File _patchinfo of Package patchinfo.6079
<patchinfo incident="6079">
<issue id="1002549" tracker="bnc">VUL-0: CVE-2016-7907: qemu: net: inifinte loop in imx_fec_do_tx() function</issue>
<issue id="1002116" tracker="bnc">qemu is retriggering device events for *all* devices in its %post</issue>
<issue id="1001151" tracker="bnc">VUL-0: CVE-2016-7161: qemu, kvm: hw: net: Heap overflow in xlnx.xps-ethernetlite</issue>
<issue id="1007494" tracker="bnc">VUL-0: CVE-2016-9105: qemu: memory leakage in v9fs_link</issue>
<issue id="1007495" tracker="bnc">VUL-0: CVE-2016-9106: qemu: 9pfs: memory leakage in v9fs_write</issue>
<issue id="1007493" tracker="bnc">VUL-0: CVE-2016-9104: qemu: 9pfs: integer overflow leading to OOB access</issue>
<issue id="1000345" tracker="bnc">VUL-0: CVE-2016-7466: qemu: usb: xhci memory leakage during device unplug</issue>
<issue id="1000346" tracker="bnc">VUL-0: CVE-2016-7422: qemu: virtio: null pointer dereference in virtqueu_map_desc</issue>
<issue id="1003894" tracker="bnc">VUL-0: CVE-2016-8578: qemu, kvm: 9pfs: potential NULL dereference in 9pfs routines</issue>
<issue id="1003878" tracker="bnc">VUL-0: CVE-2016-8576: qemu, kvm: usb: xHCI: infinite loop vulnerability in xhci_ring_fetch</issue>
<issue id="1003893" tracker="bnc">VUL-0: CVE-2016-8577: qemu, kvm: 9pfs: host memory leakage in v9fs_read</issue>
<issue id="1007391" tracker="bnc">VUL-0: CVE-2016-9101: qemu: net: eepro100 memory leakage at device unplug</issue>
<issue id="1005374" tracker="bnc">kvm-supported.txt needs update for aarch64</issue>
<issue id="998516" tracker="bnc">VUL-1: CVE-2016-7170: qemu: vmware_vga: OOB stack memory access when processing svga command</issue>
<issue id="1004707" tracker="bnc">VUL-0: CVE-2016-8669: qemu, kvm: char: divide by zero error in serial_update_parameters</issue>
<issue id="1004706" tracker="bnc">VUL-0: CVE-2016-8668: Qemu: net: OOB buffer access in rocker switch emulation</issue>
<issue id="1002557" tracker="bnc">VUL-0: CVE-2016-7909: qemu, kvm: net: pcnet: infinite loop in pcnet_rdra_addr</issue>
<issue id="1005353" tracker="bnc">kvm-supported.txt should be packaged on aarch64</issue>
<issue id="1004702" tracker="bnc">CVE-2016-8667: qemu, kvm: dma: rc4030 divide by zero error in set_next_tick</issue>
<issue id="1007769" tracker="bnc">Upstream Qemu virtual L3 patch to improve performance of message-passing workloads</issue>
<issue id="1008148" tracker="bnc">Migration fails if a snapshot was created within the session</issue>
<issue id="1002550" tracker="bnc">VUL-0: CVE-2016-7908: qemu, kvm: net: Infinite loop in mcf_fec_do_tx</issue>
<issue id="1006538" tracker="bnc">VUL-0: CVE-2016-8910: qemu, kvm: net: rtl8139: infinite loop while transmit in C+ mode</issue>
<issue id="1006536" tracker="bnc">VUL-0: CVE-2016-8909: qemu, kvm: audio: intel-hda: infinite loop in processing dma buffer stream</issue>
<issue id="1003612" tracker="bnc">VUL-0: CVE-2016-7995: qemu: usb: hcd-ehci: memory leak in ehci_process_itd</issue>
<issue id="1003613" tracker="bnc">VUL-0: CVE-2016-7994: qemu: virtio-gpu: memory leak in virtio_gpu_resource_create_2d</issue>
<issue id="2016-7466" tracker="cve" />
<issue id="2016-8578" tracker="cve" />
<issue id="2016-7907" tracker="cve" />
<issue id="2016-8669" tracker="cve" />
<issue id="2016-7161" tracker="cve" />
<issue id="2016-7170" tracker="cve" />
<issue id="2016-8909" tracker="cve" />
<issue id="2016-7994" tracker="cve" />
<issue id="2016-7995" tracker="cve" />
<issue id="2016-7909" tracker="cve" />
<issue id="2016-7908" tracker="cve" />
<issue id="2016-8577" tracker="cve" />
<issue id="2016-8910" tracker="cve" />
<issue id="2016-7422" tracker="cve" />
<issue id="2016-9101" tracker="cve" />
<issue id="2016-9106" tracker="cve" />
<issue id="2016-9105" tracker="cve" />
<issue id="2016-9104" tracker="cve" />
<issue id="2016-8576" tracker="cve" />
<issue id="2016-8667" tracker="cve" />
<issue id="2016-8668" tracker="cve" />
<issue id="316228" tracker="fate" />
<category>security</category>
<rating>moderate</rating>
<packager>bfrogers</packager>
<description>This update for qemu to version 2.6.2 fixes the several issues.
