CVE-2019-12068

In QEMU 1:4.1-1, 1:2.1+dfsg-12+deb8u6, 1:2.8+dfsg-6+deb9u8, 1:3.1+dfsg-8~deb10u1, 1:3.1+dfsg-8+deb10u2, and 1:2.1+dfsg-12+deb8u12 (fixed), when executing script in lsi_execute_script(), the LSI scsi adapter emulator advances 's->dsp' index to read next opcode. This can lead to an infinite loop if the next opcode is empty. Move the existing loop exit after 10k iterations so that it covers no-op opcodes as well.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00034.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00038.html Third Party Advisory
https://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=de594e47659029316bbf9391efb79da0a1a08e08
https://lists.debian.org/debian-lts-announce/2019/09/msg00021.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2020/07/msg00020.html
https://lists.gnu.org/archive/html/qemu-devel/2019-08/msg01518.html Mailing List Patch Third Party Advisory
https://security-tracker.debian.org/tracker/CVE-2019-12068 Third Party Advisory
https://usn.ubuntu.com/4191-1/ Third Party Advisory
https://usn.ubuntu.com/4191-2/ Third Party Advisory
https://www.debian.org/security/2020/dsa-4665
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00034.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00038.html Third Party Advisory
https://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=de594e47659029316bbf9391efb79da0a1a08e08
https://lists.debian.org/debian-lts-announce/2019/09/msg00021.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2020/07/msg00020.html
https://lists.gnu.org/archive/html/qemu-devel/2019-08/msg01518.html Mailing List Patch Third Party Advisory
https://security-tracker.debian.org/tracker/CVE-2019-12068 Third Party Advisory
https://usn.ubuntu.com/4191-1/ Third Party Advisory
https://usn.ubuntu.com/4191-2/ Third Party Advisory
https://www.debian.org/security/2020/dsa-4665
Configurations

Configuration 1 (hide)

cpe:2.3:a:qemu:qemu:1\:4.1-1:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:a:qemu:qemu:1\:2.1\+dfsg-12\+deb8u6:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:a:qemu:qemu:1\:2.8\+dfsg-6\+deb9u8:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
OR cpe:2.3:a:qemu:qemu:1\:3.1\+dfsg-8\+deb10u2:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:1\:3.1\+dfsg-8\~deb10u1:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*

History

21 Nov 2024, 04:22

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00034.html - Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00034.html - Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00038.html - Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00038.html - Third Party Advisory
References () https://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=de594e47659029316bbf9391efb79da0a1a08e08 - () https://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=de594e47659029316bbf9391efb79da0a1a08e08 -
References () https://lists.debian.org/debian-lts-announce/2019/09/msg00021.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2019/09/msg00021.html - Mailing List, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2020/07/msg00020.html - () https://lists.debian.org/debian-lts-announce/2020/07/msg00020.html -
References () https://lists.gnu.org/archive/html/qemu-devel/2019-08/msg01518.html - Mailing List, Patch, Third Party Advisory () https://lists.gnu.org/archive/html/qemu-devel/2019-08/msg01518.html - Mailing List, Patch, Third Party Advisory
References () https://security-tracker.debian.org/tracker/CVE-2019-12068 - Third Party Advisory () https://security-tracker.debian.org/tracker/CVE-2019-12068 - Third Party Advisory
References () https://usn.ubuntu.com/4191-1/ - Third Party Advisory () https://usn.ubuntu.com/4191-1/ - Third Party Advisory
References () https://usn.ubuntu.com/4191-2/ - Third Party Advisory () https://usn.ubuntu.com/4191-2/ - Third Party Advisory
References () https://www.debian.org/security/2020/dsa-4665 - () https://www.debian.org/security/2020/dsa-4665 -

07 Nov 2023, 03:03

Type Values Removed Values Added
References
  • {'url': 'https://git.qemu.org/?p=qemu.git;a=commit;h=de594e47659029316bbf9391efb79da0a1a08e08', 'name': 'https://git.qemu.org/?p=qemu.git;a=commit;h=de594e47659029316bbf9391efb79da0a1a08e08', 'tags': ['Mailing List', 'Vendor Advisory'], 'refsource': 'MISC'}
  • () https://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=de594e47659029316bbf9391efb79da0a1a08e08 -

Information

Published : 2019-09-24 20:15

Updated : 2024-11-21 04:22


NVD link : CVE-2019-12068

Mitre link : CVE-2019-12068

CVE.ORG link : CVE-2019-12068


JSON object : View

Products Affected

debian

  • debian_linux

canonical

  • ubuntu_linux

opensuse

  • leap

qemu

  • qemu
CWE
CWE-835

Loop with Unreachable Exit Condition ('Infinite Loop')