SUSE 5100 Published by

A qemu security update has been released for SUSE Linux Enterprise and openSUSE Leap 15.4.



SUSE-SU-2022:2260-1: important: Security update for qemu


SUSE Security Update: Security update for qemu
______________________________________________________________________________

Announcement ID: SUSE-SU-2022:2260-1
Rating: important
References: #1197084 #1198035 #1198037 #1198711 #1198712 #1199015 #1199018 #1199625 #1199924
Cross-References: CVE-2021-4206 CVE-2021-4207 CVE-2022-26353 CVE-2022-26354
CVSS scores:
CVE-2021-4206 (NVD) : 8.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
CVE-2021-4206 (SUSE): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
CVE-2021-4207 (NVD) : 8.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
CVE-2021-4207 (SUSE): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
CVE-2022-26353 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-26353 (SUSE): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-26354 (NVD) : 3.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L
CVE-2022-26354 (SUSE): 3.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L

Affected Products:
SUSE Linux Enterprise Desktop 15-SP4
SUSE Linux Enterprise High Performance Computing 15-SP4 SUSE Linux Enterprise Module for Basesystem 15-SP4 SUSE Linux Enterprise Module for Server Applications 15-SP4
SUSE Linux Enterprise Server 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15-SP4openSUSE Leap 15.4
______________________________________________________________________________

An update that solves four vulnerabilities and has 5 fixes is now available.

Description:

This update for qemu fixes the following issues:

- CVE-2022-26354: Fixed missing virtqueue detach on error can lead to memory leak (bsc#1198712)
- CVE-2022-26353: Fixed map leaking on error during receive (bsc#1198711)- CVE-2021-4207: Fixed double fetch in qxl_cursor() can lead to heap buffer overflow (bsc#1198037)
- CVE-2021-4206: Fixed integer overflow in cursor_alloc() can lead to heap
buffer overflow (bsc#1198035)

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:

zypper in -t patch openSUSE-SLE-15.4-2022-2260=1

- SUSE Linux Enterprise Module for Server Applications 15-SP4:
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP4-2022-2260=1

- SUSE Linux Enterprise Module for Basesystem 15-SP4:

zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2022-2260=1

Package List:

- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):

