ALT-BU-2021-3963-1
Branch c9f2 update bulletin.
Package kernel-image-std-def updated to version 5.10.42-alt0.c9f for branch c9f2 in task 273497.
Closed vulnerabilities
BDU:2021-02663
Уязвимость набора стандартов связи для коммуникации IEEE 802.11 операционной системы Windows, позволяющая нарушителю внедрить произвольные сетевые пакеты
BDU:2021-02665
Уязвимость реализации алгоритмов WPA и WPA2 драйвера 6.1316.1209 Wi-Fi адаптера ALFA, позволяющая нарушителю внедрить и расшифровать пакеты в сетях WPA или WPA2
BDU:2021-03088
Уязвимость реализации алгоритмов WPA, WPA2 и WPA3 набора стандартов связи для коммуникации IEEE 802.11, позволяющая нарушителю оказать воздействие на целостность защищаемой информации
BDU:2021-03095
Уязвимость реализации алгоритмов WEP, WPA, WPA2 и WPA3 набора стандартов связи для коммуникации IEEE 802.11, позволяющая нарушителю внедрить произвольные сетевые пакеты и/или оказать воздействие на целостность защищаемой информации
BDU:2021-03175
Уязвимость реализации алгоритмов WEP, WPA, WPA2 и WPA3 ядра операционной системы Linux, позволяющая нарушителю внедрить произвольные сетевые пакеты независимо от конфигурации сети
BDU:2021-03177
Уязвимость реализации алгоритмов WEP, WPA, WPA2 и WPA3 ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на целостность защищаемой информации
BDU:2021-04825
Уязвимость функции bpf_ringbuf_reserve() ядра операционной системы Linux , связанная с записью за границами буфера в памяти, позволяющая нарушителю выполнить произвольный код в контексте ядра
BDU:2021-04842
Уязвимость подсистемы eBPF ядра операционной системы Linux , связанная с чтением за границами буфера в памяти, позволяющая нарушителю выполнить произвольный код в контексте ядра
BDU:2021-04843
Уязвимость подсистемы io_uring ядра операционной системы Linux, связанная с записью за границами буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2021-04855
Уязвимость компонента net/sctp/socket.c ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии
BDU:2021-04856
Уязвимость сокетов nfc операционной системы Linux , связанная с использованием памяти после её освобождения, позволяющая нарушителю повысить свои привилегии
BDU:2022-04604
Уязвимость функции decode_nfs_fh() ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии и вызвать аварийное завершение системы
Modified: 2024-11-21
CVE-2020-24586
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.
- [oss-security] 20210511 various 802.11 security issues - fragattacks.com
- [oss-security] 20210511 various 802.11 security issues - fragattacks.com
- https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
- https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
- [debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update
- [debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update
- [debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update
- [debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update
- [debian-lts-announce] 20230401 [SECURITY] [DLA 3380-1] firmware-nonfree LTS new upstream version (security updates and newer firmware for Linux 5.10)
- [debian-lts-announce] 20230401 [SECURITY] [DLA 3380-1] firmware-nonfree LTS new upstream version (security updates and newer firmware for Linux 5.10)
- 20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021
- 20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021
- https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63
- https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63
- https://www.fragattacks.com
- https://www.fragattacks.com
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html
Modified: 2024-11-21
CVE-2020-24587
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.
- [oss-security] 20210511 various 802.11 security issues - fragattacks.com
- [oss-security] 20210511 various 802.11 security issues - fragattacks.com
- https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
- https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
- [debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update
- [debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update
- [debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update
- [debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update
- [debian-lts-announce] 20230401 [SECURITY] [DLA 3380-1] firmware-nonfree LTS new upstream version (security updates and newer firmware for Linux 5.10)
- [debian-lts-announce] 20230401 [SECURITY] [DLA 3380-1] firmware-nonfree LTS new upstream version (security updates and newer firmware for Linux 5.10)
- 20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021
- 20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021
- https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63
- https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63
- https://www.fragattacks.com
- https://www.fragattacks.com
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html
Modified: 2024-11-21
CVE-2020-24588
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.
- [oss-security] 20210511 various 802.11 security issues - fragattacks.com
- [oss-security] 20210511 various 802.11 security issues - fragattacks.com
- https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf
- https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
- https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
- [debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update
- [debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update
- [debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update
- [debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update
- [debian-lts-announce] 20230401 [SECURITY] [DLA 3380-1] firmware-nonfree LTS new upstream version (security updates and newer firmware for Linux 5.10)
- [debian-lts-announce] 20230401 [SECURITY] [DLA 3380-1] firmware-nonfree LTS new upstream version (security updates and newer firmware for Linux 5.10)
- 20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021
- 20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021
- https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63
- https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63
- https://www.fragattacks.com
- https://www.fragattacks.com
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html
Modified: 2024-11-21
CVE-2020-26141
An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.
- [oss-security] 20210511 various 802.11 security issues - fragattacks.com
- [oss-security] 20210511 various 802.11 security issues - fragattacks.com
- https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf
- https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
- https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
- 20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021
- 20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021
- https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63
- https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63
- https://www.fragattacks.com
- https://www.fragattacks.com
Modified: 2024-11-21
CVE-2020-26145
An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.
- [oss-security] 20210511 various 802.11 security issues - fragattacks.com
- [oss-security] 20210511 various 802.11 security issues - fragattacks.com
- https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf
- https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
- https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
- https://www.fragattacks.com
- https://www.fragattacks.com
Modified: 2024-11-21
CVE-2020-26147
An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.
- [oss-security] 20210511 various 802.11 security issues - fragattacks.com
- [oss-security] 20210511 various 802.11 security issues - fragattacks.com
- https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf
- https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
- https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
- [debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update
- [debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update
- [debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update
- [debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update
- 20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021
- 20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021
- https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63
- https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63
- https://www.fragattacks.com
- https://www.fragattacks.com
Modified: 2024-11-21
CVE-2021-23133
A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)->sctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.
