opensuse-su-2024:10285-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
qemu-linux-user-2.6.1-1.5 on GA media
Notes
Title of the patch
qemu-linux-user-2.6.1-1.5 on GA media
Description of the patch
These are all security issues fixed in the qemu-linux-user-2.6.1-1.5 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10285
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "qemu-linux-user-2.6.1-1.5 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the qemu-linux-user-2.6.1-1.5 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-10285", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10285-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2008-0928 page", "url": "https://www.suse.com/security/cve/CVE-2008-0928/" }, { "category": "self", "summary": "SUSE CVE CVE-2008-1945 page", "url": "https://www.suse.com/security/cve/CVE-2008-1945/" }, { "category": "self", "summary": "SUSE CVE CVE-2008-2382 page", "url": "https://www.suse.com/security/cve/CVE-2008-2382/" }, { "category": "self", "summary": "SUSE CVE CVE-2008-4539 page", "url": "https://www.suse.com/security/cve/CVE-2008-4539/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-3515 page", "url": "https://www.suse.com/security/cve/CVE-2012-3515/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3712 page", "url": "https://www.suse.com/security/cve/CVE-2016-3712/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4002 page", "url": "https://www.suse.com/security/cve/CVE-2016-4002/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4020 page", "url": "https://www.suse.com/security/cve/CVE-2016-4020/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4439 page", "url": "https://www.suse.com/security/cve/CVE-2016-4439/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4441 page", "url": "https://www.suse.com/security/cve/CVE-2016-4441/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4952 page", "url": "https://www.suse.com/security/cve/CVE-2016-4952/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4964 page", "url": "https://www.suse.com/security/cve/CVE-2016-4964/" } ], "title": "qemu-linux-user-2.6.1-1.5 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:10285-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "qemu-linux-user-2.6.1-1.5.aarch64", "product": { "name": "qemu-linux-user-2.6.1-1.5.aarch64", "product_id": "qemu-linux-user-2.6.1-1.5.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "qemu-linux-user-2.6.1-1.5.ppc64le", "product": { "name": "qemu-linux-user-2.6.1-1.5.ppc64le", "product_id": "qemu-linux-user-2.6.1-1.5.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "qemu-linux-user-2.6.1-1.5.s390x", "product": { "name": "qemu-linux-user-2.6.1-1.5.s390x", "product_id": "qemu-linux-user-2.6.1-1.5.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "qemu-linux-user-2.6.1-1.5.x86_64", "product": { "name": "qemu-linux-user-2.6.1-1.5.x86_64", "product_id": "qemu-linux-user-2.6.1-1.5.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "qemu-linux-user-2.6.1-1.5.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.aarch64" }, "product_reference": "qemu-linux-user-2.6.1-1.5.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-linux-user-2.6.1-1.5.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.ppc64le" }, "product_reference": "qemu-linux-user-2.6.1-1.5.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-linux-user-2.6.1-1.5.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.s390x" }, "product_reference": "qemu-linux-user-2.6.1-1.5.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-linux-user-2.6.1-1.5.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.x86_64" }, "product_reference": "qemu-linux-user-2.6.1-1.5.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2008-0928", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2008-0928" } ], "notes": [ { "category": "general", "text": "Qemu 0.9.1 and earlier does not perform range checks for block device read or write requests, which allows guest host users with root privileges to access arbitrary memory and escape the virtual machine.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.aarch64", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.ppc64le", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.s390x", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2008-0928", "url": "https://www.suse.com/security/cve/CVE-2008-0928" }, { "category": "external", "summary": "SUSE Bug 362956 for CVE-2008-0928", "url": "https://bugzilla.suse.com/362956" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.aarch64", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.ppc64le", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.s390x", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2008-0928" }, { "cve": "CVE-2008-1945", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2008-1945" } ], "notes": [ { "category": "general", "text": "QEMU 0.9.0 does not properly handle changes to removable media, which allows guest OS users to read arbitrary files on the host OS by using the diskformat: parameter in the -usbdevice option to modify the disk-image header to identify a different format, a related issue to CVE-2008-2004.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.aarch64", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.ppc64le", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.s390x", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2008-1945", "url": "https://www.suse.com/security/cve/CVE-2008-1945" }, { "category": "external", "summary": "SUSE Bug 362956 for CVE-2008-1945", "url": "https://bugzilla.suse.com/362956" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.aarch64", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.ppc64le", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.s390x", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2008-1945" }, { "cve": "CVE-2008-2382", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2008-2382" } ], "notes": [ { "category": "general", "text": "The protocol_client_msg function in vnc.c in the VNC server in (1) Qemu 0.9.1 and earlier and (2) KVM kvm-79 and earlier allows remote attackers to cause a denial of service (infinite loop) via a certain message.