qemu-6.2.0-150400.37.5.3
qemu-accel-qtest-6.2.0-150400.37.5.3
qemu-accel-qtest-debuginfo-6.2.0-150400.37.5.3
qemu-accel-tcg-x86-6.2.0-150400.37.5.3
qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.5.3
qemu-arm-6.2.0-150400.37.5.3
qemu-arm-debuginfo-6.2.0-150400.37.5.3
qemu-audio-alsa-6.2.0-150400.37.5.3
qemu-audio-alsa-debuginfo-6.2.0-150400.37.5.3
qemu-audio-jack-6.2.0-150400.37.5.3
qemu-audio-jack-debuginfo-6.2.0-150400.37.5.3
qemu-audio-oss-debuginfo-6.2.0-150400.37.5.3
qemu-audio-pa-6.2.0-150400.37.5.3
qemu-audio-pa-debuginfo-6.2.0-150400.37.5.3
qemu-audio-spice-6.2.0-150400.37.5.3
qemu-audio-spice-debuginfo-6.2.0-150400.37.5.3
qemu-block-curl-6.2.0-150400.37.5.3
qemu-block-curl-debuginfo-6.2.0-150400.37.5.3
qemu-block-dmg-6.2.0-150400.37.5.3
qemu-block-dmg-debuginfo-6.2.0-150400.37.5.3
qemu-block-gluster-6.2.0-150400.37.5.3
qemu-block-gluster-debuginfo-6.2.0-150400.37.5.3
qemu-block-iscsi-6.2.0-150400.37.5.3
qemu-block-iscsi-debuginfo-6.2.0-150400.37.5.3
qemu-block-nfs-6.2.0-150400.37.5.3
qemu-block-nfs-debuginfo-6.2.0-150400.37.5.3
qemu-block-rbd-6.2.0-150400.37.5.3
qemu-block-rbd-debuginfo-6.2.0-150400.37.5.3
qemu-block-ssh-6.2.0-150400.37.5.3
qemu-block-ssh-debuginfo-6.2.0-150400.37.5.3
qemu-chardev-baum-6.2.0-150400.37.5.3
qemu-chardev-baum-debuginfo-6.2.0-150400.37.5.3
qemu-chardev-spice-6.2.0-150400.37.5.3
qemu-chardev-spice-debuginfo-6.2.0-150400.37.5.3
qemu-debuginfo-6.2.0-150400.37.5.3
qemu-debugsource-6.2.0-150400.37.5.3
qemu-extra-6.2.0-150400.37.5.3
qemu-extra-debuginfo-6.2.0-150400.37.5.3
qemu-guest-agent-6.2.0-150400.37.5.3
qemu-guest-agent-debuginfo-6.2.0-150400.37.5.3
qemu-hw-display-qxl-6.2.0-150400.37.5.3
qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.5.3
qemu-hw-display-virtio-gpu-6.2.0-150400.37.5.3
qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.5.3 qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.5.3
qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.5.3 qemu-hw-display-virtio-vga-6.2.0-150400.37.5.3
qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.5.3 qemu-hw-s390x-virtio-gpu-ccw-6.2.0-150400.37.5.3
qemu-hw-s390x-virtio-gpu-ccw-debuginfo-6.2.0-150400.37.5.3 qemu-hw-usb-host-6.2.0-150400.37.5.3
qemu-hw-usb-host-debuginfo-6.2.0-150400.37.5.3
qemu-hw-usb-redirect-6.2.0-150400.37.5.3
qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.5.3
qemu-hw-usb-smartcard-6.2.0-150400.37.5.3
qemu-hw-usb-smartcard-debuginfo-6.2.0-150400.37.5.3
qemu-ivshmem-tools-6.2.0-150400.37.5.3
qemu-ivshmem-tools-debuginfo-6.2.0-150400.37.5.3
qemu-ksm-6.2.0-150400.37.5.3
qemu-lang-6.2.0-150400.37.5.3
qemu-linux-user-6.2.0-150400.37.5.1
qemu-linux-user-debuginfo-6.2.0-150400.37.5.1
qemu-linux-user-debugsource-6.2.0-150400.37.5.1
qemu-ppc-6.2.0-150400.37.5.3
qemu-ppc-debuginfo-6.2.0-150400.37.5.3
qemu-s390x-6.2.0-150400.37.5.3
qemu-s390x-debuginfo-6.2.0-150400.37.5.3
qemu-testsuite-6.2.0-150400.37.5.5
qemu-tools-6.2.0-150400.37.5.3
qemu-tools-debuginfo-6.2.0-150400.37.5.3
qemu-ui-curses-6.2.0-150400.37.5.3
qemu-ui-curses-debuginfo-6.2.0-150400.37.5.3
qemu-ui-gtk-6.2.0-150400.37.5.3
qemu-ui-gtk-debuginfo-6.2.0-150400.37.5.3
qemu-ui-opengl-6.2.0-150400.37.5.3
qemu-ui-opengl-debuginfo-6.2.0-150400.37.5.3
qemu-ui-spice-app-6.2.0-150400.37.5.3
qemu-ui-spice-app-debuginfo-6.2.0-150400.37.5.3
qemu-ui-spice-core-6.2.0-150400.37.5.3
qemu-ui-spice-core-debuginfo-6.2.0-150400.37.5.3
qemu-vhost-user-gpu-6.2.0-150400.37.5.3
qemu-vhost-user-gpu-debuginfo-6.2.0-150400.37.5.3
qemu-x86-6.2.0-150400.37.5.3
qemu-x86-debuginfo-6.2.0-150400.37.5.3

- openSUSE Leap 15.4 (s390x x86_64):

qemu-kvm-6.2.0-150400.37.5.3

- openSUSE Leap 15.4 (noarch):

qemu-SLOF-6.2.0-150400.37.5.3
qemu-ipxe-1.0.0+-150400.37.5.3
qemu-microvm-6.2.0-150400.37.5.3
qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.5.3
qemu-sgabios-8-150400.37.5.3
qemu-skiboot-6.2.0-150400.37.5.3
qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.5.3

- SUSE Linux Enterprise Module for Server Applications 15-SP4 (aarch64 ppc64le s390x x86_64):

qemu-6.2.0-150400.37.5.3
qemu-block-curl-6.2.0-150400.37.5.3
qemu-block-curl-debuginfo-6.2.0-150400.37.5.3
qemu-block-iscsi-6.2.0-150400.37.5.3
qemu-block-iscsi-debuginfo-6.2.0-150400.37.5.3
qemu-block-rbd-6.2.0-150400.37.5.3
qemu-block-rbd-debuginfo-6.2.0-150400.37.5.3
qemu-block-ssh-6.2.0-150400.37.5.3
qemu-block-ssh-debuginfo-6.2.0-150400.37.5.3
qemu-chardev-baum-6.2.0-150400.37.5.3
qemu-chardev-baum-debuginfo-6.2.0-150400.37.5.3
qemu-debuginfo-6.2.0-150400.37.5.3
qemu-debugsource-6.2.0-150400.37.5.3
qemu-guest-agent-6.2.0-150400.37.5.3
qemu-guest-agent-debuginfo-6.2.0-150400.37.5.3
qemu-hw-usb-host-6.2.0-150400.37.5.3
qemu-hw-usb-host-debuginfo-6.2.0-150400.37.5.3
qemu-ksm-6.2.0-150400.37.5.3
qemu-lang-6.2.0-150400.37.5.3
qemu-ui-curses-6.2.0-150400.37.5.3
qemu-ui-curses-debuginfo-6.2.0-150400.37.5.3