- [oss-security] 20210510 Re: CVE-2021-23133: Linux kernel: race condition in sctp sockets
- [oss-security] 20210510 Re: CVE-2021-23133: Linux kernel: race condition in sctp sockets
- [oss-security] 20210510 Re: CVE-2021-23133: Linux kernel: race condition in sctp sockets
- [oss-security] 20210510 Re: CVE-2021-23133: Linux kernel: race condition in sctp sockets
- [oss-security] 20210510 Re: CVE-2021-23133: Linux kernel: race condition in sctp sockets
- [oss-security] 20210510 Re: CVE-2021-23133: Linux kernel: race condition in sctp sockets
- [oss-security] 20210510 Re: CVE-2021-23133: Linux kernel: race condition in sctp sockets
- [oss-security] 20210510 Re: CVE-2021-23133: Linux kernel: race condition in sctp sockets
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b166a20b07382b8bc1dcee2a448715c9c2c81b5b
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b166a20b07382b8bc1dcee2a448715c9c2c81b5b
- [debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update
- [debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update
- [debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update
- [debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update
- FEDORA-2021-e6b4847979
- FEDORA-2021-e6b4847979
- FEDORA-2021-8cd093f639
- FEDORA-2021-8cd093f639
- FEDORA-2021-a963f04012
- FEDORA-2021-a963f04012
- https://security.netapp.com/advisory/ntap-20210611-0008/
- https://security.netapp.com/advisory/ntap-20210611-0008/
- https://www.openwall.com/lists/oss-security/2021/04/18/2
- https://www.openwall.com/lists/oss-security/2021/04/18/2
Modified: 2024-11-21
CVE-2021-23134
Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.
- https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=c61760e6940d
- https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=c61760e6940d
- [debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update
- [debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update
- [debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update
- [debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update
- FEDORA-2021-286375de1e
- FEDORA-2021-286375de1e
- FEDORA-2021-05152dbcf5
- FEDORA-2021-05152dbcf5
- https://security.netapp.com/advisory/ntap-20210625-0007/
- https://security.netapp.com/advisory/ntap-20210625-0007/
- https://www.openwall.com/lists/oss-security/2021/05/11/4
- https://www.openwall.com/lists/oss-security/2021/05/11/4
Modified: 2024-11-21
CVE-2021-3489
The eBPF RINGBUF bpf_ringbuf_reserve() function in the Linux kernel did not check that the allocated size was smaller than the ringbuf size, allowing an attacker to perform out-of-bounds writes within the kernel and therefore, arbitrary code execution. This issue was fixed via commit 4b81ccebaeee ("bpf, ringbuf: Deny reserve of buffers larger than ringbuf") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced via 457f44363a88 ("bpf: Implement BPF ring buffer and verifier support for it") (v5.8-rc1).
- https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=4b81ccebaeee885ab1aa1438133f2991e3a2b6ea
- https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=4b81ccebaeee885ab1aa1438133f2991e3a2b6ea
- https://security.netapp.com/advisory/ntap-20210716-0004/
- https://security.netapp.com/advisory/ntap-20210716-0004/
- https://ubuntu.com/security/notices/USN-4949-1
- https://ubuntu.com/security/notices/USN-4949-1
- https://ubuntu.com/security/notices/USN-4950-1
- https://ubuntu.com/security/notices/USN-4950-1
- [oss-security] CVE-2021-3489 - Linux kernel eBPF RINGBUF map oversized allocation
- [oss-security] CVE-2021-3489 - Linux kernel eBPF RINGBUF map oversized allocation
- https://www.zerodayinitiative.com/advisories/ZDI-21-590/
- https://www.zerodayinitiative.com/advisories/ZDI-21-590/
Modified: 2024-11-21
CVE-2021-3490
The eBPF ALU32 bounds tracking for bitwise ops (AND, OR and XOR) in the Linux kernel did not properly update 32-bit bounds, which could be turned into out of bounds reads and writes in the Linux kernel and therefore, arbitrary code execution. This issue was fixed via commit 049c4e13714e ("bpf: Fix alu32 const subreg bound tracking on bitwise operations") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. The AND/OR issues were introduced by commit 3f50f132d840 ("bpf: Verifier, do explicit ALU32 bounds tracking") (5.7-rc1) and the XOR variant was introduced by 2921c90d4718 ("bpf:Fix a verifier failure with xor") ( 5.10-rc1).
- http://packetstormsecurity.com/files/164015/Linux-eBPF-ALU32-32-bit-Invalid-Bounds-Tracking-Local-Privilege-Escalation.html
- http://packetstormsecurity.com/files/164015/Linux-eBPF-ALU32-32-bit-Invalid-Bounds-Tracking-Local-Privilege-Escalation.html
- https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=049c4e13714ecbca567b4d5f6d563f05d431c80e
- https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=049c4e13714ecbca567b4d5f6d563f05d431c80e
- https://security.netapp.com/advisory/ntap-20210716-0004/
- https://security.netapp.com/advisory/ntap-20210716-0004/
- https://ubuntu.com/security/notices/USN-4949-1
- https://ubuntu.com/security/notices/USN-4949-1
- https://ubuntu.com/security/notices/USN-4950-1
- https://ubuntu.com/security/notices/USN-4950-1
- [oss-security] CVE-2021-3490 - Linux kernel eBPF bitwise ops ALU32 bounds tracking
- [oss-security] CVE-2021-3490 - Linux kernel eBPF bitwise ops ALU32 bounds tracking
- https://www.zerodayinitiative.com/advisories/ZDI-21-606/
- https://www.zerodayinitiative.com/advisories/ZDI-21-606/
Modified: 2024-11-21
CVE-2021-3491
The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d1f82808877bb10d3deee7cf3374a4eb3fb582db
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d1f82808877bb10d3deee7cf3374a4eb3fb582db
- https://security.netapp.com/advisory/ntap-20210716-0004/
- https://security.netapp.com/advisory/ntap-20210716-0004/
- https://ubuntu.com/security/notices/USN-4949-1
- https://ubuntu.com/security/notices/USN-4949-1
- https://ubuntu.com/security/notices/USN-4950-1
- https://ubuntu.com/security/notices/USN-4950-1
- [oss-security] CVE-2021-3491 - Linux kernel io_uring PROVIDE_BUFFERS MAX_RW_COUNT bypass
- [oss-security] CVE-2021-3491 - Linux kernel io_uring PROVIDE_BUFFERS MAX_RW_COUNT bypass
- https://www.zerodayinitiative.com/advisories/ZDI-21-589/
- https://www.zerodayinitiative.com/advisories/ZDI-21-589/
Modified: 2024-11-21
CVE-2021-4157
An out of memory bounds write flaw (1 or 2 bytes of memory) in the Linux kernel NFS subsystem was found in the way users use mirroring (replication of files with NFS). A user, having access to the NFS mount, could potentially use this flaw to crash the system or escalate privileges on the system.
