ALT-PU-2018-2870-1
Closed vulnerabilities
Modified: 2024-09-30
BDU:2019-02736
Уязвимость компонента tcp_emu эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2020-00698
Уязвимость компонентов hw/9pfs/cofile.c и hw/9pfs/9p.c эмулятора аппаратного обеспечения QEMU, связанная с повторным обращением к освобожденной области памяти, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-00703
Уязвимость функций v9fs_wstat (hw/9pfs/9p.c) эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-00704
Уязвимость функции pnv_lpc_do_eccb (hw/ppc/pnv_lpc.c) эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании и получить несанкционированный доступ к памяти PowerNV
BDU:2020-00717
Уязвимость функции lsi_do_msgin эмулятора аппаратного обеспечения QEMU, связанная с чтением за границами буфера данных, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2020-07-08
BDU:2020-00721
Уязвимость tcp_emu() эмулятора TCP/IP Slirp эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-00756
Уязвимость функции rtl8139_do_receive эмулятора аппаратного обеспечения QEMU, связанная с целочисленным переполнением, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-03198
Уязвимость функции usb_mtp_write_data реализации протокола qemu Media Transfer Protocol эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
Modified: 2021-08-17
BDU:2021-03347
Уязвимость компонента qemu-seccomp.c эмулятора аппаратного обеспечения QEMU, связанная с использованием неполного чёрного списка, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2022-10-18
BDU:2021-03451
Уязвимость подсистемы Bluetooth эмулятора аппаратного обеспечения QEMU, связанная с целочисленным переполнением значения, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-10839
Qemu emulator <= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS.
- https://access.redhat.com/errata/RHSA-2019:2892
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10839
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2018-09/msg03273.html
- https://usn.ubuntu.com/3826-1/
- https://www.debian.org/security/2018/dsa-4338
- https://www.openwall.com/lists/oss-security/2018/10/08/1
- https://access.redhat.com/errata/RHSA-2019:2892
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10839
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2018-09/msg03273.html
- https://usn.ubuntu.com/3826-1/
- https://www.debian.org/security/2018/dsa-4338
- https://www.openwall.com/lists/oss-security/2018/10/08/1
Modified: 2024-11-21
CVE-2018-15746
qemu-seccomp.c in QEMU might allow local OS guest users to cause a denial of service (guest crash) by leveraging mishandling of the seccomp policy for threads other than the main thread.
- http://www.openwall.com/lists/oss-security/2018/08/28/6
- https://access.redhat.com/errata/RHSA-2019:2425
- https://lists.gnu.org/archive/html/qemu-devel/2018-08/msg04892.html
- http://www.openwall.com/lists/oss-security/2018/08/28/6
- https://access.redhat.com/errata/RHSA-2019:2425
- https://lists.gnu.org/archive/html/qemu-devel/2018-08/msg04892.html
Modified: 2024-11-21
CVE-2018-16847
An OOB heap buffer r/w access issue was found in the NVM Express Controller emulation in QEMU. It could occur in nvme_cmb_ops routines in nvme device. A guest user/process could use this flaw to crash the QEMU process resulting in DoS or potentially run arbitrary code with privileges of the QEMU process.
- http://www.securityfocus.com/bid/105866
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16847
- https://lists.gnu.org/archive/html/qemu-devel/2018-11/msg00200.html
- https://usn.ubuntu.com/3826-1/
- https://www.openwall.com/lists/oss-security/2018/11/02/1
- http://www.securityfocus.com/bid/105866
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16847
- https://lists.gnu.org/archive/html/qemu-devel/2018-11/msg00200.html
- https://usn.ubuntu.com/3826-1/
- https://www.openwall.com/lists/oss-security/2018/11/02/1
Modified: 2024-11-21
CVE-2018-16867
A flaw was found in qemu Media Transfer Protocol (MTP) before version 3.1.0. A path traversal in the in usb_mtp_write_data function in hw/usb/dev-mtp.c due to an improper filename sanitization. When the guest device is mounted in read-write mode, this allows to read/write arbitrary files which may lead do DoS scenario OR possibly lead to code execution on the host.
