ALT-BU-2024-14566-1
Branch c10f1 update bulletin.
Closed vulnerabilities
BDU:2022-05835
Уязвимость эмулятора сетевой карты vmxnet3 эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-01716
Уязвимость устройства RDMA эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2023-02140
Уязвимость компонента RDMA эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-04834
Уязвимость компонента lsi53c895a.c эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05003
Уязвимость эмулятора аппаратного обеспечения QEMU, связанная с разыменованием нулевого указателя, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05459
Уязвимость функции scsi_disk_reset() (hw/scsi/scsi-disk.c) эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-08901
Уязвимость функции virtio_crypto_handle_sym_req эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2024-00308
Уязвимость функции qemu_clipboard_request() встроенного сервера VNC эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2024-04418
Уязвимость интерфейса virtio-net эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2024-04419
Уязвимость функции inflate_buffer() VNC-сервера QEMU, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2024-04483
Уязвимость файловой системы сквозного доступа 9p (9pfs) эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю обойти существующую политику ограничения доступа
BDU:2024-04883
Уязвимость компонента e1000e сервера QEMU, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2024-04886
Уязвимость интерфейса virtio-net сервера QEMU, позволяющая нарушителю вызвать утечку информации
Modified: 2024-11-21
CVE-2021-20203
An integer overflow issue was found in the vmxnet3 NIC emulator of the QEMU for versions up to v5.2.0. It may occur if a guest was to supply invalid values for rx/tx queue size or other NIC parameters. A privileged guest user may use this flaw to crash the QEMU process on the host resulting in DoS scenario.
- https://bugs.launchpad.net/qemu/+bug/1913873
- https://bugs.launchpad.net/qemu/+bug/1913873
- https://bugzilla.redhat.com/show_bug.cgi?id=1922441
- https://bugzilla.redhat.com/show_bug.cgi?id=1922441
- [debian-lts-announce] 20210410 [SECURITY] [DLA 2623-1] qemu security update
- [debian-lts-announce] 20210410 [SECURITY] [DLA 2623-1] qemu security update
- [debian-lts-announce] 20220905 [SECURITY] [DLA 3099-1] qemu security update
- [debian-lts-announce] 20220905 [SECURITY] [DLA 3099-1] qemu security update
- GLSA-202208-27
- GLSA-202208-27
Modified: 2024-11-21
CVE-2022-1050
A flaw was found in the QEMU implementation of VMWare's paravirtual RDMA device. This flaw allows a crafted guest driver to execute HW commands when shared buffers are not yet allocated, potentially leading to a use-after-free condition.
Modified: 2024-11-21
CVE-2023-0330
A vulnerability in the lsi53c895a device affects the latest version of qemu. A DMA-MMIO reentrancy problem may lead to memory corruption bugs like stack overflow or use-after-free.
- https://access.redhat.com/security/cve/CVE-2023-0330
- https://access.redhat.com/security/cve/CVE-2023-0330
- RHBZ#2160151
- RHBZ#2160151
- [debian-lts-announce] 20231005 [SECURITY] [DLA 3604-1] qemu security update
- [debian-lts-announce] 20231005 [SECURITY] [DLA 3604-1] qemu security update
- https://lists.nongnu.org/archive/html/qemu-devel/2023-01/msg03411.html
- https://lists.nongnu.org/archive/html/qemu-devel/2023-01/msg03411.html
Modified: 2024-11-21
CVE-2023-1544
A flaw was found in the QEMU implementation of VMWare's paravirtual RDMA device. This flaw allows a crafted guest driver to allocate and initialize a huge number of page tables to be used as a ring of descriptors for CQ and async events, potentially leading to an out-of-bounds read and crash of QEMU.
- https://access.redhat.com/security/cve/CVE-2023-1544
- https://access.redhat.com/security/cve/CVE-2023-1544
- https://bugzilla.redhat.com/show_bug.cgi?id=2180364
- https://bugzilla.redhat.com/show_bug.cgi?id=2180364
- https://lists.nongnu.org/archive/html/qemu-devel/2023-03/msg00206.html
- https://lists.nongnu.org/archive/html/qemu-devel/2023-03/msg00206.html
- https://security.netapp.com/advisory/ntap-20230511-0005/
- https://security.netapp.com/advisory/ntap-20230511-0005/
Modified: 2024-11-21
CVE-2023-2861
A flaw was found in the 9p passthrough filesystem (9pfs) implementation in QEMU. The 9pfs server did not prohibit opening special files on the host side, potentially allowing a malicious client to escape from the exported 9p tree by creating and opening a device file in the shared folder.
- https://access.redhat.com/security/cve/CVE-2023-2861
- RHBZ#2219266
- https://lists.debian.org/debian-lts-announce/2024/03/msg00012.html
- https://security.netapp.com/advisory/ntap-20240125-0005/
- https://security.netapp.com/advisory/ntap-20240229-0002/
- https://access.redhat.com/security/cve/CVE-2023-2861
- https://security.netapp.com/advisory/ntap-20240229-0002/
- https://security.netapp.com/advisory/ntap-20240125-0005/
- https://lists.debian.org/debian-lts-announce/2024/03/msg00012.html
- RHBZ#2219266
Modified: 2024-11-21
CVE-2023-3019
A DMA reentrancy issue leading to a use-after-free error was found in the e1000e NIC emulation code in QEMU. This issue could allow a privileged guest user to crash the QEMU process on the host, resulting in a denial of service.