- https://bugzilla.redhat.com/show_bug.cgi?id=2034342
- https://bugzilla.redhat.com/show_bug.cgi?id=2034342
- https://lore.kernel.org/lkml/20210517140244.822185482%40linuxfoundation.org/
- https://lore.kernel.org/lkml/20210517140244.822185482%40linuxfoundation.org/
- https://security.netapp.com/advisory/ntap-20220602-0007/
- https://security.netapp.com/advisory/ntap-20220602-0007/
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
Closed vulnerabilities
BDU:2021-03500
Уязвимость процесса декодирования изображений QUIC системы рендеринга удаленного виртуального рабочего стола SPICE, связанная с копированием буфера без проверки размера входных данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2022-05884
Уязвимость системы рендеринга удаленного виртуального рабочего стола SPICE, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-14355
Multiple buffer overflow vulnerabilities were found in the QUIC image decoding process of the SPICE remote display system, before spice-0.14.2-1. Both the SPICE client (spice-gtk) and server are affected by these flaws. These flaws allow a malicious client or server to send specially crafted messages that, when processed by the QUIC image compression algorithm, result in a process crash or potential code execution.
- openSUSE-SU-2020:1803
- openSUSE-SU-2020:1803
- openSUSE-SU-2020:1802
- openSUSE-SU-2020:1802
- https://bugzilla.redhat.com/show_bug.cgi?id=1868435
- https://bugzilla.redhat.com/show_bug.cgi?id=1868435
- [debian-lts-announce] 20201101 [SECURITY] [DLA 2427-1] spice security update
- [debian-lts-announce] 20201101 [SECURITY] [DLA 2427-1] spice security update
- [debian-lts-announce] 20201101 [SECURITY] [DLA 2428-1] spice-gtk security update
- [debian-lts-announce] 20201101 [SECURITY] [DLA 2428-1] spice-gtk security update
- USN-4572-1
- USN-4572-1
- USN-4572-2
- USN-4572-2
- DSA-4771
- DSA-4771
- https://www.openwall.com/lists/oss-security/2020/10/06/10
- https://www.openwall.com/lists/oss-security/2020/10/06/10
Modified: 2024-11-21
CVE-2021-20201
A flaw was found in spice in versions before 0.14.92. A DoS tool might make it easier for remote attackers to cause a denial of service (CPU consumption) by performing many renegotiations within a single connection.
- https://blog.qualys.com/product-tech/2011/10/31/tls-renegotiation-and-denial-of-service-attacks
- https://blog.qualys.com/product-tech/2011/10/31/tls-renegotiation-and-denial-of-service-attacks
- https://bugzilla.redhat.com/show_bug.cgi?id=1921846
- https://bugzilla.redhat.com/show_bug.cgi?id=1921846
- GLSA-202208-10
- GLSA-202208-10
Closed vulnerabilities
BDU:2020-05805
Уязвимость функции xgmac_enet_send из hw/net/xgmac.c эмулятора аппаратного обеспечения QEMU, связанная с недостатком механизма проверки размера копируемых данных, позволяющая нарушителю получить доступ к защищаемой информации, нарушить её целостность, а также вызвать отказ в обслуживании
BDU:2020-05894
Уязвимость эмулятора аппаратного обеспечения QEMU, связанная с разыменовыванием нулевого указателя, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-05895
Уязвимость эмулятора аппаратного обеспечения QEMU, связанная с разыменовыванием нулевого указателя, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-00070
Уязвимость программного обеспечения для эмуляции аппаратного обеспечения QEMU, связанная с выходом операции за допустимые границы буфера данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-00072
Уязвимость множества функцийи из hw/usb/core.c эмулятора аппаратного обеспечения QEMU, связанная с выходом операции за допустимые границы буфера данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-00073
Уязвимость функции net_tx_pkt_add_raw_fragment из hw/net/net_tx_pkt.c эмулятора аппаратного обеспечения QEMU, связанная с недостатком использования функции assert(), позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-01265
Уязвимость функции ati_2d_blt (hw/display/ati_2d.c) эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживаниии
BDU:2021-01351
Уязвимость функции ati_mm_read из hw/display/ati.c эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-02091
Уязвимость процедуры sdhci_sdma_transfer_multi_blocks() эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании или аварийное завершение работы приложения, а так же выполнить произвольный код
BDU:2021-03539
Уязвимость программного обеспечения для эмуляции аппаратного обеспечения QEMU, связанная с записью за границами буфера, позволяющая нарушителю нарушить целостность данных, а также вызвать отказ в обслуживании
BDU:2021-03540
Уязвимость программного обеспечения для эмуляции аппаратного обеспечения QEMU, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-05135
Уязвимость функции sm501_2d_operation из sm501.c эмулятора аппаратного обеспечения QEMU, связанная с целочисленным переполнением значения, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2021-05169
Уязвимость компонента oss_write эмулятора аппаратного обеспечения QEMU, связанная с отсутствием проверки деления на ноль, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-05172
Уязвимость сервера Network Block Device(NBD) эмулятора аппаратного обеспечения QEMU, связанная с неправильным учетом ресурсов внешних эмуляторов, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-05173
Уязвимость эмулятора аппаратного обеспечения QEMU, связанная с отсутствием необходимого этапа шифрования, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2021-05199
Уязвимость компонента hw/display/ati_2d.с эмулятора аппаратного обеспечения QEMU, связанная с неверными вычислениями, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-05200
Уязвимость функции eth_get_gso_type компонента net/eth.c эмулятора аппаратного обеспечения QEMU, связанная с неправильным учетом ресурсов внешних эмуляторов, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-05207
Уязвимость компонента sd_wp_addr программы для эмуляции аппаратного обеспечения других платформ QEMU, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-05257
Уязвимость эмуляции USB EHCI эмулятора аппаратного обеспечения QEMU, связанная с неправильным учетом ресурсов внешних эмуляторов, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-05312
Уязвимость API эмулятора аппаратного обеспечения QEMU, связанная с записью за границами буфера, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-05834
Уязвимость функции dwc2_handle_packet компонента hw/usb/hcd-dwc2.c эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-10702
A flaw was found in QEMU in the implementation of the Pointer Authentication (PAuth) support for ARM introduced in version 4.0 and fixed in version 5.0.0. A general failure of the signature generation process caused every PAuth-enforced pointer to be signed with the same signature. A local attacker could obtain the signature of a protected pointer and abuse this flaw to bypass PAuth protection for all programs running on QEMU.