These security issues were fixed:
- CVE-2016-7161: Heap-based buffer overflow in the .receive callback of xlnx.xps-ethernetlite in QEMU (aka Quick Emulator) allowed attackers to execute arbitrary code on the QEMU host via a large ethlite packet (bsc#1001151).
- CVE-2016-7170: OOB stack memory access when processing svga command (bsc#998516).
- CVE-2016-7466: xhci memory leakage during device unplug (bsc#1000345).
- CVE-2016-7422: NULL pointer dereference in virtqueu_map_desc (bsc#1000346).
- CVE-2016-7908: The mcf_fec_do_tx function in hw/net/mcf_fec.c did not properly limit the buffer descriptor count when transmitting packets, which allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via vectors involving a buffer descriptor with a length of 0 and crafted values in bd.flags (bsc#1002550).
- CVE-2016-7995: Memory leak in ehci_process_itd (bsc#1003612).
- CVE-2016-8576: The xhci_ring_fetch function in hw/usb/hcd-xhci.c allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by leveraging failure to limit the number of link Transfer Request Blocks (TRB) to process (bsc#1003878).
- CVE-2016-8578: The v9fs_iov_vunmarshal function in fsdev/9p-iov-marshal.c allowed local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) by sending an empty string parameter to a 9P operation (bsc#1003894).
- CVE-2016-9105: Memory leakage in v9fs_link (bsc#1007494).
- CVE-2016-8577: Memory leak in the v9fs_read function in hw/9pfs/9p.c allowed local guest OS administrators to cause a denial of service (memory consumption) via vectors related to an I/O read operation (bsc#1003893).
- CVE-2016-9106: Memory leakage in v9fs_write (bsc#1007495).
- CVE-2016-8669: The serial_update_parameters function in hw/char/serial.c allowed local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via vectors involving a value of divider greater than baud base (bsc#1004707).
- CVE-2016-7909: The pcnet_rdra_addr function in hw/net/pcnet.c allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by setting the (1) receive or (2) transmit descriptor ring length to 0 (bsc#1002557).
- CVE-2016-9101: eepro100 memory leakage whern unplugging a device (bsc#1007391).
- CVE-2016-8668: The rocker_io_writel function in hw/net/rocker/rocker.c allowed local guest OS administrators to cause a denial of service (out-of-bounds read and QEMU process crash) by leveraging failure to limit DMA buffer size (bsc#1004706).
- CVE-2016-8910: The rtl8139_cplus_transmit function in hw/net/rtl8139.c allowed local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) by leveraging failure to limit the ring descriptor count (bsc#1006538).
- CVE-2016-8909: The intel_hda_xfer function in hw/audio/intel-hda.c allowed local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via an entry with the same value for buffer length and pointer position (bsc#1006536).
- CVE-2016-7994: Memory leak in virtio_gpu_resource_create_2d (bsc#1003613).
- CVE-2016-9104: Integer overflow leading to OOB access in 9pfs (bsc#1007493).
- CVE-2016-8667: The rc4030_write function in hw/dma/rc4030.c allowed local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via a large interval timer reload value (bsc#1004702).
- CVE-2016-7907: The pcnet_rdra_addr function in hw/net/pcnet.c allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by setting the (1) receive or (2) transmit descriptor ring length to 0 (bsc#1002549).
These non-security issues were fixed:
- Change kvm-supported.txt to be per-architecture documentation, stored in the
package documentation directory of each per-arch package (bsc#1005353).
- Update support doc to include current ARM64 (AArch64) support stance (bsc#1005374).
- Fix migration failure when snapshot also has been done (bsc#1008148).
- Change package post script udevadm trigger calls to be device specific (bsc#1002116).
- Add qmp-commands.txt documentation file back in. It was inadvertently dropped.
- Add an x86 cpu option (l3-cache) to specify that an L3 cache is present and
another option (cpuid-0xb) to enable the cpuid 0xb leaf (bsc#1007769).
This update was imported from the SUSE:SLE-12-SP2:Update update project.</description>
<summary>Security update for qemu</summary>
</patchinfo>