SUSE Security Update: Security update for qemu
______________________________________________________________________________

Announcement ID:    SUSE-SU-2017:0625-1
Rating:             important
References:         #1014702 #1015169 #1016779 #1017081 #1017084 
                    #1020491 #1020589 #1020928 #1021129 #1021195 
                    #1021481 #1022541 #1023004 #1023053 #1023073 
                    #1023907 #1024972 #1026583 #977027 
Cross-References:   CVE-2016-10028 CVE-2016-10029 CVE-2016-10155
                    CVE-2016-9921 CVE-2016-9922 CVE-2017-2615
                    CVE-2017-2620 CVE-2017-5525 CVE-2017-5526
                    CVE-2017-5552 CVE-2017-5578 CVE-2017-5667
                    CVE-2017-5856 CVE-2017-5857 CVE-2017-5898
                   
Affected Products:
                    SUSE Linux Enterprise Server for Raspberry Pi 12-SP2
                    SUSE Linux Enterprise Server 12-SP2
                    SUSE Linux Enterprise Desktop 12-SP2
______________________________________________________________________________

   An update that solves 15 vulnerabilities and has four fixes
   is now available.

Description:


   This update for qemu fixes several issues.

   These security issues were fixed:

   - CVE-2017-5898: The CCID Card device emulator support was vulnerable to
     an integer overflow flaw allowing a privileged user to crash the Qemu
     process on the host resulting in DoS (bsc#1023907).
   - CVE-2017-5857: The Virtio GPU Device emulator support was vulnerable to
     a host memory leakage issue allowing a guest user to leak host memory
     resulting in DoS (bsc#1023073).
   - CVE-2017-2620: In CIRRUS_BLTMODE_MEMSYSSRC mode the bitblit copy routine
     cirrus_bitblt_cputovideo failed to check the memory region, allowing for
     an out-of-bounds write that allows for privilege escalation (bsc#1024972)
   - CVE-2017-2615: An error in the bitblt copy operation could have allowed
     a malicious guest administrator to cause an out of bounds memory access,
     possibly leading to information disclosure or privilege escalation
     (bsc#1023004)
   - CVE-2017-5856: The MegaRAID SAS 8708EM2 Host Bus Adapter emulation
     support was vulnerable to a memory leakage issue allowing a privileged
     user to leak host memory resulting in DoS (bsc#1023053)
   - CVE-2016-9921: The Cirrus CLGD 54xx VGA Emulator support was vulnerable
     to a divide by zero issue while copying VGA data. A privileged user
     inside guest could have used this flaw to crash the process instance on
     the host, resulting in DoS (bsc#1014702)
   - CVE-2016-9922: The Cirrus CLGD 54xx VGA Emulator support was vulnerable
     to a divide by zero issue while copying VGA data. A privileged user
     inside guest could have used this flaw to crash the process instance on
     the host, resulting in DoS (bsc#1014702)
   - CVE-2016-10029: The Virtio GPU Device emulator support was vulnerable to
     an OOB read issue allowing a guest user to crash the Qemu process
     instance resulting in Dos (bsc#1017081).
   - CVE-2016-10028: The Virtio GPU Device emulator support was vulnerable to
     an out of bounds memory access issue allowing a guest user to crash the
     Qemu process instance on a host, resulting in DoS (bsc#1017084).
   - CVE-2016-10155: The virtual hardware watchdog 'wdt_i6300esb' was
     vulnerable to a memory leakage issue allowing a privileged user to cause
     a DoS and/or potentially crash the Qemu process on the host (bsc#1021129)
   - CVE-2017-5552: The Virtio GPU Device emulator support was vulnerable to
     a memory leakage issue allowing a guest user to leak host memory
     resulting in DoS (bsc#1021195).
   - CVE-2017-5578: The Virtio GPU Device emulator support was vulnerable to
     a memory leakage issue allowing a guest user to leak host memory
     resulting in DoS (bsc#1021481).
   - CVE-2017-5526: The ES1370 audio device emulation support was vulnerable
     to a memory leakage issue allowing a privileged user inside the guest to
     cause a DoS and/or potentially crash the Qemu process on the host
     (bsc#1020589).
   - CVE-2017-5525: The ac97 audio device emulation support was vulnerable to
     a memory leakage issue allowing a privileged user inside the guest to
     cause a DoS and/or potentially crash the Qemu process on the host
     (bsc#1020491).
   - CVE-2017-5667: The SDHCI device emulation support was vulnerable to an
     OOB heap access issue allowing a privileged user inside the guest to
     crash the Qemu process resulting in DoS or potentially execute arbitrary
     code with privileges of the Qemu process on the host (bsc#1022541).
   - CVE-2017-5898: The CCID Card device emulator support was vulnerable to
     an integer overflow allowing a privileged user inside the guest to crash
     the Qemu process resulting in DoS (bnc#1023907)

