ELA-392-1 qemu security update
Package qemu
ELA-392-1 qemu security update
Version 1:2.1+dfsg-12+deb8u20
Related CVEs CVE-2021-3409 CVE-2021-3416 CVE-2021-20203 CVE-2021-20255 CVE-2021-20257
Several security vulnerabilities have been discovered in QEMU, a fast processor emulator.
CVE-2021-20257
net: e1000: infinite loop while processing transmit descriptors
CVE-2021-20255
A stack overflow via an infinite recursion vulnerability was found in the
eepro100 i8255x device emulator of QEMU. This issue occurs while processing
controller commands due to a DMA reentry issue. This flaw allows a guest
user or process to consume CPU cycles or crash the QEMU process on the
host, resulting in a denial of service.
CVE-2021-20203
An integer overflow issue was found in the vmxnet3 NIC emulator of the QEMU
for versions up to v5.2.0. It may occur if a guest was to supply invalid
values for rx/tx queue size or other NIC parameters. A privileged guest
user may use this flaw to crash the QEMU process on the host resulting in
DoS scenario.
CVE-2021-3416
A potential stack overflow via infinite loop issue was found in various NIC
emulators of QEMU in versions up to and including 5.2.0. The issue occurs
in loopback mode of a NIC wherein reentrant DMA checks get bypassed. A
guest user/process may use this flaw to consume CPU cycles or crash the
QEMU process on the host resulting in DoS scenario.
CVE-2021-3416
The patch for CVE-2020-17380/CVE-2020-25085 was found to be ineffective,
thus making QEMU vulnerable to the out-of-bounds read/write access issues
previously found in the SDHCI controller emulation code. This flaw allows a
malicious privileged guest to crash the QEMU process on the host, resulting
in a denial of service or potential code execution.
For Debian 8 jessie, these problems have been fixed in version 1:2.1+dfsg-12+deb8u20.
We recommend that you upgrade your qemu packages.
Further information about Extended LTS security advisories can be found at: https://deb.freexian.com/extended-lts/
A qemu security update has been released for Debian GNU/Linux 8 Extended LTS to address several security vulnerabilities.