[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 1927-1] qemu security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Package        : qemu
Version        : 1:2.1+dfsg-12+deb8u12
CVE ID         : CVE-2016-5126 CVE-2016-5403 CVE-2017-9375 CVE-2019-12068 
                 CVE-2019-12155 CVE-2019-13164 CVE-2019-14378 CVE-2019-15890
Debian Bug     : 826151 832619 864219 929353 931351 933741 933742 939868 939869


Several vulnerabilities were found in QEMU, a fast processor emulator
(notably used in KVM and Xen HVM virtualization).

CVE-2016-5126

    Heap-based buffer overflow in the iscsi_aio_ioctl function in
    block/iscsi.c in QEMU allows local guest OS users to cause a
    denial of service (QEMU process crash) or possibly execute
    arbitrary code via a crafted iSCSI asynchronous I/O ioctl call.

CVE-2016-5403

    The virtqueue_pop function in hw/virtio/virtio.c in QEMU allows
    local guest OS administrators to cause a denial of service (memory
    consumption and QEMU process crash) by submitting requests without
    waiting for completion.

CVE-2017-9375

    QEMU, when built with USB xHCI controller emulator support, allows
    local guest OS privileged users to cause a denial of service
    (infinite recursive call) via vectors involving control transfer
    descriptors sequencing.

CVE-2019-12068

    QEMU scsi disk backend: lsi: exit infinite loop while executing
    script

CVE-2019-12155

    interface_release_resource in hw/display/qxl.c in QEMU has a NULL
    pointer dereference.

CVE-2019-13164

    qemu-bridge-helper.c in QEMU does not ensure that a network
    interface name (obtained from bridge.conf or a --br=bridge option)
    is limited to the IFNAMSIZ size, which can lead to an ACL bypass.

CVE-2019-14378

    ip_reass in ip_input.c in libslirp 4.0.0 has a heap-based buffer
    overflow via a large packet because it mishandles a case involving
    the first fragment.

CVE-2019-15890

    libslirp 4.0.0, as used in QEMU, has a use-after-free in ip_reass
    in ip_input.c.

For Debian 8 "Jessie", these problems have been fixed in version
1:2.1+dfsg-12+deb8u12.

We recommend that you upgrade your qemu packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----

iQEzBAEBCgAdFiEEQic8GuN/xDR88HkSj/HLbo2JBZ8FAl2EkSsACgkQj/HLbo2J
BZ8/AQf6AmErhOVKqKi+8HVX5GIdlfM25ZPGP1Qi6FDMTsHxqeWNJQZ8zceoZAnq
8/y+UTvpnHiwegB5rQCE5p7hf/dkVkVqqHMwSChdxtuBw9wZc6Wa9oPwwZFX84Hv
gC2q0rHIfBL1m9t0yO0OhWPwxd9ReizeLI6GmLGZNAlob7jKDPi4hzvDtZx4Pnwb
jYDNVihhepdYcVmTbIh9c9bSboHatsbLTySgltN8pTkW1zmCeBauqntwS8P5S1YO
9UqpIAbpfpnIiUwv/0mZSLJAd7100gyl2OcdhAe+y3/RK8jfc/6vCUhJE9a2gYBB
eamzL+01LkHnGrBssrvO2rXoR1tA+w==
=tnrb
-----END PGP SIGNATURE-----


Reply to: