安全公告详情

NS-SA-2025-0227

2025-09-30 16:49:52

简介

important: gcc/qemu security update

严重级别

important

主题

An update for gcc/qemu is now available for NewStart CGSL MAIN 6.06.
NewStart Security has rated this update as having a security impact of important. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

gcc:
qemu:


Security Fix(es):
gcc: The POWER9 backend in GNU Compiler Collection (GCC) before version 10 could optimize multiple calls of the __builtin_darn intrinsic into a single call, thus reducing the entropy of the random number generator. This occurred because a volatile operation was not specified. For example, within a single execution of a program, the output of every __builtin_darn() call may be the same.(CVE-2019-15847)
gcc: bugfix
qemu: A flaw was found in QEMU's LSI53C895A device emulator. When executing LSI scripts, a crafted sequence of I/O requests may cause the emulator to enter into an infinite loop. This vulnerability could be executed locally and would affect the availability of the system.(CVE-2019-12068)
qemu: A use-after-free issue was found in the SLiRP networking implementation of the QEMU emulator. The issue occurs in ip_reass() routine while reassembling incoming packets, if the first fragment is bigger than the m->m_dat[] buffer. A user or process could use this flaw to crash the QEMU process on the host, resulting in a denial of service.(CVE-2019-15890)
qemu: An out-of-bounds read/write access flaw was found in the USB emulator of the QEMU. This issue occurs while processing USB packets from a guest when USBDevice 'setup_len' exceeds its 'data_buf[4096]' in the do_token_in, do_token_out routines. This flaw allows a guest user to crash the QEMU process, resulting in a denial of service, or the potential execution of arbitrary code with the privileges of the QEMU process on the host.(CVE-2020-14364)
qemu: An out-of-bounds heap buffer access flaw was found in the way the iSCSI Block driver in QEMU handled a response coming from an iSCSI server while checking the status of a Logical Address Block (LBA) in an iscsi_co_block_status() routine. A remote user could use this flaw to crash the QEMU process, resulting in a denial of service or potential execution of arbitrary code with privileges of the QEMU process on the host.(CVE-2020-1711)
qemu: A flaw was found in the USB redirector device emulation of QEMU. It occurs when dropping packets during a bulk transfer from a SPICE client due to the packet queue being full. A malicious SPICE client could use this flaw to make QEMU call free() with faked heap chunk metadata, resulting in a crash of QEMU or potential code execution with the privileges of the QEMU process on the host.(CVE-2021-3682)
qemu: An out-of-bounds write flaw was found in the UAS (USB Attached SCSI) device emulation of QEMU. The device uses the guest supplied stream number unchecked, which can lead to out-of-bounds access to the UASDevice->data3 and UASDevice->status3 fields. A malicious guest user could use this flaw to crash QEMU or potentially achieve code execution with the privileges of the QEMU process on the host.(CVE-2021-3713)
qemu: A use-after-free vulnerability was found in the LSI53C895A SCSI Host Bus Adapter emulation of QEMU. The flaw occurs while processing repeated messages to cancel the current SCSI request via the lsi_do_msgout function. This flaw allows a malicious privileged user within the guest to crash the QEMU process on the host, resulting in a denial of service.(CVE-2022-0216)
qemu: An off-by-one read/write issue was found in the SDHCI device of QEMU. It occurs when reading/writing the Buffer Data Port Register in sdhci_read_dataport and sdhci_write_dataport, respectively, if data_count == block_size. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition.(CVE-2022-3872)
qemu: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 6.06.01B6.

影响组件

  • gcc
  • qemu

影响产品

  • CGSL MAIN 6.06

更新包

{"fix":[{"product":"CGSL MAIN 6.06","pkgs":[{"binary":["cpp-8.5.0-10.1.0.1.zncgsl6_6.x86_64.rpm","gcc-8.5.0-10.1.0.1.zncgsl6_6.x86_64.rpm","libasan-8.5.0-10.1.0.1.zncgsl6_6.x86_64.rpm","libatomic-8.5.0-10.1.0.1.zncgsl6_6.x86_64.rpm","libgcc-8.5.0-10.1.0.1.zncgsl6_6.x86_64.rpm","libgfortran-8.5.0-10.1.0.1.zncgsl6_6.x86_64.rpm","libgomp-8.5.0-10.1.0.1.zncgsl6_6.x86_64.rpm","libquadmath-8.5.0-10.1.0.1.zncgsl6_6.x86_64.rpm","libstdc++-8.5.0-10.1.0.1.zncgsl6_6.x86_64.rpm","libubsan-8.5.0-10.1.0.1.zncgsl6_6.x86_64.rpm"],"source":"gcc-8.5.0-10.1.0.1.zncgsl6_6.src.rpm"},{"binary":["qemu-4.1.0-2.zncgsl6.t3.0.x86_64.rpm","qemu-block-curl-4.1.0-2.zncgsl6.t3.0.x86_64.rpm","qemu-block-dmg-4.1.0-2.zncgsl6.t3.0.x86_64.rpm","qemu-block-gluster-4.1.0-2.zncgsl6.t3.0.x86_64.rpm","qemu-block-iscsi-4.1.0-2.zncgsl6.t3.0.x86_64.rpm","qemu-block-rbd-4.1.0-2.zncgsl6.t3.0.x86_64.rpm","qemu-block-ssh-4.1.0-2.zncgsl6.t3.0.x86_64.rpm","qemu-common-4.1.0-2.zncgsl6.t3.0.x86_64.rpm","qemu-img-4.1.0-2.zncgsl6.t3.0.x86_64.rpm","qemu-kvm-4.1.0-2.zncgsl6.t3.0.x86_64.rpm","qemu-tools-4.1.0-2.zncgsl6.t3.0.x86_64.rpm"],"source":"qemu-4.1.0-2.zncgsl6.t3.0.src.rpm"}]}]}

CVE

参考