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10702
- https://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=de0b1bae6461f67243282555475f88b2384a1eb9
- https://security.netapp.com/advisory/ntap-20200724-0007/
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10702
- https://security.netapp.com/advisory/ntap-20200724-0007/
- https://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=de0b1bae6461f67243282555475f88b2384a1eb9
Modified: 2024-11-21
CVE-2020-10761
An assertion failure issue was found in the Network Block Device(NBD) Server in all QEMU versions before QEMU 5.0.1. This flaw occurs when an nbd-client sends a spec-compliant request that is near the boundary of maximum permitted request length. A remote nbd-client could use this flaw to crash the qemu-nbd server resulting in a denial of service.
- openSUSE-SU-2020:1108
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10761
- GLSA-202011-09
- https://security.netapp.com/advisory/ntap-20200731-0001/
- USN-4467-1
- https://www.openwall.com/lists/oss-security/2020/06/09/1
- openSUSE-SU-2020:1108
- https://www.openwall.com/lists/oss-security/2020/06/09/1
- USN-4467-1
- https://security.netapp.com/advisory/ntap-20200731-0001/
- GLSA-202011-09
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10761
Modified: 2024-11-21
CVE-2020-12829
In QEMU through 5.0.0, an integer overflow was found in the SM501 display driver implementation. This flaw occurs in the COPY_AREA macro while handling MMIO write operations through the sm501_2d_engine_write() callback. A local attacker could abuse this flaw to crash the QEMU process in sm501_2d_operation() in hw/display/sm501.c on the host, resulting in a denial of service.
Modified: 2024-11-21
CVE-2020-13253
sd_wp_addr in hw/sd/sd.c in QEMU 4.2.0 uses an unvalidated address, which leads to an out-of-bounds read during sdhci_write() operations. A guest OS user can crash the QEMU process.
- http://www.openwall.com/lists/oss-security/2020/05/27/2
- https://bugzilla.redhat.com/show_bug.cgi?id=1838546
- [debian-lts-announce] 20200913 [SECURITY] [DLA 2373-1] qemu security update
- [debian-lts-announce] 20220905 [SECURITY] [DLA 3099-1] qemu security update
- https://lists.gnu.org/archive/html/qemu-devel/2020-05/msg05835.html
- GLSA-202011-09
- USN-4467-1
- http://www.openwall.com/lists/oss-security/2020/05/27/2
- USN-4467-1
- GLSA-202011-09
- https://lists.gnu.org/archive/html/qemu-devel/2020-05/msg05835.html
- [debian-lts-announce] 20220905 [SECURITY] [DLA 3099-1] qemu security update
- [debian-lts-announce] 20200913 [SECURITY] [DLA 2373-1] qemu security update
- https://bugzilla.redhat.com/show_bug.cgi?id=1838546
Modified: 2024-11-21
CVE-2020-13361
In QEMU 5.0.0 and earlier, es1370_transfer_audio in hw/audio/es1370.c does not properly validate the frame count, which allows guest OS users to trigger an out-of-bounds access during an es1370_write() operation.
- openSUSE-SU-2020:1108
- http://www.openwall.com/lists/oss-security/2020/05/28/1
- [debian-lts-announce] 20200629 [SECURITY] [DLA 2262-1] qemu security update
- [debian-lts-announce] 20200726 [SECURITY] [DLA 2288-1] qemu security update
- https://lists.gnu.org/archive/html/qemu-devel/2020-05/msg03983.html
- GLSA-202011-09
- https://security.netapp.com/advisory/ntap-20200608-0003/
- https://security-tracker.debian.org/tracker/CVE-2020-13361
- USN-4467-1
- DSA-4728
- openSUSE-SU-2020:1108
- DSA-4728
- USN-4467-1
- https://security-tracker.debian.org/tracker/CVE-2020-13361
- https://security.netapp.com/advisory/ntap-20200608-0003/
- GLSA-202011-09
- https://lists.gnu.org/archive/html/qemu-devel/2020-05/msg03983.html
- [debian-lts-announce] 20200726 [SECURITY] [DLA 2288-1] qemu security update
- [debian-lts-announce] 20200629 [SECURITY] [DLA 2262-1] qemu security update
- http://www.openwall.com/lists/oss-security/2020/05/28/1
Modified: 2024-11-21
CVE-2020-13362
In QEMU 5.0.0 and earlier, megasas_lookup_frame in hw/scsi/megasas.c has an out-of-bounds read via a crafted reply_queue_head field from a guest OS user.
- openSUSE-SU-2020:1108
- http://www.openwall.com/lists/oss-security/2020/05/28/2
- [debian-lts-announce] 20200629 [SECURITY] [DLA 2262-1] qemu security update
- [debian-lts-announce] 20200726 [SECURITY] [DLA 2288-1] qemu security update
- https://lists.gnu.org/archive/html/qemu-devel/2020-05/msg03131.html
- https://lists.gnu.org/archive/html/qemu-devel/2020-05/msg06250.html
- GLSA-202011-09
- https://security.netapp.com/advisory/ntap-20200608-0003/
- https://security-tracker.debian.org/tracker/CVE-2020-13362
- USN-4467-1
- DSA-4728
- openSUSE-SU-2020:1108
- DSA-4728
- USN-4467-1
- https://security-tracker.debian.org/tracker/CVE-2020-13362
- https://security.netapp.com/advisory/ntap-20200608-0003/
- GLSA-202011-09
- https://lists.gnu.org/archive/html/qemu-devel/2020-05/msg06250.html
- https://lists.gnu.org/archive/html/qemu-devel/2020-05/msg03131.html
- [debian-lts-announce] 20200726 [SECURITY] [DLA 2288-1] qemu security update
- [debian-lts-announce] 20200629 [SECURITY] [DLA 2262-1] qemu security update
- http://www.openwall.com/lists/oss-security/2020/05/28/2
Modified: 2024-11-21
CVE-2020-13754
hw/pci/msix.c in QEMU 4.2.0 allows guest OS users to trigger an out-of-bounds access via a crafted address in an msi-x mmio operation.