- http://www.securityfocus.com/bid/106195
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16867
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CGCFIFSIWUREEQQOZDZFBYKWZHXCWBZN/
- https://usn.ubuntu.com/3923-1/
- https://www.openwall.com/lists/oss-security/2018/12/06/1
- http://www.securityfocus.com/bid/106195
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16867
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CGCFIFSIWUREEQQOZDZFBYKWZHXCWBZN/
- https://usn.ubuntu.com/3923-1/
- https://www.openwall.com/lists/oss-security/2018/12/06/1
Modified: 2024-11-21
CVE-2018-17958
Qemu has a Buffer Overflow in rtl8139_do_receive in hw/net/rtl8139.c because an incorrect integer data type is used.
- http://www.openwall.com/lists/oss-security/2018/10/08/1
- http://www.securityfocus.com/bid/105556
- https://access.redhat.com/errata/RHSA-2019:2425
- https://access.redhat.com/errata/RHSA-2019:2553
- https://lists.debian.org/debian-lts-announce/2019/01/msg00023.html
- https://lists.gnu.org/archive/html/qemu-devel/2018-09/msg03269.html
- https://seclists.org/bugtraq/2019/May/76
- https://usn.ubuntu.com/3826-1/
- https://www.debian.org/security/2019/dsa-4454
- http://www.openwall.com/lists/oss-security/2018/10/08/1
- http://www.securityfocus.com/bid/105556
- https://access.redhat.com/errata/RHSA-2019:2425
- https://access.redhat.com/errata/RHSA-2019:2553
- https://lists.debian.org/debian-lts-announce/2019/01/msg00023.html
- https://lists.gnu.org/archive/html/qemu-devel/2018-09/msg03269.html
- https://seclists.org/bugtraq/2019/May/76
- https://usn.ubuntu.com/3826-1/
- https://www.debian.org/security/2019/dsa-4454
Modified: 2024-11-21
CVE-2018-17963
qemu_deliver_packet_iov in net/net.c in Qemu accepts packet sizes greater than INT_MAX, which allows attackers to cause a denial of service or possibly have unspecified other impact.
- http://www.openwall.com/lists/oss-security/2018/10/08/1
- https://access.redhat.com/errata/RHSA-2019:2166
- https://access.redhat.com/errata/RHSA-2019:2425
- https://access.redhat.com/errata/RHSA-2019:2553
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2018-09/msg03267.html
- https://lists.gnu.org/archive/html/qemu-devel/2018-11/msg06054.html
- https://usn.ubuntu.com/3826-1/
- https://www.debian.org/security/2018/dsa-4338
- http://www.openwall.com/lists/oss-security/2018/10/08/1
- https://access.redhat.com/errata/RHSA-2019:2166
- https://access.redhat.com/errata/RHSA-2019:2425
- https://access.redhat.com/errata/RHSA-2019:2553
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2018-09/msg03267.html
- https://lists.gnu.org/archive/html/qemu-devel/2018-11/msg06054.html
- https://usn.ubuntu.com/3826-1/
- https://www.debian.org/security/2018/dsa-4338
Modified: 2024-11-21
CVE-2018-18849
In Qemu 3.0.0, lsi_do_msgin in hw/scsi/lsi53c895a.c allows out-of-bounds access by triggering an invalid msg_len value.
- http://lists.opensuse.org/opensuse-security-announce/2018-12/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2018-12/msg00028.html
- http://lists.opensuse.org/opensuse-security-announce/2018-12/msg00043.html
- http://www.openwall.com/lists/oss-security/2018/11/01/1
- https://lists.debian.org/debian-lts-announce/2019/05/msg00010.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LQIBTGNRDQEXGAAYHE4JIWFAYFNHZ6QP/
- https://lists.gnu.org/archive/html/qemu-devel/2018-10/msg06401.html
- https://seclists.org/bugtraq/2019/May/76
- https://security.netapp.com/advisory/ntap-20190411-0006/
- https://usn.ubuntu.com/3826-1/
- https://www.debian.org/security/2019/dsa-4454
- http://lists.opensuse.org/opensuse-security-announce/2018-12/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2018-12/msg00028.html
- http://lists.opensuse.org/opensuse-security-announce/2018-12/msg00043.html
- http://www.openwall.com/lists/oss-security/2018/11/01/1
- https://lists.debian.org/debian-lts-announce/2019/05/msg00010.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LQIBTGNRDQEXGAAYHE4JIWFAYFNHZ6QP/
- https://lists.gnu.org/archive/html/qemu-devel/2018-10/msg06401.html
- https://seclists.org/bugtraq/2019/May/76
- https://security.netapp.com/advisory/ntap-20190411-0006/
- https://usn.ubuntu.com/3826-1/
- https://www.debian.org/security/2019/dsa-4454
Modified: 2024-11-21
CVE-2018-18954
The pnv_lpc_do_eccb function in hw/ppc/pnv_lpc.c in Qemu before 3.1 allows out-of-bounds write or read access to PowerNV memory.
