-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2020.3138 qemu security update 14 September 2020 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: qemu Publisher: Debian Operating System: Debian GNU/Linux 9 Impact/Access: Execute Arbitrary Code/Commands -- Existing Account Denial of Service -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2020-16092 CVE-2020-14364 CVE-2020-13253 CVE-2020-1711 Reference: ESB-2020.3048 ESB-2020.2902 ESB-2020.2899 ESB-2020.2866 ESB-2020.2086 Original Bulletin: https://www.debian.org/lts/security/2020/dla-2373 - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - - ------------------------------------------------------------------------- Debian LTS Advisory DLA-2373-1 debian-lts@lists.debian.org https://www.debian.org/lts/security/ Abhijith PA September 13, 2020 https://wiki.debian.org/LTS - - ------------------------------------------------------------------------- Package : qemu Version : 1:2.8+dfsg-6+deb9u11 CVE ID : CVE-2020-1711 CVE-2020-13253 CVE-2020-14364 CVE-2020-16092 Debian Bug : 968947 961297 949731 The following security issues have been found in qemu, which could potentially result in DoS and execution of arbitrary code. CVE-2020-1711 An out-of-bounds heap buffer access flaw was found in the way the iSCSI Block driver in QEMU handled a response coming from an iSCSI server while checking the status of a Logical Address Block (LBA) in an iscsi_co_block_status() routine. A remote user could use this flaw to crash the QEMU process, resulting in a denial of service or potential execution of arbitrary code with privileges of the QEMU process on the host. CVE-2020-13253 An out-of-bounds read access issue was found in the SD Memory Card emulator of the QEMU. It occurs while performing block write commands via sdhci_write(), if a guest user has sent 'address' which is OOB of 's->wp_groups'. A guest user/process may use this flaw to crash the QEMU process resulting in DoS. CVE-2020-14364 An out-of-bounds read/write access issue was found in the USB emulator of the QEMU. It occurs while processing USB packets from a guest, when 'USBDevice->setup_len' exceeds the USBDevice->data_buf[4096], in do_token_{in,out} routines. CVE-2020-16092 An assertion failure can occur in the network packet processing. This issue affects the e1000e and vmxnet3 network devices. A malicious guest user/process could use this flaw to abort the QEMU process on the host, resulting in a denial of service condition in net_tx_pkt_add_raw_fragment in hw/net/net_tx_pkt.c For Debian 9 stretch, these problems have been fixed in version 1:2.8+dfsg-6+deb9u11. We recommend that you upgrade your qemu packages. For the detailed security status of qemu please refer to its security tracker page at: https://security-tracker.debian.org/tracker/qemu Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS - -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEE7xPqJqaY/zX9fJAuhj1N8u2cKO8FAl9eaVMACgkQhj1N8u2c KO+M3Q//ebK1iayHAU+lOFgWfa5HNgfmTXTDusWDIqJmqzsgi8IV9e25ZmCv7W1N nPsPf/WH0yk6CSaUEYtu+h1OGYxGKM5OAYoojllSGGvHlMU4WIUK/i+9UXdCM/Fk FPEcZcE7UrxHtUOZqI7t09ffLnf5CKM+/dY6b7qPiIptyxalyXCVyQXuu4PLhKQP azNYEXg/BiPEkVZNC2VOxEAg80cxiDtVLrFtt1bhuxrWRVdSeHoeMNI44W37FFlO zTSeTh66xHKwmpOYeApghe3SA/QoBcghovEUZdZk+TGntwZEJXgMKEScKGkKqDYr wBqgUSV33s+qhZZdlySR3ehKpFcmNO6/1CbX1O1xk2t93U3rh/1PJSUqzkVhHqwa zl8R3PKuA6V1xyijhk2Trmw2h9lUp0Kea4Vl/+sTJ/JPBWN1hszWqXdWgvgJRgCs UvVFaR93pb4uanVC1mIwNqSK23to7Znvqc/5alngcXD6hAwZmCNFrd2b5/PyegEt VdkgyHMuatf9x9l//UGYlagMHx0SvROwCRphzd7tCRO50WdKed1mgqS7ky6RTD43 /NhEq68XeeRbMYP8adi6NGG4dncuzbLtS5zrl0wS+DP1uB0RJ5+/qEnjCEwZQO/8 7IbwJ3ofI7EYSk9S5Rcq/9ejKNsfR9Yj+ItOfwNrnZ5mJnP7VS8= =ihEC - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBX16/4eNLKJtyKPYoAQic4g//T9vP/Q87i2JzewQQbs8lKxXoEjHF5BjZ TSF0vJ1rvyPV8yQI1mDHDf6JVceT98jAFCIGxSJJzZ+sQayu9TNzPMW9tR0em8eO +tM/Vvt1H+5S7D2SxP6UD6nhdq/ruAk3I8CsNXToOYHFTwKVn0hlwTD1X9cHww5E rm3nalpIDM+jR3rMFG6ff0+iL/dUgwUPycGzBOINIR1rA3EI+SSDLeUJmwh1mYJg 91hiXY2K9KPrCsCo1DsSbQ6KKsgyXgkV6n7yA3MaEu361AuHAq+nsOL6DgGZPWI8 Tkw0RuKM2LcXoE1tSr/+PxTnp/WAnKPrygte64C/MXUGMDEXbjKCGp2zP5Cdtaun uqSSF0m4L1ej7ndg4rL6sMKn/1X+t4hypGz8TeYjM0ZXM6DoR5Ewy52JSAJARymq wsR6ztSAJ7ORiGZzaGPIvGmknuXDyKvlKtvN28kTUKDfOTusrHpu35QcOFCsrsNT 4wfmHtPbWc2YDZLhAGOTcLJ7yAJaoTYdhuSoPN46o/gARYWgXZ9pY+LVCyf+MQ+R Q2vKdCRf6xIPoBleiMKHd6utHr/EXrmUgVePDQWdwcA+qZ8dLaWjydBXaIyJrk3J kGZ5rPyOcnP6tjp33cXjOnKRtCvT8ohJWuxkXogabOe4Xj2Dtgj0Vapo7G51ou7n vcPMGnhBvts= =mSZH -----END PGP SIGNATURE-----
The post ESB-2020.3138 – [Debian] qemu: Multiple vulnerabilities appeared first on Malware Devil.
https://malwaredevil.com/2020/09/14/esb-2020-3138-debian-qemu-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2020-3138-debian-qemu-multiple-vulnerabilities
No comments:
Post a Comment