) - CVE-2017-10911: The make_response function in the Linux kernel allowed guest OS users to obtain sensitive information from host OS (or other guest OS) kernel memory by leveraging the copying of uninitialized padding fields in Xen block-interface response structures (bsc#1057378) - CVE-2017-12809: The IDE disk and CD/DVD-ROM Emulator support allowed local guest OS privileged users to cause a denial of service (NULL pointer dereference and QEMU process crash) by flushing an empty CDROM device drive (bsc#1054724) - CVE-2017-10664: qemu-nbd did not ignore SIGPIPE, which allowed remote attackers to cause a denial of service (daemon crash) by disconnecting during a server-to-client reply attempt (bsc#1046636) - CVE-2017-10806: Stack-based buffer overflow allowed local guest OS users to cause a denial of service (QEMU process crash) via vectors related to logging debug messages (bsc#1047674) - CVE-2017-14167: Integer overflow in the load_multiboot function allowed local guest OS users to execute arbitrary code on the host via crafted multiboot header address values, which trigger an out-of-bounds write (bsc#1057585) - CVE-2017-11434: The dhcp_decode function in slirp/bootp.c allowed local guest OS users to cause a denial of service (out-of-bounds read) via a crafted DHCP options string (bsc#1049381) - CVE-2017-11334: The address_space_write_continue function allowed local guest OS privileged users to cause a denial of service (out-of-bounds access and guest instance crash) by leveraging use of qemu_map_ram_ptr to access guest ram block area (bsc#1048902) - CVE-2017-13672: The VGA display emulator support allowed local guest OS privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) via vectors involving display update (bsc#1056334)

These non-security issues were fixed:

- Fixed not being able to build from rpm sources due to undefined macro (bsc#1057966) - Fixed wrong permissions for kvm_stat.1 file - Fixed KVM lun resize not working as expected on SLES12 SP2 HV (bsc#1043176)
Family:unixClass:patch
Status:Reference(s):1005591
1012382
1012917
1017646
1019784
1022476
1023078
1023079
1031717
1035905
1038078
1038085
1043176
1043652
1043808
1046636
1047674
1048585
1048902
1049381
1052360
1054724
1056334
1057378
1057585
1057966
1059369
1060279
1062069
1062942
1063122
1064232
1066223
1066842
1068032
1068038
1068569
1068984
1069160
1070799
1072163
1072484
1072589
1073229
1073928
1074134
1074392
1074488
1074621
1074709
1074839
1074847
1075066
1075078
1075087
1075091
1075428
1075617
1075621
1075627
1075994
1076017
1076110
1076806
1076809
1076872
1076899
1077068
1077560
1077592
1078526
1078681
1083125
1083635
1085042
1085447
1086652
1087081
1088268
1089343
1090036
1090123
1090368
1090646
1090869
1091171
1094248
1096130
1096480
1096978
1097108
1097140
1097551
1098016
1098425
1098435
1099306
1099924
1100089
1100416
1100418
1100491
1101557
1101644
1101645
1101651
1101656
1102340
1102851
1103097
1103119
1103203
1103580
1110279
1112142
1112143
1112144
1112146
1112147
1112152
1112153
1116998
1133114
1133145
1154609
1160968
1162972
1168630
1173160
1174120
934119
952474
958791
963844
988524
997358
CVE-2015-7995
CVE-2015-8540
CVE-2015-9019
CVE-2016-10087
CVE-2016-4738
CVE-2016-9577
CVE-2016-9578
CVE-2017-0861
CVE-2017-10664
CVE-2017-10806
CVE-2017-10911
CVE-2017-11334
CVE-2017-11434
CVE-2017-12809
CVE-2017-13166
CVE-2017-13672
CVE-2017-14167
CVE-2017-15038
CVE-2017-15129
CVE-2017-15268
CVE-2017-15289
CVE-2017-17712
CVE-2017-17862
CVE-2017-17864
CVE-2017-18017
CVE-2017-18344
CVE-2017-18344
CVE-2017-5029
CVE-2017-5715
CVE-2017-9524