- SUSE Linux Enterprise Module for Server Applications 15-SP4 (aarch64 ppc64le x86_64):

qemu-audio-spice-6.2.0-150400.37.5.3
qemu-audio-spice-debuginfo-6.2.0-150400.37.5.3
qemu-chardev-spice-6.2.0-150400.37.5.3
qemu-chardev-spice-debuginfo-6.2.0-150400.37.5.3
qemu-hw-display-qxl-6.2.0-150400.37.5.3
qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.5.3
qemu-hw-display-virtio-vga-6.2.0-150400.37.5.3
qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.5.3 qemu-hw-usb-redirect-6.2.0-150400.37.5.3
qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.5.3
qemu-ui-gtk-6.2.0-150400.37.5.3
qemu-ui-gtk-debuginfo-6.2.0-150400.37.5.3
qemu-ui-opengl-6.2.0-150400.37.5.3
qemu-ui-opengl-debuginfo-6.2.0-150400.37.5.3
qemu-ui-spice-app-6.2.0-150400.37.5.3
qemu-ui-spice-app-debuginfo-6.2.0-150400.37.5.3
qemu-ui-spice-core-6.2.0-150400.37.5.3
qemu-ui-spice-core-debuginfo-6.2.0-150400.37.5.3

- SUSE Linux Enterprise Module for Server Applications 15-SP4 (s390x x86_64):

qemu-hw-display-virtio-gpu-6.2.0-150400.37.5.3
qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.5.3 qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.5.3
qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.5.3 qemu-kvm-6.2.0-150400.37.5.3

- SUSE Linux Enterprise Module for Server Applications 15-SP4 (aarch64):
qemu-arm-6.2.0-150400.37.5.3
qemu-arm-debuginfo-6.2.0-150400.37.5.3

- SUSE Linux Enterprise Module for Server Applications 15-SP4 (ppc64le):
qemu-ppc-6.2.0-150400.37.5.3
qemu-ppc-debuginfo-6.2.0-150400.37.5.3

- SUSE Linux Enterprise Module for Server Applications 15-SP4 (x86_64):
qemu-accel-tcg-x86-6.2.0-150400.37.5.3
qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.5.3
qemu-audio-alsa-6.2.0-150400.37.5.3
qemu-audio-alsa-debuginfo-6.2.0-150400.37.5.3
qemu-audio-pa-6.2.0-150400.37.5.3
qemu-audio-pa-debuginfo-6.2.0-150400.37.5.3
qemu-x86-6.2.0-150400.37.5.3
qemu-x86-debuginfo-6.2.0-150400.37.5.3

- SUSE Linux Enterprise Module for Server Applications 15-SP4 (noarch):
qemu-SLOF-6.2.0-150400.37.5.3
qemu-ipxe-1.0.0+-150400.37.5.3
qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.5.3
qemu-sgabios-8-150400.37.5.3
qemu-skiboot-6.2.0-150400.37.5.3
qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.5.3

- SUSE Linux Enterprise Module for Server Applications 15-SP4 (s390x):
qemu-hw-s390x-virtio-gpu-ccw-6.2.0-150400.37.5.3
qemu-hw-s390x-virtio-gpu-ccw-debuginfo-6.2.0-150400.37.5.3 qemu-s390x-6.2.0-150400.37.5.3
qemu-s390x-debuginfo-6.2.0-150400.37.5.3

- SUSE Linux Enterprise Module for Basesystem 15-SP4 (aarch64 ppc64le s390x x86_64):

qemu-debuginfo-6.2.0-150400.37.5.3
qemu-debugsource-6.2.0-150400.37.5.3
qemu-tools-6.2.0-150400.37.5.3
qemu-tools-debuginfo-6.2.0-150400.37.5.3

References:

  https://www.suse.com/security/cve/CVE-2021-4206.html
  https://www.suse.com/security/cve/CVE-2021-4207.html
  https://www.suse.com/security/cve/CVE-2022-26353.html
  https://www.suse.com/security/cve/CVE-2022-26354.html
  https://bugzilla.suse.com/1197084
  https://bugzilla.suse.com/1198035
  https://bugzilla.suse.com/1198037
  https://bugzilla.suse.com/1198711
  https://bugzilla.suse.com/1198712
  https://bugzilla.suse.com/1199015
  https://bugzilla.suse.com/1199018
  https://bugzilla.suse.com/1199625
  https://bugzilla.suse.com/1199924