- http://www.openwall.com/lists/oss-security/2020/06/01/6
- [oss-security] 20200615 Re: CVE-2020-13754 QEMU: msix: OOB access during mmio operations may lead to DoS
- [debian-lts-announce] 20200726 [SECURITY] [DLA 2288-1] qemu security update
- https://lists.gnu.org/archive/html/qemu-devel/2020-06/msg00004.html
- GLSA-202011-09
- https://security.netapp.com/advisory/ntap-20200608-0007/
- USN-4467-1
- DSA-4728
- http://www.openwall.com/lists/oss-security/2020/06/01/6
- DSA-4728
- USN-4467-1
- https://security.netapp.com/advisory/ntap-20200608-0007/
- GLSA-202011-09
- https://lists.gnu.org/archive/html/qemu-devel/2020-06/msg00004.html
- [debian-lts-announce] 20200726 [SECURITY] [DLA 2288-1] qemu security update
- [oss-security] 20200615 Re: CVE-2020-13754 QEMU: msix: OOB access during mmio operations may lead to DoS
Modified: 2024-11-21
CVE-2020-13791
hw/pci/pci.c in QEMU 4.2.0 allows guest OS users to trigger an out-of-bounds access by providing an address near the end of the PCI configuration space.
- https://lists.gnu.org/archive/html/qemu-devel/2020-06/msg00706.html
- GLSA-202011-09
- https://security.netapp.com/advisory/ntap-20200717-0001/
- https://www.openwall.com/lists/oss-security/2020/06/04/1
- https://lists.gnu.org/archive/html/qemu-devel/2020-06/msg00706.html
- https://www.openwall.com/lists/oss-security/2020/06/04/1
- https://security.netapp.com/advisory/ntap-20200717-0001/
- GLSA-202011-09
Modified: 2024-11-21
CVE-2020-14364
An out-of-bounds read/write access flaw was found in the USB emulator of the QEMU in versions before 5.2.0. This issue occurs while processing USB packets from a guest when USBDevice 'setup_len' exceeds its 'data_buf[4096]' in the do_token_in, do_token_out routines. This flaw allows a guest user to crash the QEMU process, resulting in a denial of service, or the potential execution of arbitrary code with the privileges of the QEMU process on the host.
- openSUSE-SU-2020:1664
- openSUSE-SU-2020:1664
- https://bugzilla.redhat.com/show_bug.cgi?id=1869201
- https://bugzilla.redhat.com/show_bug.cgi?id=1869201
- [debian-lts-announce] 20200913 [SECURITY] [DLA 2373-1] qemu security update
- [debian-lts-announce] 20200913 [SECURITY] [DLA 2373-1] qemu security update
- FEDORA-2020-3689b67b53
- FEDORA-2020-3689b67b53
- FEDORA-2020-eeb29955ed
- FEDORA-2020-eeb29955ed
- GLSA-202009-14
- GLSA-202009-14
- GLSA-202011-09
- GLSA-202011-09
- https://security.netapp.com/advisory/ntap-20200924-0006/
- https://security.netapp.com/advisory/ntap-20200924-0006/
- USN-4511-1
- USN-4511-1
- DSA-4760
- DSA-4760
- https://www.openwall.com/lists/oss-security/2020/08/24/2
- https://www.openwall.com/lists/oss-security/2020/08/24/2
- https://www.openwall.com/lists/oss-security/2020/08/24/3
- https://www.openwall.com/lists/oss-security/2020/08/24/3
Modified: 2024-11-21
CVE-2020-14415
oss_write in audio/ossaudio.c in QEMU before 5.0.0 mishandles a buffer position.
Modified: 2024-11-21
CVE-2020-15469
In QEMU 4.2.0, a MemoryRegionOps object may lack read/write callback methods, leading to a NULL pointer dereference.
- http://www.openwall.com/lists/oss-security/2020/07/02/1
- http://www.openwall.com/lists/oss-security/2020/07/02/1
- [debian-lts-announce] 20210218 [SECURITY] [DLA 2560-1] qemu security update
- [debian-lts-announce] 20210218 [SECURITY] [DLA 2560-1] qemu security update
- [debian-lts-announce] 20220905 [SECURITY] [DLA 3099-1] qemu security update
- [debian-lts-announce] 20220905 [SECURITY] [DLA 3099-1] qemu security update
- https://lists.gnu.org/archive/html/qemu-devel/2020-06/msg09961.html
- https://lists.gnu.org/archive/html/qemu-devel/2020-06/msg09961.html
Modified: 2024-11-21
CVE-2020-15863
hw/net/xgmac.c in the XGMAC Ethernet controller in QEMU before 07-20-2020 has a buffer overflow. This occurs during packet transmission and affects the highbank and midway emulated machines. A guest user or process could use this flaw to crash the QEMU process on the host, resulting in a denial of service or potential privileged code execution. This was fixed in commit 5519724a13664b43e225ca05351c60b4468e4555.
- openSUSE-SU-2020:1664
- openSUSE-SU-2020:1664
- http://www.openwall.com/lists/oss-security/2020/07/22/1
- http://www.openwall.com/lists/oss-security/2020/07/22/1
- https://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=5519724a13664b43e225ca05351c60b4468e4555
- https://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=5519724a13664b43e225ca05351c60b4468e4555
- https://lists.nongnu.org/archive/html/qemu-devel/2020-07/msg03497.html
- https://lists.nongnu.org/archive/html/qemu-devel/2020-07/msg03497.html
- https://lists.nongnu.org/archive/html/qemu-devel/2020-07/msg05745.html
- https://lists.nongnu.org/archive/html/qemu-devel/2020-07/msg05745.html
- GLSA-202208-27
- GLSA-202208-27
- USN-4467-1
- USN-4467-1
- DSA-4760
- DSA-4760
Modified: 2024-11-21
CVE-2020-16092
In QEMU through 5.0.0, an assertion failure can occur in the network packet processing. This issue affects the e1000e and vmxnet3 network devices. A malicious guest user/process could use this flaw to abort the QEMU process on the host, resulting in a denial of service condition in net_tx_pkt_add_raw_fragment in hw/net/net_tx_pkt.c.