   These non-security issues were fixed:

   - Fix name of s390x specific sysctl configuration file to end with .conf
     (bsc#1026583)
   - XHCI fixes (bsc#977027)
   - Fixed rare race during s390x guest reboot
   - Fixed various inaccuracies in cirrus vga device emulation
   - Fixed cause of infrequent migration failures from bad virtio device
     state (bsc#1020928)
   - Fixed graphical update errors introduced by previous security fix
     (bsc#1016779)


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2:

      zypper in -t patch SUSE-SLE-RPI-12-SP2-2017-336=1

   - SUSE Linux Enterprise Server 12-SP2:

      zypper in -t patch SUSE-SLE-SERVER-12-SP2-2017-336=1

   - SUSE Linux Enterprise Desktop 12-SP2:

      zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2017-336=1

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64):

      qemu-2.6.2-41.9.1
      qemu-arm-2.6.2-41.9.1
      qemu-arm-debuginfo-2.6.2-41.9.1
      qemu-block-curl-2.6.2-41.9.1
      qemu-block-curl-debuginfo-2.6.2-41.9.1
      qemu-block-rbd-2.6.2-41.9.1
      qemu-block-rbd-debuginfo-2.6.2-41.9.1
      qemu-block-ssh-2.6.2-41.9.1
      qemu-block-ssh-debuginfo-2.6.2-41.9.1
      qemu-debugsource-2.6.2-41.9.1
      qemu-guest-agent-2.6.2-41.9.1
      qemu-guest-agent-debuginfo-2.6.2-41.9.1
      qemu-lang-2.6.2-41.9.1
      qemu-tools-2.6.2-41.9.1
      qemu-tools-debuginfo-2.6.2-41.9.1

   - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (noarch):

      qemu-ipxe-1.0.0-41.9.1

   - SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le x86_64):

      qemu-2.6.2-41.9.1
      qemu-block-curl-2.6.2-41.9.1
      qemu-block-curl-debuginfo-2.6.2-41.9.1
      qemu-block-ssh-2.6.2-41.9.1
      qemu-block-ssh-debuginfo-2.6.2-41.9.1
      qemu-debugsource-2.6.2-41.9.1
      qemu-guest-agent-2.6.2-41.9.1
      qemu-guest-agent-debuginfo-2.6.2-41.9.1
      qemu-lang-2.6.2-41.9.1
      qemu-tools-2.6.2-41.9.1
      qemu-tools-debuginfo-2.6.2-41.9.1

   - SUSE Linux Enterprise Server 12-SP2 (aarch64 x86_64):

      qemu-block-rbd-2.6.2-41.9.1
      qemu-block-rbd-debuginfo-2.6.2-41.9.1

   - SUSE Linux Enterprise Server 12-SP2 (ppc64le):

      qemu-ppc-2.6.2-41.9.1
      qemu-ppc-debuginfo-2.6.2-41.9.1

   - SUSE Linux Enterprise Server 12-SP2 (aarch64):

      qemu-arm-2.6.2-41.9.1
      qemu-arm-debuginfo-2.6.2-41.9.1

   - SUSE Linux Enterprise Server 12-SP2 (x86_64):

      qemu-kvm-2.6.2-41.9.1
      qemu-x86-2.6.2-41.9.1

   - SUSE Linux Enterprise Server 12-SP2 (noarch):

      qemu-ipxe-1.0.0-41.9.1
      qemu-seabios-1.9.1-41.9.1
      qemu-sgabios-8-41.9.1
      qemu-vgabios-1.9.1-41.9.1

