{"affected":[{"ecosystem_specific":{"binaries":[{"qemu":"2.0.2-48.22.1","qemu-block-curl":"2.0.2-48.22.1","qemu-block-rbd":"2.0.2-48.22.1","qemu-guest-agent":"2.0.2-48.22.1","qemu-ipxe":"1.0.0-48.22.1","qemu-kvm":"2.0.2-48.22.1","qemu-lang":"2.0.2-48.22.1","qemu-seabios":"1.7.4-48.22.1","qemu-sgabios":"8-48.22.1","qemu-tools":"2.0.2-48.22.1","qemu-vgabios":"1.7.4-48.22.1","qemu-x86":"2.0.2-48.22.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12","name":"qemu","purl":"pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.0.2-48.22.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"qemu":"2.0.2-48.22.1","qemu-block-curl":"2.0.2-48.22.1","qemu-block-rbd":"2.0.2-48.22.1","qemu-guest-agent":"2.0.2-48.22.1","qemu-ipxe":"1.0.0-48.22.1","qemu-kvm":"2.0.2-48.22.1","qemu-lang":"2.0.2-48.22.1","qemu-ppc":"2.0.2-48.22.1","qemu-s390":"2.0.2-48.22.1","qemu-seabios":"1.7.4-48.22.1","qemu-sgabios":"8-48.22.1","qemu-tools":"2.0.2-48.22.1","qemu-vgabios":"1.7.4-48.22.1","qemu-x86":"2.0.2-48.22.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12-LTSS","name":"qemu","purl":"pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.0.2-48.22.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"qemu was updated to fix 21 security issues.\n\nThese security issues were fixed:\n- CVE-2014-5388: Off-by-one error in the pci_read function in the ACPI PCI hotplug interface (hw/acpi/pcihp.c) in QEMU allowed local guest users to obtain sensitive information and have other unspecified impact related to a crafted PCI device that triggers memory corruption (bsc#893323).\n- CVE-2015-6815: e1000 NIC emulation support was vulnerable to an infinite loop issue. A privileged user inside guest could have used this flaw to crash the Qemu instance resulting in DoS.  (bsc#944697).\n- CVE-2016-2391: The ohci_bus_start function in the USB OHCI emulation support (hw/usb/hcd-ohci.c) in QEMU allowed local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors related to multiple eof_timers (bsc#967013).\n- CVE-2016-2392: The is_rndis function in the USB Net device emulator (hw/usb/dev-network.c) in QEMU did not properly validate USB configuration descriptor objects, which allowed local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors involving a remote NDIS control message packet (bsc#967012).\n- CVE-2016-4453: The vmsvga_fifo_run function in hw/display/vmware_vga.c in QEMU allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a VGA command (bsc#982223).\n- CVE-2016-4454: The vmsvga_fifo_read_raw function in hw/display/vmware_vga.c in QEMU allowed local guest OS administrators to obtain sensitive host memory information or cause a denial of service (QEMU process crash) by changing FIFO registers and issuing a VGA command, which triggers an out-of-bounds read (bsc#982222).\n- CVE-2016-5105: The megasas_dcmd_cfg_read function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, used an uninitialized variable, which allowed local guest administrators to read host memory via vectors involving a MegaRAID Firmware Interface (MFI) command (bsc#982017).\n- CVE-2016-5106: The megasas_dcmd_set_properties function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allowed local guest administrators to cause a denial of service (out-of-bounds write access) via vectors involving a MegaRAID Firmware Interface (MFI) command (bsc#982018).\n- CVE-2016-5107: The megasas_lookup_frame function in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allowed local guest OS administrators to cause a denial of service (out-of-bounds read and crash) via unspecified vectors (bsc#982019).\n- CVE-2016-5126: Heap-based buffer overflow in the iscsi_aio_ioctl function in block/iscsi.c in QEMU allowed local guest OS users to cause a denial of service (QEMU process crash) or possibly execute arbitrary code via a crafted iSCSI asynchronous I/O ioctl call (bsc#982285).\n- CVE-2016-5238: The get_cmd function in hw/scsi/esp.c in QEMU allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to reading from the information transfer buffer in non-DMA mode (bsc#982959).\n- CVE-2016-5337: The megasas_ctrl_get_info function in hw/scsi/megasas.c in QEMU allowed local guest OS administrators to obtain sensitive host memory information via vectors related to reading device control information (bsc#983961).\n- CVE-2016-5338: The (1) esp_reg_read and (2) esp_reg_write functions in hw/scsi/esp.c in QEMU allowed local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the QEMU host via vectors related to the information transfer buffer (bsc#983982).\n- CVE-2016-5403: The virtqueue_pop function in hw/virtio/virtio.c in QEMU allowed local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by submitting requests without waiting for completion (bsc#991080).