- http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00042.html
- http://www.openwall.com/lists/oss-security/2018/11/06/6
- http://www.securityfocus.com/bid/105920
- https://lists.gnu.org/archive/html/qemu-devel/2018-11/msg00446.html
- https://seclists.org/bugtraq/2019/May/76
- https://usn.ubuntu.com/3826-1/
- https://www.debian.org/security/2019/dsa-4454
- http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00042.html
- http://www.openwall.com/lists/oss-security/2018/11/06/6
- http://www.securityfocus.com/bid/105920
- https://lists.gnu.org/archive/html/qemu-devel/2018-11/msg00446.html
- https://seclists.org/bugtraq/2019/May/76
- https://usn.ubuntu.com/3826-1/
- https://www.debian.org/security/2019/dsa-4454
Modified: 2024-11-21
CVE-2018-19364
hw/9pfs/cofile.c and hw/9pfs/9p.c in QEMU can modify an fid path while it is being accessed by a second thread, leading to (for example) a use-after-free outcome.
- http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00042.html
- http://www.openwall.com/lists/oss-security/2018/11/20/1
- https://lists.debian.org/debian-lts-announce/2019/01/msg00023.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CGCFIFSIWUREEQQOZDZFBYKWZHXCWBZN/
- https://lists.gnu.org/archive/html/qemu-devel/2018-11/msg01139.html
- https://lists.gnu.org/archive/html/qemu-devel/2018-11/msg02795.html
- https://seclists.org/bugtraq/2019/May/76
- https://usn.ubuntu.com/3826-1/
- https://www.debian.org/security/2019/dsa-4454
- http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00042.html
- http://www.openwall.com/lists/oss-security/2018/11/20/1
- https://lists.debian.org/debian-lts-announce/2019/01/msg00023.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CGCFIFSIWUREEQQOZDZFBYKWZHXCWBZN/
- https://lists.gnu.org/archive/html/qemu-devel/2018-11/msg01139.html
- https://lists.gnu.org/archive/html/qemu-devel/2018-11/msg02795.html
- https://seclists.org/bugtraq/2019/May/76
- https://usn.ubuntu.com/3826-1/
- https://www.debian.org/security/2019/dsa-4454
Modified: 2024-11-21
CVE-2018-19489
v9fs_wstat in hw/9pfs/9p.c in QEMU allows guest OS users to cause a denial of service (crash) because of a race condition during file renaming.
- http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00042.html
- http://www.openwall.com/lists/oss-security/2018/11/26/1
- http://www.securityfocus.com/bid/106007
- https://exchange.xforce.ibmcloud.com/vulnerabilities/153326
- https://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=1d20398694a3b67a388d955b7a945ba4aa90a8a8
- https://lists.debian.org/debian-lts-announce/2019/01/msg00023.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CGCFIFSIWUREEQQOZDZFBYKWZHXCWBZN/
- https://lists.gnu.org/archive/html/qemu-devel/2018-11/msg04489.html
- https://seclists.org/bugtraq/2019/May/76
- https://security-tracker.debian.org/tracker/CVE-2018-19489
- https://usn.ubuntu.com/3923-1/
- https://www.debian.org/security/2019/dsa-4454
- http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00042.html
- http://www.openwall.com/lists/oss-security/2018/11/26/1
- http://www.securityfocus.com/bid/106007
- https://exchange.xforce.ibmcloud.com/vulnerabilities/153326
- https://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=1d20398694a3b67a388d955b7a945ba4aa90a8a8
- https://lists.debian.org/debian-lts-announce/2019/01/msg00023.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CGCFIFSIWUREEQQOZDZFBYKWZHXCWBZN/
- https://lists.gnu.org/archive/html/qemu-devel/2018-11/msg04489.html
- https://seclists.org/bugtraq/2019/May/76
- https://security-tracker.debian.org/tracker/CVE-2018-19489
- https://usn.ubuntu.com/3923-1/
- https://www.debian.org/security/2019/dsa-4454
Modified: 2024-11-21
CVE-2018-19665
The Bluetooth subsystem in QEMU mishandles negative values for length variables, leading to memory corruption.