CVE-2018-1000004
CVE-2018-1000199
CVE-2018-10853
CVE-2018-1087
CVE-2018-13053
CVE-2018-13405
CVE-2018-13406
CVE-2018-13785
CVE-2018-14734
CVE-2018-16435
CVE-2018-2938
CVE-2018-2940
CVE-2018-2952
CVE-2018-2973
CVE-2018-3136
CVE-2018-3139
CVE-2018-3149
CVE-2018-3169
CVE-2018-3180
CVE-2018-3214
CVE-2018-3620
CVE-2018-3639
CVE-2018-3646
CVE-2018-3646
CVE-2018-4191
CVE-2018-4197
CVE-2018-4207
CVE-2018-4208
CVE-2018-4209
CVE-2018-4210
CVE-2018-4212
CVE-2018-4213
CVE-2018-4261
CVE-2018-4262
CVE-2018-4263
CVE-2018-4264
CVE-2018-4265
CVE-2018-4266
CVE-2018-4267
CVE-2018-4270
CVE-2018-4272
CVE-2018-4273
CVE-2018-4278
CVE-2018-4284
CVE-2018-4299
CVE-2018-4306
CVE-2018-4309
CVE-2018-4312
CVE-2018-4314
CVE-2018-4315
CVE-2018-4316
CVE-2018-4317
CVE-2018-4318
CVE-2018-4319
CVE-2018-4323
CVE-2018-4328
CVE-2018-4345
CVE-2018-4358
CVE-2018-4359
CVE-2018-4361
CVE-2018-4372
CVE-2018-4373
CVE-2018-4375
CVE-2018-4376
CVE-2018-4378
CVE-2018-4382
CVE-2018-4386
CVE-2018-4392
CVE-2018-4416
CVE-2018-5332
CVE-2018-5333
CVE-2018-5390
CVE-2018-5391
CVE-2018-5814
CVE-2018-8781
CVE-2018-8897
CVE-2018-9385
CVE-2019-11365
CVE-2019-11366
CVE-2019-18197
CVE-2019-4732
CVE-2020-10745
CVE-2020-2583
CVE-2020-2593
CVE-2020-2604
CVE-2020-2659
CVE-2020-6819
CVE-2020-6820
SUSE-SU-2017:0392-1
SUSE-SU-2017:0860-1
SUSE-SU-2017:1313-1
SUSE-SU-2017:2936-1
SUSE-SU-2018:0416-1
SUSE-SU-2018:1262-1
SUSE-SU-2018:1516-1
SUSE-SU-2018:2416-1
SUSE-SU-2019:0049-1
SUSE-SU-2019:1091-1
SUSE-SU-2020:2312-1
Platform(s):openSUSE Leap 15.0
openSUSE Leap 15.1
SUSE Linux Enterprise Server 12 SP2
SUSE Linux Enterprise Server 12 SP2-BCL
SUSE Linux Enterprise Server 12 SP2-ESPOS
SUSE Linux Enterprise Server 12 SP2-LTSS
SUSE Linux Enterprise Server 12 SP3
SUSE Linux Enterprise Server 12 SP3-BCL
SUSE Linux Enterprise Server 12 SP3-ESPOS
SUSE Linux Enterprise Server 12 SP3-LTSS
SUSE Linux Enterprise Server 12 SP3-TERADATA
SUSE Linux Enterprise Server 12 SP4
SUSE OpenStack Cloud 8
SUSE OpenStack Cloud Crowbar 8
SUSE OpenStack Cloud Crowbar 9
Product(s):
Definition Synopsis
  • openSUSE Leap 15.0 is installed
  • AND Package Information
  • gdk-pixbuf-lang-2.36.11-lp150.3 is installed
  • OR gdk-pixbuf-query-loaders-2.36.11-lp150.3 is installed
  • OR gdk-pixbuf-thumbnailer-2.36.11-lp150.3 is installed
  • OR libgdk_pixbuf-2_0-0-2.36.11-lp150.3 is installed
  • OR typelib-1_0-GdkPixbuf-2_0-2.36.11-lp150.3 is installed
  • Definition Synopsis
  • openSUSE Leap 15.1 is installed
  • AND Package Information
  • ImageMagick-7.0.7.34-lp151.7.6 is installed
  • OR ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.6 is installed
  • OR ImageMagick-config-7-upstream-7.0.7.34-lp151.7.6 is installed
  • OR ImageMagick-devel-7.0.7.34-lp151.7.6 is installed
  • OR ImageMagick-devel-32bit-7.0.7.34-lp151.7.6 is installed
  • OR ImageMagick-doc-7.0.7.34-lp151.7.6 is installed
  • OR ImageMagick-extra-7.0.7.34-lp151.7.6 is installed
  • OR libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.6 is installed
  • OR libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.6 is installed
  • OR libMagick++-devel-7.0.7.34-lp151.7.6 is installed
  • OR libMagick++-devel-32bit-7.0.7.34-lp151.7.6 is installed
  • OR libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.6 is installed
  • OR libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.6 is installed
  • OR libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.6 is installed
  • OR libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.6 is installed
  • OR perl-PerlMagick-7.0.7.34-lp151.7.6 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP2 is installed