   - SUSE Linux Enterprise Desktop 12-SP2 (x86_64):

      qemu-2.6.2-41.9.1
      qemu-block-curl-2.6.2-41.9.1
      qemu-block-curl-debuginfo-2.6.2-41.9.1
      qemu-debugsource-2.6.2-41.9.1
      qemu-kvm-2.6.2-41.9.1
      qemu-tools-2.6.2-41.9.1
      qemu-tools-debuginfo-2.6.2-41.9.1
      qemu-x86-2.6.2-41.9.1

   - SUSE Linux Enterprise Desktop 12-SP2 (noarch):

      qemu-ipxe-1.0.0-41.9.1
      qemu-seabios-1.9.1-41.9.1
      qemu-sgabios-8-41.9.1
      qemu-vgabios-1.9.1-41.9.1


References:

   https://www.suse.com/security/cve/CVE-2016-10028.html
   https://www.suse.com/security/cve/CVE-2016-10029.html
   https://www.suse.com/security/cve/CVE-2016-10155.html
   https://www.suse.com/security/cve/CVE-2016-9921.html
   https://www.suse.com/security/cve/CVE-2016-9922.html
   https://www.suse.com/security/cve/CVE-2017-2615.html
   https://www.suse.com/security/cve/CVE-2017-2620.html
   https://www.suse.com/security/cve/CVE-2017-5525.html
   https://www.suse.com/security/cve/CVE-2017-5526.html
   https://www.suse.com/security/cve/CVE-2017-5552.html
   https://www.suse.com/security/cve/CVE-2017-5578.html
   https://www.suse.com/security/cve/CVE-2017-5667.html
   https://www.suse.com/security/cve/CVE-2017-5856.html
   https://www.suse.com/security/cve/CVE-2017-5857.html
   https://www.suse.com/security/cve/CVE-2017-5898.html
   https://bugzilla.suse.com/1014702
   https://bugzilla.suse.com/1015169
   https://bugzilla.suse.com/1016779
   https://bugzilla.suse.com/1017081
   https://bugzilla.suse.com/1017084
   https://bugzilla.suse.com/1020491
   https://bugzilla.suse.com/1020589
   https://bugzilla.suse.com/1020928
   https://bugzilla.suse.com/1021129
   https://bugzilla.suse.com/1021195
   https://bugzilla.suse.com/1021481
   https://bugzilla.suse.com/1022541
   https://bugzilla.suse.com/1023004
   https://bugzilla.suse.com/1023053
   https://bugzilla.suse.com/1023073
   https://bugzilla.suse.com/1023907
   https://bugzilla.suse.com/1024972
   https://bugzilla.suse.com/1026583
   https://bugzilla.suse.com/977027

SuSE: 2017:0625-1: important: qemu

March 7, 2017
An update that solves 15 vulnerabilities and has four fixes An update that solves 15 vulnerabilities and has four fixes An update that solves 15 vulnerabilities and has four fixes ...