- openSUSE-SU-2020:1664
- openSUSE-SU-2020:1664
- http://www.openwall.com/lists/oss-security/2020/08/10/1
- http://www.openwall.com/lists/oss-security/2020/08/10/1
- [debian-lts-announce] 20200913 [SECURITY] [DLA 2373-1] qemu security update
- [debian-lts-announce] 20200913 [SECURITY] [DLA 2373-1] qemu security update
- https://lists.nongnu.org/archive/html/qemu-devel/2020-07/msg07563.html
- https://lists.nongnu.org/archive/html/qemu-devel/2020-07/msg07563.html
- GLSA-202208-27
- GLSA-202208-27
- https://security.netapp.com/advisory/ntap-20200821-0006/
- https://security.netapp.com/advisory/ntap-20200821-0006/
- USN-4467-1
- USN-4467-1
- DSA-4760
- DSA-4760
Modified: 2024-11-21
CVE-2020-17380
A heap-based buffer overflow was found in QEMU through 5.0.0 in the SDHCI device emulation support. It could occur while doing a multi block SDMA transfer via the sdhci_sdma_transfer_multi_blocks() routine in hw/sd/sdhci.c. A guest user or process could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition, or potentially execute arbitrary code with privileges of the QEMU process on the host.
- [oss-security] 20210309 CVE-2021-3409 QEMU: sdhci: incomplete fix for CVE-2020-17380/CVE-2020-25085
- [oss-security] 20210309 CVE-2021-3409 QEMU: sdhci: incomplete fix for CVE-2020-17380/CVE-2020-25085
- https://bugzilla.redhat.com/show_bug.cgi?id=1862167
- https://bugzilla.redhat.com/show_bug.cgi?id=1862167
- [debian-lts-announce] 20210410 [SECURITY] [DLA 2623-1] qemu security update
- [debian-lts-announce] 20210410 [SECURITY] [DLA 2623-1] qemu security update
- https://lists.nongnu.org/archive/html/qemu-devel/2020-09/msg01175.html
- https://lists.nongnu.org/archive/html/qemu-devel/2020-09/msg01175.html
- https://security.netapp.com/advisory/ntap-20210312-0003/
- https://security.netapp.com/advisory/ntap-20210312-0003/
Modified: 2024-11-21
CVE-2020-24352
An issue was discovered in QEMU through 5.1.0. An out-of-bounds memory access was found in the ATI VGA device implementation. This flaw occurs in the ati_2d_blt() routine in hw/display/ati_2d.c while handling MMIO write operations through the ati_mm_write() callback. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service.
Modified: 2024-11-21
CVE-2020-25723
A reachable assertion issue was found in the USB EHCI emulation code of QEMU. It could occur while processing USB requests due to missing handling of DMA memory map failure. A malicious privileged user within the guest may abuse this flaw to send bogus USB requests and crash the QEMU process on the host, resulting in a denial of service.
- [oss-security] 20201222 CVE-2020-25723 QEMU: assertion failure through usb_packet_unmap() in hw/usb/hcd-ehci.c
- [oss-security] 20201222 CVE-2020-25723 QEMU: assertion failure through usb_packet_unmap() in hw/usb/hcd-ehci.c
- https://bugzilla.redhat.com/show_bug.cgi?id=1898579
- https://bugzilla.redhat.com/show_bug.cgi?id=1898579
- [debian-lts-announce] 20220905 [SECURITY] [DLA 3099-1] qemu security update
- [debian-lts-announce] 20220905 [SECURITY] [DLA 3099-1] qemu security update
- https://security.netapp.com/advisory/ntap-20201218-0004/
- https://security.netapp.com/advisory/ntap-20201218-0004/
Modified: 2024-11-21
CVE-2020-25742
pci_change_irq_level in hw/pci/pci.c in QEMU before 5.1.1 has a NULL pointer dereference because pci_get_bus() might not return a valid pointer.
- http://www.openwall.com/lists/oss-security/2020/09/29/1
- http://www.openwall.com/lists/oss-security/2020/09/29/1
- https://bugzilla.redhat.com/show_bug.cgi?id=1883178
- https://bugzilla.redhat.com/show_bug.cgi?id=1883178
- https://lists.nongnu.org/archive/html/qemu-devel/2020-09/msg05294.html
- https://lists.nongnu.org/archive/html/qemu-devel/2020-09/msg05294.html
- https://ruhr-uni-bochum.sciebo.de/s/NNWP2GfwzYKeKwE?path=%2Flsi_nullptr1
- https://ruhr-uni-bochum.sciebo.de/s/NNWP2GfwzYKeKwE?path=%2Flsi_nullptr1
Modified: 2024-11-21
CVE-2020-25743
hw/ide/pci.c in QEMU before 5.1.1 can trigger a NULL pointer dereference because it lacks a pointer check before an ide_cancel_dma_sync call.
- http://www.openwall.com/lists/oss-security/2020/09/29/1
- http://www.openwall.com/lists/oss-security/2020/09/29/1
- https://bugzilla.redhat.com/show_bug.cgi?id=1881409
- https://bugzilla.redhat.com/show_bug.cgi?id=1881409
- https://lists.nongnu.org/archive/html/qemu-devel/2020-09/msg05967.html
- https://lists.nongnu.org/archive/html/qemu-devel/2020-09/msg05967.html
- https://ruhr-uni-bochum.sciebo.de/s/NNWP2GfwzYKeKwE?path=%2Fide_nullptr1b
- https://ruhr-uni-bochum.sciebo.de/s/NNWP2GfwzYKeKwE?path=%2Fide_nullptr1b
Modified: 2024-11-21
CVE-2020-27616
ati_2d_blt in hw/display/ati_2d.c in QEMU 4.2.1 can encounter an outside-limits situation in a calculation. A guest can crash the QEMU process.
