Mageia 2024-0387: qemu Security Advisory Updates
Summary
A flaw was found in the QEMU implementation of VMWare's paravirtual RDMA device. This flaw allows a crafted guest driver to allocate and initialize a huge number of page tables to be used as a ring of descriptors for CQ and async events, potentially leading to an out-of-bounds read and crash of QEMU. (CVE-2023-1544) A DMA reentrancy issue leading to a use-after-free error was found in the e1000e NIC emulation code in QEMU. This issue could allow a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. (CVE-2023-3019) A flaw was found in the QEMU built-in VNC server while processing ClientCutText messages. A wrong exit condition may lead to an infinite loop when inflating an attacker controlled zlib buffer in the `inflate_buffer` function. This could allow a remote authenticated client who is able to send a clipboard to the VNC server to trigger a denial of service. (CVE-2023-3255) A bug in QEMU could cause a guest I/O operation otherwise addre...
References
- https://bugs.mageia.org/show_bug.cgi?id=33074
- https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/ES5DXAAMYUC767MUW4BPRP6ZPDL6SUW6/
- https://lists.suse.com/pipermail/sle-updates/2024-April/035064.html
- https://lwn.net/Articles/971720/
- https://lists.suse.com/pipermail/sle-updates/2024-August/036644.html
- https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/HL7L7OSCUZ44UAQCOB6IUOFBWKV6ECP2/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1544
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3019
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3255
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5088
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6683
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6693
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42467
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24474
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26327
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26328
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3446
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3447
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4467
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7409
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8354
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8612
Resolution
MGASA-2024-0387 - Updated qemu packages fix security vulnerabilities
SRPMS
- 9/core/qemu-7.2.15-1.mga9