SB2020072412 - Multiple vulnerabilities in QEMU
Published: July 24, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 10 secuirty vulnerabilities.
1) Use-after-free (CVE-ID: CVE-2020-15859)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a use-after-free error in hw/net/e1000e_core.c when processing MMIO operation. A local user on guest operating system can send a specially crafted e1000e packet with the data's address set to the e1000e's MMIO address and crash the QEMU process.
2) Stack-based buffer overflow (CVE-ID: CVE-2020-15863)
The vulnerability allows a local user to execute arbitrary code on the target system with elevated privileges.
The vulnerability exists due to a boundary error when processing packets in xgmac_enet_send() in hw/net/xgmac.c. A local user on the guest operating system can send a specially crafted request to the application, trigger stack-based buffer overflow and execute arbitrary code on the target system with elevated privileges.
3) Infinite loop (CVE-ID: CVE-2020-13800)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop in ati-vga in hw/display/ati.c. A local user on the guest operating system can trigger infinite recursion via a crafted mm_index value during an ati_mm_read or ati_mm_write call and perform a denial of service attack against the host system.
4) Out-of-bounds read (CVE-ID: CVE-2020-13791)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition in hw/pci/pci.c. A local user on the guest operating system can trigger out-of-bounds read error by providing an address near the end of the PCI configuration space and read contents of memory on the system.
5) Out-of-bounds write (CVE-ID: CVE-2020-13765)
The vulnerability allows a remote user to compromise vulnerable system.
The vulnerability exists due to a boundary error when processing untrusted input in rom_copy() in hw/core/loader.c. A local user on the guest operating system can create a specially data to the application, trigger out-of-bounds write and execute arbitrary code on the host system.
6) Reachable Assertion (CVE-ID: CVE-2020-10761)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a reachable assertion in the Network Block Device(NBD) Server. This flaw occurs when an nbd-client sends a spec-compliant request that is near the boundary of maximum permitted request length. A remote nbd-client could use this flaw to crash the qemu-nbd server resulting in a denial of service.
7) NULL pointer dereference (CVE-ID: CVE-2020-13659)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error in exec.c, related to BounceBuffer. A local user on the guest operating system can perform a denial of service (DoS) attack against the host system.
8) Out-of-bounds write (CVE-ID: CVE-2020-13754)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error when processing untrusted input in hw/pci/msix.c. A local user on the guest operating system can send specially crafted address in an msi-x mmio operation, trick the victim into opening it using the affected software, trigger out-of-bounds write and execute arbitrary code.
9) Out-of-bounds read (CVE-ID: CVE-2020-13362)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition in megasas_lookup_frame in hw/scsi/megasas.c. A local user on the guest operating system can pass specially crafted message with reply_queue_head field, trigger out-of-bounds read error and read contents of memory on the system.
10) Out-of-bounds write (CVE-ID: CVE-2020-13361)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error when processing frame count in es1370_transfer_audio in hw/audio/es1370.c. A local user on the guest operating system can send a specially crafted request and execute arbitrary code on the host operating system.
Remediation
Cybersecurity Help is not aware of any official remediation provided by the vendor.
References
- https://bugs.launchpad.net/qemu/+bug/1886362
- https://lists.gnu.org/archive/html/qemu-devel/2020-07/msg05304.html
- https://www.openwall.com/lists/oss-security/2020/07/21/3
- https://seclists.org/oss-sec/2020/q3/49
- https://git.qemu.org/?p=qemu.git;a=commit;h=5519724a13664b43e225ca05351c60b4468e4555
- https://lists.gnu.org/archive/html/qemu-devel/2020-06/msg00825.html
- https://security.netapp.com/advisory/ntap-20200717-0001/
- https://www.openwall.com/lists/oss-security/2020/06/04/2
- https://lists.gnu.org/archive/html/qemu-devel/2020-06/msg00706.html
- https://www.openwall.com/lists/oss-security/2020/06/04/1
- https://git.qemu.org/?p=qemu.git;a=commit;h=e423455c4f23a1a828901c78fe6d03b7dde79319
- https://lists.debian.org/debian-lts-announce/2020/06/msg00032.html
- https://security.netapp.com/advisory/ntap-20200619-0006/
- https://www.openwall.com/lists/oss-security/2020/06/03/6
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10761
- https://www.openwall.com/lists/oss-security/2020/06/09/1
- http://www.openwall.com/lists/oss-security/2020/06/01/3
- https://lists.gnu.org/archive/html/qemu-devel/2020-05/msg07313.html
- https://security.netapp.com/advisory/ntap-20200608-0007/
- https://www.debian.org/security/2020/dsa-4728
- http://www.openwall.com/lists/oss-security/2020/06/01/6
- http://www.openwall.com/lists/oss-security/2020/06/15/8
- https://lists.gnu.org/archive/html/qemu-devel/2020-06/msg00004.html
- http://www.openwall.com/lists/oss-security/2020/05/28/2
- https://lists.gnu.org/archive/html/qemu-devel/2020-05/msg03131.html
- https://lists.gnu.org/archive/html/qemu-devel/2020-05/msg06250.html
- https://security.netapp.com/advisory/ntap-20200608-0003/
- https://security-tracker.debian.org/tracker/CVE-2020-13362
- http://www.openwall.com/lists/oss-security/2020/05/28/1
- https://lists.gnu.org/archive/html/qemu-devel/2020-05/msg03983.html
- https://security-tracker.debian.org/tracker/CVE-2020-13361