- http://www.openwall.com/lists/oss-security/2020/11/03/2
- http://www.openwall.com/lists/oss-security/2020/11/03/2
- https://lists.nongnu.org/archive/html/qemu-devel/2020-10/msg05018.html
- https://lists.nongnu.org/archive/html/qemu-devel/2020-10/msg05018.html
- https://security.netapp.com/advisory/ntap-20201202-0002/
- https://security.netapp.com/advisory/ntap-20201202-0002/
Modified: 2024-11-21
CVE-2020-27617
eth_get_gso_type in net/eth.c in QEMU 4.2.1 allows guest OS users to trigger an assertion failure. A guest can crash the QEMU process via packet data that lacks a valid Layer 3 protocol.
- http://www.openwall.com/lists/oss-security/2020/11/02/1
- http://www.openwall.com/lists/oss-security/2020/11/02/1
- [debian-lts-announce] 20201129 [SECURITY] [DLA 2469-1] qemu security update
- [debian-lts-announce] 20201129 [SECURITY] [DLA 2469-1] qemu security update
- [debian-lts-announce] 20220905 [SECURITY] [DLA 3099-1] qemu security update
- [debian-lts-announce] 20220905 [SECURITY] [DLA 3099-1] qemu security update
- https://lists.nongnu.org/archive/html/qemu-devel/2020-10/msg05731.html
- https://lists.nongnu.org/archive/html/qemu-devel/2020-10/msg05731.html
- https://security.netapp.com/advisory/ntap-20201202-0002/
- https://security.netapp.com/advisory/ntap-20201202-0002/
Modified: 2024-11-21
CVE-2020-27661
A divide-by-zero issue was found in dwc2_handle_packet in hw/usb/hcd-dwc2.c in the hcd-dwc2 USB host controller emulation of QEMU. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service.
- https://bugzilla.redhat.com/show_bug.cgi?id=1890653
- https://bugzilla.redhat.com/show_bug.cgi?id=1890653
- https://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=bea2a9e3e00b275dc40cfa09c760c715b8753e03
- https://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=bea2a9e3e00b275dc40cfa09c760c715b8753e03
- https://lists.nongnu.org/archive/html/qemu-devel/2020-10/msg04263.html
- https://lists.nongnu.org/archive/html/qemu-devel/2020-10/msg04263.html
- https://security.netapp.com/advisory/ntap-20210720-0010/
- https://security.netapp.com/advisory/ntap-20210720-0010/
- https://www.mail-archive.com/debian-bugs-dist%40lists.debian.org/msg1770368.html
- https://www.mail-archive.com/debian-bugs-dist%40lists.debian.org/msg1770368.html
Modified: 2024-11-21
CVE-2020-27821
A flaw was found in the memory management API of QEMU during the initialization of a memory region cache. This issue could lead to an out-of-bounds write access to the MSI-X table while performing MMIO operations. A guest user may abuse this flaw to crash the QEMU process on the host, resulting in a denial of service. This flaw affects QEMU versions prior to 5.2.0.
- [oss-security] 20201216 CVE-2020-27821 QEMU: heap buffer overflow in msix_table_mmio_write() in hw/pci/msix.c
- [oss-security] 20201216 CVE-2020-27821 QEMU: heap buffer overflow in msix_table_mmio_write() in hw/pci/msix.c
- https://bugzilla.redhat.com/show_bug.cgi?id=1902651
- https://bugzilla.redhat.com/show_bug.cgi?id=1902651
- [debian-lts-announce] 20220905 [SECURITY] [DLA 3099-1] qemu security update
- [debian-lts-announce] 20220905 [SECURITY] [DLA 3099-1] qemu security update
- https://security.netapp.com/advisory/ntap-20210115-0006/
- https://security.netapp.com/advisory/ntap-20210115-0006/
Closed bugs
Не работает guest-fsfreeze-freeze
make-initrd does not include necessary libraries when building image for m-p's VM aarch64 target
Дублируются magic для разных интерпретаторов
qemu-user-static* зависят от qemu-aux
qemu-guest-agent is crashed on shutdown command (known issue for 4.0-5.1)
Closed vulnerabilities
BDU:2020-03920
Уязвимость библиотеки управления виртуализацией Libvirt, связанная с неправильным присвоением разрешений для критичного ресурса, позволяющая нарушителю повысить свои привилегии
BDU:2021-03736
Уязвимость демона для управления виртуализацией Libvirt, связанная с повторным освобождением памяти, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-04130
Уязвимость демона и набора инструментов для управления виртуализацией libvirt, связанная с ошибками разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-04592
Уязвимость библиотеки управления виртуализацией Libvirt, связанная с ошибками авторизации, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-05833
Уязвимость функции qemuDomainGetStatsIOThread компонента qemu_driver.c библиотеки управления виртуализацией Libvirt, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-20485
qemu/qemu_driver.c in libvirt before 6.0.0 mishandles the holding of a monitor job during a query to a guest agent, which allows attackers to cause a denial of service (API blockage).
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=953078
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=953078
- https://bugzilla.redhat.com/show_bug.cgi?id=1809740
- https://bugzilla.redhat.com/show_bug.cgi?id=1809740
- https://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=a663a860819287e041c3de672aad1d8543098ecc
- https://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=a663a860819287e041c3de672aad1d8543098ecc
- FEDORA-2020-5cd83efda7
- FEDORA-2020-5cd83efda7
- https://security-tracker.debian.org/tracker/CVE-2019-20485
- https://security-tracker.debian.org/tracker/CVE-2019-20485
- https://www.mail-archive.com/debian-bugs-dist%40lists.debian.org/msg1730509.html
- https://www.mail-archive.com/debian-bugs-dist%40lists.debian.org/msg1730509.html
Modified: 2024-11-21
CVE-2020-10701
A missing authorization flaw was found in the libvirt API responsible for changing the QEMU agent response timeout. This flaw allows read-only connections to adjust the time that libvirt waits for the QEMU guest agent to respond to agent commands. Depending on the timeout value that is set, this flaw can make guest agent commands fail because the agent cannot respond in time. Unprivileged users with a read-only connection could abuse this flaw to set the response timeout for all guest agent messages to zero, potentially leading to a denial of service. This flaw affects libvirt versions before 6.2.0.
