First published: Tue Sep 24 2019(Updated: )
In QEMU 1:4.1-1, 1:2.1+dfsg-12+deb8u6, 1:2.8+dfsg-6+deb9u8, 1:3.1+dfsg-8~deb10u1, 1:3.1+dfsg-8+deb10u2, and 1:2.1+dfsg-12+deb8u12 (fixed), when executing script in lsi_execute_script(), the LSI scsi adapter emulator advances 's->dsp' index to read next opcode. This can lead to an infinite loop if the next opcode is empty. Move the existing loop exit after 10k iterations so that it covers no-op opcodes as well.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU qemu | =1\-4.1-1 | |
QEMU qemu | =1\-2.1\+dfsg-12\+deb8u6 | |
Debian Debian Linux | =8.0 | |
QEMU qemu | =1\-2.8\+dfsg-6\+deb9u8 | |
Debian Debian Linux | =9.0 | |
QEMU qemu | =1\-3.1\+dfsg-8\+deb10u2 | |
QEMU qemu | =1\-3.1\+dfsg-8\~deb10u1 | |
Debian Debian Linux | =10.0 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =19.04 | |
Canonical Ubuntu Linux | =19.10 | |
openSUSE Leap | =15.0 | |
openSUSE Leap | =15.1 | |
All of | ||
QEMU qemu | =1\-2.1\+dfsg-12\+deb8u6 | |
Debian Debian Linux | =8.0 | |
All of | ||
QEMU qemu | =1\-2.8\+dfsg-6\+deb9u8 | |
Debian Debian Linux | =9.0 | |
All of | ||
Any of | ||
QEMU qemu | =1\-3.1\+dfsg-8\+deb10u2 | |
QEMU qemu | =1\-3.1\+dfsg-8\~deb10u1 | |
Debian Debian Linux | =10.0 | |
debian/qemu | 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u7 1:9.2.0+ds-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-12068 is low.
CVE-2019-12068 affects QEMU versions 1:4.1-1, 1:2.1+dfsg-12+deb8u6, 1:2.8+dfsg-6+deb9u8, 1:3.1+dfsg-8~deb10u1, 1:3.1+dfsg-8+deb10u2, and 1:2.1+dfsg-12+deb8u12 (fixed).
To fix CVE-2019-12068 in QEMU, update to version 1:4.1-2 or later.
Debian Linux versions 8.0, 9.0, and 10.0 are not vulnerable to CVE-2019-12068.
More information about CVE-2019-12068 can be found at the following references: - [GIT Commit](https://git.qemu.org/?p=qemu.git;a=commit;h=de594e47659029316bbf9391efb79da0a1a08e08) - [QEMU Development Mailing List](https://lists.gnu.org/archive/html/qemu-devel/2019-08/msg01518.html) - [Debian Security Tracker](https://security-tracker.debian.org/tracker/CVE-2019-12068)