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00072.html
- http://www.openwall.com/lists/oss-security/2018/11/29/1
- http://www.securityfocus.com/bid/106050
- https://lists.gnu.org/archive/html/qemu-devel/2018-11/msg03570.html
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00072.html
- http://www.openwall.com/lists/oss-security/2018/11/29/1
- http://www.securityfocus.com/bid/106050
- https://lists.gnu.org/archive/html/qemu-devel/2018-11/msg03570.html
Modified: 2024-11-21
CVE-2019-12247
QEMU 3.0.0 has an Integer Overflow because the qga/commands*.c files do not check the length of the argument list or the number of environment variables. NOTE: This has been disputed as not exploitable
- http://www.securityfocus.com/bid/108434
- https://lists.gnu.org/archive/html/qemu-devel/2019-01/msg06360.html
- https://lists.gnu.org/archive/html/qemu-devel/2019-05/msg04596.html
- https://lists.gnu.org/archive/html/qemu-devel/2019-05/msg05457.html
- http://www.securityfocus.com/bid/108434
- https://lists.gnu.org/archive/html/qemu-devel/2019-01/msg06360.html
- https://lists.gnu.org/archive/html/qemu-devel/2019-05/msg04596.html
- https://lists.gnu.org/archive/html/qemu-devel/2019-05/msg05457.html
Modified: 2024-11-21
CVE-2019-6778
In QEMU 3.0.0, tcp_emu in slirp/tcp_subr.c has a heap-based buffer overflow.
- http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00073.html
- http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00042.html
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00072.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00007.html
- http://www.openwall.com/lists/oss-security/2019/01/24/5
- http://www.securityfocus.com/bid/106758
- https://access.redhat.com/errata/RHSA-2019:1883
- https://access.redhat.com/errata/RHSA-2019:1968
- https://access.redhat.com/errata/RHSA-2019:2425
- https://access.redhat.com/errata/RHSA-2019:2892
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CGCFIFSIWUREEQQOZDZFBYKWZHXCWBZN/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KJMTVGDLA654HNCDGLCUEIP36SNJEKK7/
- https://lists.gnu.org/archive/html/qemu-devel/2019-01/msg03132.html
- https://seclists.org/bugtraq/2019/May/76
- https://usn.ubuntu.com/3923-1/
- https://www.debian.org/security/2019/dsa-4454
- http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00073.html
- http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00042.html
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00072.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00007.html
- http://www.openwall.com/lists/oss-security/2019/01/24/5
- http://www.securityfocus.com/bid/106758
- https://access.redhat.com/errata/RHSA-2019:1883
- https://access.redhat.com/errata/RHSA-2019:1968
- https://access.redhat.com/errata/RHSA-2019:2425
- https://access.redhat.com/errata/RHSA-2019:2892
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CGCFIFSIWUREEQQOZDZFBYKWZHXCWBZN/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KJMTVGDLA654HNCDGLCUEIP36SNJEKK7/
- https://lists.gnu.org/archive/html/qemu-devel/2019-01/msg03132.html
- https://seclists.org/bugtraq/2019/May/76
- https://usn.ubuntu.com/3923-1/
- https://www.debian.org/security/2019/dsa-4454
Modified: 2024-11-21
CVE-2019-9824
tcp_emu in slirp/tcp_subr.c (aka slirp/src/tcp_subr.c) in QEMU 3.0.0 uses uninitialized data in an snprintf call, leading to Information disclosure.
- https://access.redhat.com/errata/RHSA-2019:1650
- https://access.redhat.com/errata/RHSA-2019:2078
- https://access.redhat.com/errata/RHSA-2019:2425
- https://access.redhat.com/errata/RHSA-2019:2553
- https://access.redhat.com/errata/RHSA-2019:3345
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RVDHJB2QKXNDU7OFXIHIL5O5VN5QCSZL/
- https://lists.gnu.org/archive/html/qemu-devel/2019-03/msg00400.html
- https://access.redhat.com/errata/RHSA-2019:1650
- https://access.redhat.com/errata/RHSA-2019:2078
- https://access.redhat.com/errata/RHSA-2019:2425
- https://access.redhat.com/errata/RHSA-2019:2553
- https://access.redhat.com/errata/RHSA-2019:3345
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RVDHJB2QKXNDU7OFXIHIL5O5VN5QCSZL/
- https://lists.gnu.org/archive/html/qemu-devel/2019-03/msg00400.html