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.aarch64", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.ppc64le", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.s390x", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2008-2382", "url": "https://www.suse.com/security/cve/CVE-2008-2382" }, { "category": "external", "summary": "SUSE Bug 461565 for CVE-2008-2382", "url": "https://bugzilla.suse.com/461565" }, { "category": "external", "summary": "SUSE Bug 464142 for CVE-2008-2382", "url": "https://bugzilla.suse.com/464142" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.aarch64", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.ppc64le", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.s390x", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2008-2382" }, { "cve": "CVE-2008-4539", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2008-4539" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the Cirrus VGA implementation in (1) KVM before kvm-82 and (2) QEMU on Debian GNU/Linux and Ubuntu might allow local users to gain privileges by using the VNC console for a connection, aka the LGD-54XX \"bitblt\" heap overflow. NOTE: this issue exists because of an incorrect fix for CVE-2007-1320.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.aarch64", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.ppc64le", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.s390x", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2008-4539", "url": "https://www.suse.com/security/cve/CVE-2008-4539" }, { "category": "external", "summary": "SUSE Bug 435135 for CVE-2008-4539", "url": "https://bugzilla.suse.com/435135" }, { "category": "external", "summary": "SUSE Bug 448551 for CVE-2008-4539", "url": "https://bugzilla.suse.com/448551" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.aarch64", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.ppc64le", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.s390x", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2008-4539" }, { "cve": "CVE-2012-3515", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-3515" } ], "notes": [ { "category": "general", "text": "Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a \"device model\u0027s address space.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.aarch64", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.ppc64le", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.s390x", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-3515", "url": "https://www.suse.com/security/cve/CVE-2012-3515" }, { "category": "external", "summary": "SUSE Bug 777084 for CVE-2012-3515", "url": "https://bugzilla.suse.com/777084" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.aarch64", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.ppc64le", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.s390x", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2012-3515" }, { "cve": "CVE-2016-3712", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3712" } ], "notes": [ { "category": "general", "text": "Integer overflow in the VGA module in QEMU allows local guest OS users to cause a denial of service (out-of-bounds read and QEMU process crash) by editing VGA registers in VBE mode.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.aarch64", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.ppc64le", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.s390x", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3712", "url": "https://www.suse.com/security/cve/CVE-2016-3712" }, { "category": "external", "summary": "SUSE Bug 978160 for CVE-2016-3712", "url": "https://bugzilla.suse.com/978160" }, { "category": "external", "summary": "SUSE Bug 978164 for CVE-2016-3712", "url": "https://bugzilla.suse.com/978164" }, { "category": "external", "summary": "SUSE Bug 978167 for CVE-2016-3712", "url": "https://bugzilla.suse.com/978167" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.aarch64", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.ppc64le", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.s390x", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.aarch64", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.ppc64le", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.s390x", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-3712" }, { "cve": "CVE-2016-4002", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4002" } ], "notes": [ { "category": "general", "text": "Buffer overflow in the mipsnet_receive function in hw/net/mipsnet.c in QEMU, when the guest NIC is configured to accept large packets, allows remote attackers to cause a denial of service (memory corruption and QEMU crash) or possibly execute arbitrary code via a packet larger than 1514 bytes.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.aarch64", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.ppc64le", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.s390x", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4002", "url": "https://www.suse.com/security/cve/CVE-2016-4002" }, { "category": "external", "summary": "SUSE Bug 975136 for CVE-2016-4002", "url": "https://bugzilla.suse.com/975136" }, { "category": "external", "summary": "SUSE Bug 975138 for CVE-2016-4002", "url": "https://bugzilla.suse.com/975138" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.aarch64", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.ppc64le", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.s390x", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.aarch64", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.ppc64le", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.s390x", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-4002" }, { "cve": "CVE-2016-4020", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4020" } ], "notes": [ { "category": "general", "text": "The patch_instruction function in hw/i386/kvmvapic.c in QEMU does not initialize the imm32 variable, which allows local guest OS administrators to obtain sensitive information from host stack memory by accessing the Task Priority Register (TPR).