\n- CVE-2016-6490: Infinite loop in the virtio framework. A privileged user inside the guest could have used this flaw to crash the Qemu instance on the host resulting in DoS (bsc#991466).\n- CVE-2016-6833: Use-after-free issue in the VMWARE VMXNET3 NIC device support. A privileged user inside guest could have used this issue to crash the Qemu instance resulting in DoS (bsc#994774).\n- CVE-2016-6836: VMWARE VMXNET3 NIC device support was leaging information leakage. A privileged user inside guest could have used this to leak host memory bytes to a guest (bsc#994760).\n- CVE-2016-6888: Integer overflow in packet initialisation in VMXNET3 device driver. A privileged user inside guest could have used this flaw to crash the Qemu instance resulting in DoS (bsc#994771).\n- CVE-2016-7116: Host directory sharing via Plan 9 File System(9pfs) was vulnerable to a directory/path traversal issue. A privileged user inside guest could have used this flaw to access undue files on the host (bsc#996441).\n- CVE-2016-7155: In the VMWARE PVSCSI paravirtual SCSI bus a OOB access and/or infinite loop issue could have allowed a privileged user inside guest to crash the Qemu process resulting in DoS (bsc#997858).\n- CVE-2016-7156: In the VMWARE PVSCSI paravirtual SCSI bus a infinite loop issue could have allowed a privileged user inside guest to crash the Qemu process resulting in DoS (bsc#997859).\n","id":"SUSE-SU-2016:2781-1","modified":"2016-11-12T03:12:32Z","published":"2016-11-12T03:12:32Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2016/suse-su-20162781-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/893323"},{"type":"REPORT","url":"https://bugzilla.suse.com/944697"},{"type":"REPORT","url":"https://bugzilla.suse.com/967012"},{"type":"REPORT","url":"https://bugzilla.suse.com/967013"},{"type":"REPORT","url":"https://bugzilla.suse.com/982017"},{"type":"REPORT","url":"https://bugzilla.suse.com/982018"},{"type":"REPORT","url":"https://bugzilla.suse.com/982019"},{"type":"REPORT","url":"https://bugzilla.suse.com/982222"},{"type":"REPORT","url":"https://bugzilla.suse.com/982223"},{"type":"REPORT","url":"https://bugzilla.suse.com/982285"},{"type":"REPORT","url":"https://bugzilla.suse.com/982959"},{"type":"REPORT","url":"https://bugzilla.suse.com/983961"},{"type":"REPORT","url":"https://bugzilla.suse.com/983982"},{"type":"REPORT","url":"https://bugzilla.suse.com/991080"},{"type":"REPORT","url":"https://bugzilla.suse.com/991466"},{"type":"REPORT","url":"https://bugzilla.suse.com/994760"},{"type":"REPORT","url":"https://bugzilla.suse.com/994771"},{"type":"REPORT","url":"https://bugzilla.suse.com/994774"},{"type":"REPORT","url":"https://bugzilla.suse.com/996441"},{"type":"REPORT","url":"https://bugzilla.suse.com/997858"},{"type":"REPORT","url":"https://bugzilla.suse.com/997859"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-5388"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-6815"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-2391"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-2392"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-4453"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-4454"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-5105"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-5106"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-5107"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-5126"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-5238"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-5337"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-5338"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-5403"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-6490"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-6833"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-6836"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-6888"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-7116"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-7155"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-7156"}],"related":["CVE-2014-5388","CVE-2015-6815","CVE-2016-2391","CVE-2016-2392","CVE-2016-4453","CVE-2016-4454","CVE-2016-5105","CVE-2016-5106","CVE-2016-5107","CVE-2016-5126","CVE-2016-5238","CVE-2016-5337","CVE-2016-5338","CVE-2016-5403","CVE-2016-6490","CVE-2016-6833","CVE-2016-6836","CVE-2016-6888","CVE-2016-7116","CVE-2016-7155","CVE-2016-7156"],"summary":"Security update for qemu","upstream":["CVE-2014-5388","CVE-2015-6815","CVE-2016-2391","CVE-2016-2392","CVE-2016-4453","CVE-2016-4454","CVE-2016-5105","CVE-2016-5106","CVE-2016-5107","CVE-2016-5126","CVE-2016-5238","CVE-2016-5337","CVE-2016-5338","CVE-2016-5403","CVE-2016-6490","CVE-2016-6833","CVE-2016-6836","CVE-2016-6888","CVE-2016-7116","CVE-2016-7155","CVE-2016-7156"]}