Summary

This update for qemu fixes several issues. These security issues were fixed: - CVE-2017-5898: The CCID Card device emulator support was vulnerable to an integer overflow flaw allowing a privileged user to crash the Qemu process on the host resulting in DoS (bsc#1023907). - CVE-2017-5857: The Virtio GPU Device emulator support was vulnerable to a host memory leakage issue allowing a guest user to leak host memory resulting in DoS (bsc#1023073). - CVE-2017-2620: In CIRRUS_BLTMODE_MEMSYSSRC mode the bitblit copy routine cirrus_bitblt_cputovideo failed to check the memory region, allowing for an out-of-bounds write that allows for privilege escalation (bsc#1024972) - CVE-2017-2615: An error in the bitblt copy operation could have allowed a malicious guest administrator to cause an out of bounds memory access, possibly leading to information disclosure or privilege escalation (bsc#1023004) - CVE-2017-5856: The MegaRAID SAS 8708EM2 Host Bus Adapter emulation support was vulnerable to a memory leakage issue allowing a privileged user to leak host memory resulting in DoS (bsc#1023053) - CVE-2016-9921: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1014702) - CVE-2016-9922: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1014702) - CVE-2016-10029: The Virtio GPU Device emulator support was vulnerable to an OOB read issue allowing a guest user to crash the Qemu process instance resulting in Dos (bsc#1017081). - CVE-2016-10028: The Virtio GPU Device emulator support was vulnerable to an out of bounds memory access issue allowing a guest user to crash the Qemu process instance on a host, resulting in DoS (bsc#1017084). - CVE-2016-10155: The virtual hardware watchdog 'wdt_i6300esb' was vulnerable to a memory leakage issue allowing a privileged user to cause a DoS and/or potentially crash the Qemu process on the host (bsc#1021129) - CVE-2017-5552: The Virtio GPU Device emulator support was vulnerable to a memory leakage issue allowing a guest user to leak host memory resulting in DoS (bsc#1021195). - CVE-2017-5578: The Virtio GPU Device emulator support was vulnerable to a memory leakage issue allowing a guest user to leak host memory resulting in DoS (bsc#1021481). - CVE-2017-5526: The ES1370 audio device emulation support was vulnerable to a memory leakage issue allowing a privileged user inside the guest to cause a DoS and/or potentially crash the Qemu process on the host (bsc#1020589). - CVE-2017-5525: The ac97 audio device emulation support was vulnerable to a memory leakage issue allowing a privileged user inside the guest to cause a DoS and/or potentially crash the Qemu process on the host (bsc#1020491). - CVE-2017-5667: The SDHCI device emulation support was vulnerable to an OOB heap access issue allowing a privileged user inside the guest to crash the Qemu process resulting in DoS or potentially execute arbitrary code with privileges of the Qemu process on the host (bsc#1022541). - CVE-2017-5898: The CCID Card device emulator support was vulnerable to an integer overflow allowing a privileged user inside the guest to crash the Qemu process resulting in DoS (bnc#1023907) These non-security issues were fixed: - Fix name of s390x specific sysctl configuration file to end with .conf (bsc#1026583) - XHCI fixes (bsc#977027) - Fixed rare race during s390x guest reboot - Fixed various inaccuracies in cirrus vga device emulation - Fixed cause of infrequent migration failures from bad virtio device state (bsc#1020928) - Fixed graphical update errors introduced by previous security fix (bsc#1016779) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2: zypper in -t patch SUSE-SLE-RPI-12-SP2-2017-336=1 - SUSE Linux Enterprise Server 12-SP2: zypper in -t patch SUSE-SLE-SERVER-12-SP2-2017-336=1 - SUSE Linux Enterprise Desktop 12-SP2: zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2017-336=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64): qemu-2.6.2-41.9.1 qemu-arm-2.6.2-41.9.1 qemu-arm-debuginfo-2.6.2-41.9.1 qemu-block-curl-2.6.2-41.9.1 qemu-block-curl-debuginfo-2.6.2-41.9.1 qemu-block-rbd-2.6.2-41.9.1 qemu-block-rbd-debuginfo-2.6.2-41.9.1 qemu-block-ssh-2.6.2-41.9.1 qemu-block-ssh-debuginfo-2.6.2-41.9.1 qemu-debugsource-2.6.2-41.9.1 qemu-guest-agent-2.6.2-41.9.1 qemu-guest-agent-debuginfo-2.6.2-41.9.1 qemu-lang-2.6.2-41.9.1 qemu-tools-2.6.2-41.9.1 qemu-tools-debuginfo-2.6.2-41.9.1 - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (noarch): qemu-ipxe-1.0.0-41.9.1 - SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le x86_64): qemu-2.6.2-41.9.1 qemu-block-curl-2.6.2-41.9.1 qemu-block-curl-debuginfo-2.6.2-41.9.1 qemu-block-ssh-2.6.2-41.9.1 qemu-block-ssh-debuginfo-2.6.2-41.9.1 qemu-debugsource-2.6.2-41.9.1 qemu-guest-agent-2.6.2-41.9.1 qemu-guest-agent-debuginfo-2.6.2-41.9.1 qemu-lang-2.6.2-41.9.1 qemu-tools-2.6.2-41.9.1 qemu-tools-debuginfo-2.6.2-41.9.1 - SUSE Linux Enterprise Server 12-SP2 (aarch64 x86_64): qemu-block-rbd-2.6.2-41.9.1 qemu-block-rbd-debuginfo-2.6.2-41.9.1 - SUSE Linux Enterprise Server 12-SP2 (ppc64le): qemu-ppc-2.6.2-41.9.1 qemu-ppc-debuginfo-2.6.2-41.9.1 - SUSE Linux Enterprise Server 12-SP2 (aarch64): qemu-arm-2.6.2-41.9.1 qemu-arm-debuginfo-2.6.2-41.9.1 - SUSE Linux Enterprise Server 12-SP2 (x86_64): qemu-kvm-2.6.2-41.9.1 qemu-x86-2.6.2-41.9.1 - SUSE Linux Enterprise Server 12-SP2 (noarch): qemu-ipxe-1.0.0-41.9.1 qemu-seabios-1.9.1-41.9.1 qemu-sgabios-8-41.9.1 qemu-vgabios-1.9.1-41.9.1 - SUSE Linux Enterprise Desktop 12-SP2 (x86_64): qemu-2.6.2-41.9.1 qemu-block-curl-2.6.2-41.9.1 qemu-block-curl-debuginfo-2.6.2-41.9.1 qemu-debugsource-2.6.2-41.9.1 qemu-kvm-2.6.2-41.9.1 qemu-tools-2.6.2-41.9.1 qemu-tools-debuginfo-2.6.2-41.9.1 qemu-x86-2.6.2-41.9.1 - SUSE Linux Enterprise Desktop 12-SP2 (noarch): qemu-ipxe-1.0.0-41.9.1 qemu-seabios-1.9.1-41.9.1 qemu-sgabios-8-41.9.1 qemu-vgabios-1.9.1-41.9.1