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.aarch64", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.ppc64le", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.s390x", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4020", "url": "https://www.suse.com/security/cve/CVE-2016-4020" }, { "category": "external", "summary": "SUSE Bug 975700 for CVE-2016-4020", "url": "https://bugzilla.suse.com/975700" }, { "category": "external", "summary": "SUSE Bug 975907 for CVE-2016-4020", "url": "https://bugzilla.suse.com/975907" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.aarch64", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.ppc64le", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.s390x", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.aarch64", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.ppc64le", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.s390x", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-4020" }, { "cve": "CVE-2016-4439", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4439" } ], "notes": [ { "category": "general", "text": "The esp_reg_write function in hw/scsi/esp.c in the 53C9X Fast SCSI Controller (FSC) support in QEMU does not properly check command buffer length, which allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or potentially execute arbitrary code on the QEMU host via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.aarch64", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.ppc64le", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.s390x", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4439", "url": "https://www.suse.com/security/cve/CVE-2016-4439" }, { "category": "external", "summary": "SUSE Bug 980711 for CVE-2016-4439", "url": "https://bugzilla.suse.com/980711" }, { "category": "external", "summary": "SUSE Bug 980716 for CVE-2016-4439", "url": "https://bugzilla.suse.com/980716" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.aarch64", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.ppc64le", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.s390x", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.aarch64", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.ppc64le", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.s390x", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-4439" }, { "cve": "CVE-2016-4441", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4441" } ], "notes": [ { "category": "general", "text": "The get_cmd function in hw/scsi/esp.c in the 53C9X Fast SCSI Controller (FSC) support in QEMU does not properly check DMA length, which allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via unspecified vectors, involving an SCSI command.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.aarch64", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.ppc64le", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.s390x", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4441", "url": "https://www.suse.com/security/cve/CVE-2016-4441" }, { "category": "external", "summary": "SUSE Bug 980723 for CVE-2016-4441", "url": "https://bugzilla.suse.com/980723" }, { "category": "external", "summary": "SUSE Bug 980724 for CVE-2016-4441", "url": "https://bugzilla.suse.com/980724" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.aarch64", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.ppc64le", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.s390x", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.aarch64", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.ppc64le", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.s390x", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-4441" }, { "cve": "CVE-2016-4952", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4952" } ], "notes": [ { "category": "general", "text": "QEMU (aka Quick Emulator), when built with VMWARE PVSCSI paravirtual SCSI bus emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds array access) via vectors related to the (1) PVSCSI_CMD_SETUP_RINGS or (2) PVSCSI_CMD_SETUP_MSG_RING SCSI command.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.aarch64", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.ppc64le", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.s390x", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4952", "url": "https://www.suse.com/security/cve/CVE-2016-4952" }, { "category": "external", "summary": "SUSE Bug 981266 for CVE-2016-4952", "url": "https://bugzilla.suse.com/981266" }, { "category": "external", "summary": "SUSE Bug 981276 for CVE-2016-4952", "url": "https://bugzilla.suse.com/981276" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.aarch64", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.ppc64le", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.s390x", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.aarch64", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.ppc64le", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.s390x", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-4952" }, { "cve": "CVE-2016-4964", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4964" } ], "notes": [ { "category": "general", "text": "The mptsas_fetch_requests function in hw/scsi/mptsas.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop, and CPU consumption or QEMU process crash) via vectors involving s-\u003estate.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.aarch64", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.ppc64le", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.s390x", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4964", "url": "https://www.suse.com/security/cve/CVE-2016-4964" }, { "category": "external", "summary": "SUSE Bug 981399 for CVE-2016-4964", "url": "https://bugzilla.suse.com/981399" }, { "category": "external", "summary": "SUSE Bug 981401 for CVE-2016-4964", "url": "https://bugzilla.suse.com/981401" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.aarch64", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.ppc64le", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.s390x", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.aarch64", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.ppc64le", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.s390x", "openSUSE Tumbleweed:qemu-linux-user-2.6.1-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-4964" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…