  • AND Package Information
  • qemu-2.6.2-41.22 is installed
  • OR qemu-arm-2.6.2-41.22 is installed
  • OR qemu-block-curl-2.6.2-41.22 is installed
  • OR qemu-block-rbd-2.6.2-41.22 is installed
  • OR qemu-block-ssh-2.6.2-41.22 is installed
  • OR qemu-guest-agent-2.6.2-41.22 is installed
  • OR qemu-ipxe-1.0.0-41.22 is installed
  • OR qemu-kvm-2.6.2-41.22 is installed
  • OR qemu-lang-2.6.2-41.22 is installed
  • OR qemu-ppc-2.6.2-41.22 is installed
  • OR qemu-s390-2.6.2-41.22 is installed
  • OR qemu-seabios-1.9.1-41.22 is installed
  • OR qemu-sgabios-8-41.22 is installed
  • OR qemu-tools-2.6.2-41.22 is installed
  • OR qemu-vgabios-1.9.1-41.22 is installed
  • OR qemu-x86-2.6.2-41.22 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP2-BCL is installed
  • AND atftp-0.7.0-160.8 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP2-ESPOS is installed
  • AND Package Information
  • kernel-default-4.4.121-92.92 is installed
  • OR kernel-default-base-4.4.121-92.92 is installed
  • OR kernel-default-devel-4.4.121-92.92 is installed
  • OR kernel-devel-4.4.121-92.92 is installed
  • OR kernel-macros-4.4.121-92.92 is installed
  • OR kernel-source-4.4.121-92.92 is installed
  • OR kernel-syms-4.4.121-92.92 is installed
  • OR kgraft-patch-4_4_121-92_92-default-1-3.7 is installed
  • OR kgraft-patch-SLE12-SP2_Update_24-1-3.7 is installed
  • OR lttng-modules-2.7.1-9.4 is installed
  • OR lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP2-LTSS is installed
  • AND Package Information
  • kgraft-patch-4_4_90-92_50-default-7-2 is installed
  • OR kgraft-patch-SLE12-SP2_Update_15-7-2 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP3 is installed
  • AND apache2-mod_nss-1.0.14-18 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP3-BCL is installed
  • AND Package Information
  • curl-7.37.0-37.43 is installed
  • OR libcurl4-7.37.0-37.43 is installed
  • OR libcurl4-32bit-7.37.0-37.43 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP3-ESPOS is installed
  • AND Package Information
  • java-1_8_0-ibm-1.8.0_sr6.15-30.72 is installed
  • OR java-1_8_0-ibm-alsa-1.8.0_sr6.15-30.72 is installed
  • OR java-1_8_0-ibm-devel-1.8.0_sr6.15-30.72 is installed
  • OR java-1_8_0-ibm-plugin-1.8.0_sr6.15-30.72 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP3-LTSS is installed
  • AND Package Information
  • kgraft-patch-4_4_162-94_69-default-6-2 is installed
  • OR kgraft-patch-SLE12-SP3_Update_21-6-2 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP3-TERADATA is installed
  • AND Package Information
  • python3-rpm-4.11.2-16.16 is installed
  • OR rpm-4.11.2-16.16 is installed
  • OR rpm-32bit-4.11.2-16.16 is installed
  • OR rpm-build-4.11.2-16.16 is installed
  • OR rpm-python-4.11.2-16.16 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP4 is installed
  • AND libgc1-7.2d-5 is installed
  • Definition Synopsis
  • SUSE OpenStack Cloud 8 is installed
  • AND Package Information
  • git-2.26.2-27.36 is installed
  • OR git-core-2.26.2-27.36 is installed
  • Definition Synopsis
  • SUSE OpenStack Cloud Crowbar 8 is installed
  • AND Package Information
  • java-1_7_1-ibm-1.7.1_sr4.65-38.53 is installed
  • OR java-1_7_1-ibm-alsa-1.7.1_sr4.65-38.53 is installed
  • OR java-1_7_1-ibm-devel-1.7.1_sr4.65-38.53 is installed
  • OR java-1_7_1-ibm-jdbc-1.7.1_sr4.65-38.53 is installed
  • OR java-1_7_1-ibm-plugin-1.7.1_sr4.65-38.53 is installed
  • Definition Synopsis
  • SUSE OpenStack Cloud Crowbar 9 is installed
  • AND haproxy-1.6.11-11.3 is installed
  • BACK