References

#1014702 #1015169 #1016779 #1017081 #1017084

#1020491 #1020589 #1020928 #1021129 #1021195

#1021481 #1022541 #1023004 #1023053 #1023073

#1023907 #1024972 #1026583 #977027

Cross- CVE-2016-10028 CVE-2016-10029 CVE-2016-10155

CVE-2016-9921 CVE-2016-9922 CVE-2017-2615

CVE-2017-2620 CVE-2017-5525 CVE-2017-5526

CVE-2017-5552 CVE-2017-5578 CVE-2017-5667

CVE-2017-5856 CVE-2017-5857 CVE-2017-5898

Affected Products:

SUSE Linux Enterprise Server for Raspberry Pi 12-SP2

SUSE Linux Enterprise Server 12-SP2

SUSE Linux Enterprise Desktop 12-SP2

https://www.suse.com/security/cve/CVE-2016-10028.html

https://www.suse.com/security/cve/CVE-2016-10029.html

https://www.suse.com/security/cve/CVE-2016-10155.html

https://www.suse.com/security/cve/CVE-2016-9921.html

https://www.suse.com/security/cve/CVE-2016-9922.html

https://www.suse.com/security/cve/CVE-2017-2615.html

https://www.suse.com/security/cve/CVE-2017-2620.html

https://www.suse.com/security/cve/CVE-2017-5525.html

https://www.suse.com/security/cve/CVE-2017-5526.html

https://www.suse.com/security/cve/CVE-2017-5552.html

https://www.suse.com/security/cve/CVE-2017-5578.html

https://www.suse.com/security/cve/CVE-2017-5667.html

https://www.suse.com/security/cve/CVE-2017-5856.html

https://www.suse.com/security/cve/CVE-2017-5857.html

https://www.suse.com/security/cve/CVE-2017-5898.html

https://bugzilla.suse.com/1014702

https://bugzilla.suse.com/1015169

https://bugzilla.suse.com/1016779

https://bugzilla.suse.com/1017081

https://bugzilla.suse.com/1017084

https://bugzilla.suse.com/1020491

https://bugzilla.suse.com/1020589

https://bugzilla.suse.com/1020928

https://bugzilla.suse.com/1021129

https://bugzilla.suse.com/1021195

https://bugzilla.suse.com/1021481

https://bugzilla.suse.com/1022541

https://bugzilla.suse.com/1023004

https://bugzilla.suse.com/1023053

https://bugzilla.suse.com/1023073

https://bugzilla.suse.com/1023907

https://bugzilla.suse.com/1024972

https://bugzilla.suse.com/1026583

https://bugzilla.suse.com/977027

Severity
Announcement ID: SUSE-SU-2017:0625-1
Rating: important

Related News