SB2021072178 - SUSE update for qemu
Published: July 21, 2021
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Release of invalid pointer or reference (CVE-ID: CVE-2021-3592)
The vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to invalid pointer initialization within the bootp_input() function while processing UDP packets in the SLiRP networking implementation of QEMU. A malicious guest could use this flaw to leak 10 bytes of uninitialized heap memory from the host.
2) Release of invalid pointer or reference (CVE-ID: CVE-2021-3593)
The vulnerability allows a remote attacker to gain access to sensitive information.
The
vulnerability exists due to invalid pointer initialization within the udp6_input() function while processing UDP packets in the SLiRP
networking implementation of QEMU. A malicious guest could use this vulnerability to read host memory.
3) Release of invalid pointer or reference (CVE-ID: CVE-2021-3594)
The vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to invalid pointer initialization within the udp_input() function while processing UDP packets in the SLiRP networking implementation of QEMU. A malicious guest could use this vulnerability to read host memory.4) Release of invalid pointer or reference (CVE-ID: CVE-2021-3595)
The vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to invalid pointer initialization within the tftp_input() function while processing UDP packets in the SLiRP networking implementation of QEMU. A malicious guest could use this vulnerability to read host memory.5) Out-of-bounds write (CVE-ID: CVE-2021-3611)
The vulnerability allows a remote user to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error in the Intel HD Audio device (intel-hda) of QEMU. A remote user of the guest OS trigger an out-of-bounds write and crash the QEMU process on the host.
Remediation
Install update from vendor's website.