- RHSA-2024:0135
- RHSA-2024:0135
- RHSA-2024:0404
- RHSA-2024:0404
- RHSA-2024:0569
- RHSA-2024:0569
- RHSA-2024:2135
- RHSA-2024:2135
- https://access.redhat.com/security/cve/CVE-2023-3019
- https://access.redhat.com/security/cve/CVE-2023-3019
- RHBZ#2222351
- RHBZ#2222351
- https://security.netapp.com/advisory/ntap-20230831-0005/
Modified: 2024-11-21
CVE-2023-3180
A flaw was found in the QEMU virtual crypto device while handling data encryption/decryption requests in virtio_crypto_handle_sym_req. There is no check for the value of `src_len` and `dst_len` in virtio_crypto_sym_op_helper, potentially leading to a heap buffer overflow when the two values differ.
- https://access.redhat.com/security/cve/CVE-2023-3180
- https://access.redhat.com/security/cve/CVE-2023-3180
- RHBZ#2222424
- RHBZ#2222424
- https://lists.debian.org/debian-lts-announce/2023/10/msg00006.html
- https://lists.debian.org/debian-lts-announce/2023/10/msg00006.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MURWGXDIF2WTDXV36T6HFJDBL632AO7R/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MURWGXDIF2WTDXV36T6HFJDBL632AO7R/
- https://security.netapp.com/advisory/ntap-20230831-0008/
- https://security.netapp.com/advisory/ntap-20230831-0008/
Modified: 2024-11-21
CVE-2023-3255
A flaw was found in the QEMU built-in VNC server while processing ClientCutText messages. A wrong exit condition may lead to an infinite loop when inflating an attacker controlled zlib buffer in the `inflate_buffer` function. This could allow a remote authenticated client who is able to send a clipboard to the VNC server to trigger a denial of service.
Modified: 2024-11-21
CVE-2023-3301
A flaw was found in QEMU. The async nature of hot-unplug enables a race scenario where the net device backend is cleared before the virtio-net pci frontend has been unplugged. A malicious guest could use this time window to trigger an assertion and cause a denial of service.
Modified: 2024-11-21
CVE-2023-3354
A flaw was found in the QEMU built-in VNC server. When a client connects to the VNC server, QEMU checks whether the current number of connections crosses a certain threshold and if so, cleans up the previous connection. If the previous connection happens to be in the handshake phase and fails, QEMU cleans up the connection again, resulting in a NULL pointer dereference issue. This could allow a remote unauthenticated client to cause a denial of service.
- https://access.redhat.com/security/cve/CVE-2023-3354
- https://access.redhat.com/security/cve/CVE-2023-3354
- RHBZ#2216478
- RHBZ#2216478
- https://lists.debian.org/debian-lts-announce/2024/03/msg00012.html
- https://lists.debian.org/debian-lts-announce/2024/03/msg00012.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MURWGXDIF2WTDXV36T6HFJDBL632AO7R/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MURWGXDIF2WTDXV36T6HFJDBL632AO7R/
Modified: 2024-11-21
CVE-2023-42467
QEMU through 8.0.0 could trigger a division by zero in scsi_disk_reset in hw/scsi/scsi-disk.c because scsi_disk_emulate_mode_select does not prevent s->qdev.blocksize from being 256. This stops QEMU and the guest immediately.
- https://gitlab.com/qemu-project/qemu/-/commit/7cfcc79b0ab800959716738aff9419f53fc68c9c
- https://gitlab.com/qemu-project/qemu/-/commit/7cfcc79b0ab800959716738aff9419f53fc68c9c
- https://gitlab.com/qemu-project/qemu/-/issues/1813
- https://gitlab.com/qemu-project/qemu/-/issues/1813
- https://security.netapp.com/advisory/ntap-20231103-0005/
- https://security.netapp.com/advisory/ntap-20231103-0005/
Modified: 2024-11-21
CVE-2023-6683
A flaw was found in the QEMU built-in VNC server while processing ClientCutText messages. The qemu_clipboard_request() function can be reached before vnc_server_cut_text_caps() was called and had the chance to initialize the clipboard peer, leading to a NULL pointer dereference. This could allow a malicious authenticated VNC client to crash QEMU and trigger a denial of service.
Modified: 2024-11-21
CVE-2023-6693
A stack based buffer overflow was found in the virtio-net device of QEMU. This issue occurs when flushing TX in the virtio_net_flush_tx function if guest features VIRTIO_NET_F_HASH_REPORT, VIRTIO_F_VERSION_1 and VIRTIO_NET_F_MRG_RXBUF are enabled. This could allow a malicious user to overwrite local variables allocated on the stack. Specifically, the `out_sg` variable could be used to read a part of process memory and send it to the wire, causing an information leak.
- RHSA-2024:2962
- RHSA-2024:2962
- https://access.redhat.com/security/cve/CVE-2023-6693
- https://access.redhat.com/security/cve/CVE-2023-6693
- RHBZ#2254580
- RHBZ#2254580
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OYGUN5HVOXESW7MSNM44E4AE2VNXQB6Y/
- https://security.netapp.com/advisory/ntap-20240208-0004/