openSUSE Security Update : qemu (openSUSE-2016-1234)

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

The remote openSUSE host is missing a security update.

Description :

qemu was updated to fix 19 security issues.

These security issues were fixed :

- CVE-2016-2392: The is_rndis function in the USB Net
device emulator (hw/usb/dev-network.c) in QEMU did not
properly validate USB configuration descriptor objects,
which allowed local guest OS administrators to cause a
denial of service (NULL pointer dereference and QEMU
process crash) via vectors involving a remote NDIS
control message packet (bsc#967012)

- CVE-2016-2391: The ohci_bus_start function in the USB
OHCI emulation support (hw/usb/hcd-ohci.c) in QEMU
allowed local guest OS administrators to cause a denial
of service (NULL pointer dereference and QEMU process
crash) via vectors related to multiple eof_timers
(bsc#967013)

- CVE-2016-5106: The megasas_dcmd_set_properties function
in hw/scsi/megasas.c in QEMU, when built with MegaRAID
SAS 8708EM2 Host Bus Adapter emulation support, allowed
local guest administrators to cause a denial of service
(out-of-bounds write access) via vectors involving a
MegaRAID Firmware Interface (MFI) command (bsc#982018)

- CVE-2016-5105: The megasas_dcmd_cfg_read function in
hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS
8708EM2 Host Bus Adapter emulation support, used an
uninitialized variable, which allowed local guest
administrators to read host memory via vectors involving
a MegaRAID Firmware Interface (MFI) command (bsc#982017)

- CVE-2016-5107: The megasas_lookup_frame function in
QEMU, when built with MegaRAID SAS 8708EM2 Host Bus
Adapter emulation support, allowed local guest OS
administrators to cause a denial of service
(out-of-bounds read and crash) via unspecified vectors
(bsc#982019)

- CVE-2016-5126: Heap-based buffer overflow in the
iscsi_aio_ioctl function in block/iscsi.c in QEMU
allowed local guest OS users to cause a denial of
service (QEMU process crash) or possibly execute
arbitrary code via a crafted iSCSI asynchronous I/O
ioctl call (bsc#982285)

- CVE-2016-4454: The vmsvga_fifo_read_raw function in
hw/display/vmware_vga.c in QEMU allowed local guest OS
administrators to obtain sensitive host memory
information or cause a denial of service (QEMU process
crash) by changing FIFO registers and issuing a VGA
command, which triggers an out-of-bounds read
(bsc#982222)

- CVE-2016-4453: The vmsvga_fifo_run function in
hw/display/vmware_vga.c in QEMU allowed local guest OS
administrators to cause a denial of service (infinite
loop and QEMU process crash) via a VGA command
(bsc#982223)

- CVE-2016-5338: The (1) esp_reg_read and (2)
esp_reg_write functions in hw/scsi/esp.c in QEMU allowed
local guest OS administrators to cause a denial of
service (QEMU process crash) or execute arbitrary code
on the QEMU host via vectors related to the information
transfer buffer (bsc#983982)

- CVE-2016-5337: The megasas_ctrl_get_info function in
hw/scsi/megasas.c in QEMU allowed local guest OS
administrators to obtain sensitive host memory
information via vectors related to reading device
control information (bsc#983961)

- CVE-2016-5238: The get_cmd function in hw/scsi/esp.c in
QEMU allowed local guest OS administrators to cause a
denial of service (out-of-bounds write and QEMU process
crash) via vectors related to reading from the
information transfer buffer in non-DMA mode (bsc#982959)

- CVE-2016-5403: The virtqueue_pop function in
hw/virtio/virtio.c in QEMU allowed local guest OS
administrators to cause a denial of service (memory
consumption and QEMU process crash) by submitting
requests without waiting for completion (bsc#991080)

- CVE-2016-6490: Infinite loop in the virtio framework. A
privileged user inside the guest could have used this
flaw to crash the Qemu instance on the host resulting in
DoS (bsc#991466)

- CVE-2016-6888: Integer overflow in packet initialisation
in VMXNET3 device driver. A privileged user inside guest
could have used this flaw to crash the Qemu instance
resulting in DoS (bsc#994771)

- CVE-2016-6833: Use-after-free issue in the VMWARE
VMXNET3 NIC device support. A privileged user inside
guest could have used this issue to crash the Qemu
instance resulting in DoS (bsc#994774)

- CVE-2016-7116: Host directory sharing via Plan 9 File
System(9pfs) was vulnerable to a directory/path
traversal issue. A privileged user inside guest could
have used this flaw to access undue files on the host
(bsc#996441)

- CVE-2016-6836: VMWARE VMXNET3 NIC device support was
leaging information leakage. A privileged user inside
guest could have used this to leak host memory bytes to
a guest (bsc#994760)

- CVE-2016-7155: In the VMWARE PVSCSI paravirtual SCSI bus
a OOB access and/or infinite loop issue could have
allowed a privileged user inside guest to crash the Qemu
process resulting in DoS (bsc#997858)

- CVE-2016-7156: In the VMWARE PVSCSI paravirtual SCSI bus
a infinite loop issue could have allowed a privileged
user inside guest to crash the Qemu process resulting in
DoS (bsc#997859)

This non-security issue was fixed :

- bsc#1000048: Fix migration failure where target host is
a soon to be released SLES 12 SP2. Qemu's spice code
gets an assertion.

This update was imported from the SUSE:SLE-12-SP1:Update update
project.

See also :

https://bugzilla.opensuse.org/show_bug.cgi?id=1000048
https://bugzilla.opensuse.org/show_bug.cgi?id=967012
https://bugzilla.opensuse.org/show_bug.cgi?id=967013
https://bugzilla.opensuse.org/show_bug.cgi?id=982017
https://bugzilla.opensuse.org/show_bug.cgi?id=982018
https://bugzilla.opensuse.org/show_bug.cgi?id=982019
https://bugzilla.opensuse.org/show_bug.cgi?id=982222
https://bugzilla.opensuse.org/show_bug.cgi?id=982223
https://bugzilla.opensuse.org/show_bug.cgi?id=982285
https://bugzilla.opensuse.org/show_bug.cgi?id=982959
https://bugzilla.opensuse.org/show_bug.cgi?id=983961
https://bugzilla.opensuse.org/show_bug.cgi?id=983982
https://bugzilla.opensuse.org/show_bug.cgi?id=991080
https://bugzilla.opensuse.org/show_bug.cgi?id=991466
https://bugzilla.opensuse.org/show_bug.cgi?id=994760
https://bugzilla.opensuse.org/show_bug.cgi?id=994771
https://bugzilla.opensuse.org/show_bug.cgi?id=994774
https://bugzilla.opensuse.org/show_bug.cgi?id=996441
https://bugzilla.opensuse.org/show_bug.cgi?id=997858
https://bugzilla.opensuse.org/show_bug.cgi?id=997859

Solution :

Update the affected qemu packages.

Risk factor :

Medium / CVSS Base Score : 4.9
(CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C)

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now