Modified: 2024-11-21
CVE-2020-10703
A NULL pointer dereference was found in the libvirt API responsible introduced in upstream version 3.10.0, and fixed in libvirt 6.0.0, for fetching a storage pool based on its target path. In more detail, this flaw affects storage pools created without a target path such as network-based pools like gluster and RBD. Unprivileged users with a read-only connection could abuse this flaw to crash the libvirt daemon, resulting in a potential denial of service.
- https://bugzilla.redhat.com/show_bug.cgi?id=1790725
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10703
- https://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=5d5c732d748d644ec14626bce448e84bdc4bd93e
- https://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=7aa0e8c0cb8a6293d0c6f7e3d29c13b96dec2129
- https://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=dfff16a7c261f8d28e3abe60a47165f845fa952f
- [debian-lts-announce] 20240401 [SECURITY] [DLA 3778-1] libvirt security update
- FEDORA-2020-5cd83efda7
- https://security.netapp.com/advisory/ntap-20200608-0005/
- https://bugzilla.redhat.com/show_bug.cgi?id=1790725
- https://security.netapp.com/advisory/ntap-20200608-0005/
- FEDORA-2020-5cd83efda7
- [debian-lts-announce] 20240401 [SECURITY] [DLA 3778-1] libvirt security update
- https://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=dfff16a7c261f8d28e3abe60a47165f845fa952f
- https://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=7aa0e8c0cb8a6293d0c6f7e3d29c13b96dec2129
- https://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=5d5c732d748d644ec14626bce448e84bdc4bd93e
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10703
Modified: 2024-11-21
CVE-2020-12430
An issue was discovered in qemuDomainGetStatsIOThread in qemu/qemu_driver.c in libvirt 4.10.0 though 6.x before 6.1.0. A memory leak was found in the virDomainListGetStats libvirt API that is responsible for retrieving domain statistics when managing QEMU guests. This flaw allows unprivileged users with a read-only connection to cause a memory leak in the domstats command, resulting in a potential denial of service.
- https://bugzilla.redhat.com/show_bug.cgi?id=1804548
- https://bugzilla.redhat.com/show_bug.cgi?id=1828190
- https://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=9bf9e0ae6af38c806f4672ca7b12a6b38d5a9581
- [debian-lts-announce] 20240401 [SECURITY] [DLA 3778-1] libvirt security update
- FEDORA-2020-5cd83efda7
- https://security.netapp.com/advisory/ntap-20200518-0003/
- USN-4371-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1804548
- USN-4371-1
- https://security.netapp.com/advisory/ntap-20200518-0003/
- FEDORA-2020-5cd83efda7
- [debian-lts-announce] 20240401 [SECURITY] [DLA 3778-1] libvirt security update
- https://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=9bf9e0ae6af38c806f4672ca7b12a6b38d5a9581
- https://bugzilla.redhat.com/show_bug.cgi?id=1828190
Modified: 2024-11-21
CVE-2020-14339
A flaw was found in libvirt, where it leaked a file descriptor for `/dev/mapper/control` into the QEMU process. This file descriptor allows for privileged operations to happen against the device-mapper on the host. This flaw allows a malicious guest user or process to perform operations outside of their standard permissions, potentially causing serious damage to the host operating system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
Modified: 2024-11-21
CVE-2020-15708
Ubuntu's packaging of libvirt in 20.04 LTS created a control socket with world read and write permissions. An attacker could use this to overwrite arbitrary files or execute arbitrary code.
Modified: 2024-11-21
CVE-2020-25637
A double free memory issue was found to occur in the libvirt API, in versions before 6.8.0, responsible for requesting information about network interfaces of a running QEMU domain. This flaw affects the polkit access control driver. Specifically, clients connecting to the read-write socket with limited ACL permissions could use this flaw to crash the libvirt daemon, resulting in a denial of service, or potentially escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
- openSUSE-SU-2020:1778
- openSUSE-SU-2020:1778
- openSUSE-SU-2020:1777
- openSUSE-SU-2020:1777
- https://bugzilla.redhat.com/show_bug.cgi?id=1881037
- https://bugzilla.redhat.com/show_bug.cgi?id=1881037
- [debian-lts-announce] 20240401 [SECURITY] [DLA 3778-1] libvirt security update
- [debian-lts-announce] 20240401 [SECURITY] [DLA 3778-1] libvirt security update
- GLSA-202210-06
- GLSA-202210-06
Modified: 2024-11-21
CVE-2021-3975
A use-after-free flaw was found in libvirt. The qemuMonitorUnregister() function in qemuProcessHandleMonitorEOF is called using multiple threads without being adequately protected by a monitor lock. This flaw could be triggered by the virConnectGetAllDomainStats API when the guest is shutting down. An unprivileged client with a read-only connection could use this flaw to perform a denial of service attack by causing the libvirt daemon to crash.
- https://access.redhat.com/security/cve/CVE-2021-3975
- https://access.redhat.com/security/cve/CVE-2021-3975
- https://bugzilla.redhat.com/show_bug.cgi?id=2024326
- https://bugzilla.redhat.com/show_bug.cgi?id=2024326
- https://github.com/libvirt/libvirt/commit/1ac703a7d0789e46833f4013a3876c2e3af18ec7
- https://github.com/libvirt/libvirt/commit/1ac703a7d0789e46833f4013a3876c2e3af18ec7
- [debian-lts-announce] 20240401 [SECURITY] [DLA 3778-1] libvirt security update
- [debian-lts-announce] 20240401 [SECURITY] [DLA 3778-1] libvirt security update
- https://security.netapp.com/advisory/ntap-20221201-0002/
- https://security.netapp.com/advisory/ntap-20221201-0002/
- https://ubuntu.com/security/CVE-2021-3975
- https://ubuntu.com/security/CVE-2021-3975
Package libguestfs updated to version 1.44.1-alt0.p9 for branch c9f2 in task 273330.
Closed bugs
Не хватает зависимости на db4.8-utils
Closed bugs
Не отрабатывает команда при LANG=ru_RU.UTF-8