First published: Tue Sep 24 2019(Updated: )
In QEMU 1:4.1-1, 1:2.1+dfsg-12+deb8u6, 1:2.8+dfsg-6+deb9u8, 1:3.1+dfsg-8~deb10u1, 1:3.1+dfsg-8+deb10u2, and 1:2.1+dfsg-12+deb8u12 (fixed), when executing script in lsi_execute_script(), the LSI scsi adapter emulator advances 's->dsp' index to read next opcode. This can lead to an infinite loop if the next opcode is empty. Move the existing loop exit after 10k iterations so that it covers no-op opcodes as well.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU KVM | =1\-4.1-1 | |
All of | ||
QEMU KVM | =1\-2.1\+dfsg-12\+deb8u6 | |
Debian GNU/Linux | =8.0 | |
All of | ||
QEMU KVM | =1\-2.8\+dfsg-6\+deb9u8 | |
Debian GNU/Linux | =9.0 | |
All of | ||
Any of | ||
QEMU KVM | =1\-3.1\+dfsg-8\+deb10u2 | |
QEMU KVM | =1\-3.1\+dfsg-8\~deb10u1 | |
Debian GNU/Linux | =10.0 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =18.04 | |
Ubuntu Linux | =19.04 | |
Ubuntu Linux | =19.10 | |
openSUSE | =15.0 | |
openSUSE | =15.1 | |
QEMU KVM | =1\-2.1\+dfsg-12\+deb8u6 | |
Debian | =8.0 | |
QEMU KVM | =1\-2.8\+dfsg-6\+deb9u8 | |
Debian | =9.0 | |
QEMU KVM | =1\-3.1\+dfsg-8\+deb10u2 | |
QEMU KVM | =1\-3.1\+dfsg-8\~deb10u1 | |
Debian | =10.0 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =19.04 | |
Ubuntu | =19.10 | |
debian/qemu | 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u12 1:9.2.1+ds-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-12068 is low.
CVE-2019-12068 affects QEMU versions 1:4.1-1, 1:2.1+dfsg-12+deb8u6, 1:2.8+dfsg-6+deb9u8, 1:3.1+dfsg-8~deb10u1, 1:3.1+dfsg-8+deb10u2, and 1:2.1+dfsg-12+deb8u12 (fixed).
To fix CVE-2019-12068 in QEMU, update to version 1:4.1-2 or later.
Debian Linux versions 8.0, 9.0, and 10.0 are not vulnerable to CVE-2019-12068.
More information about CVE-2019-12068 can be found at the following references: - [GIT Commit](https://git.qemu.org/?p=qemu.git;a=commit;h=de594e47659029316bbf9391efb79da0a1a08e08) - [QEMU Development Mailing List](https://lists.gnu.org/archive/html/qemu-devel/2019-08/msg01518.html) - [Debian Security Tracker](https://security-tracker.debian.org/tracker/CVE-2019-12068)