Oval Definition:oval:org.opensuse.security:def:87362
Revision Date:2021-04-16Version:1
Title:Security update for qemu (Important)
Description:

This update for qemu fixes the following issues:

- Fix OOB access in sm501 device emulation (CVE-2020-12829, bsc#1172385) - Fix OOB access possibility in MegaRAID SAS 8708EM2 emulation (CVE-2020-13362 bsc#1172383) - Fix use-after-free in usb xhci packet handling (CVE-2020-25723, bsc#1178934) - Fix use-after-free in usb ehci packet handling (CVE-2020-25084, bsc#1176673) - Fix OOB access in usb hcd-ohci emulation (CVE-2020-25624, bsc#1176682) - Fix infinite loop (DoS) in usb hcd-ohci emulation (CVE-2020-25625, bsc#1176684) - Fix guest triggerable assert in shared network handling code (CVE-2020-27617, bsc#1178174) - Fix infinite loop (DoS) in e1000e device emulation (CVE-2020-28916, bsc#1179468) - Fix OOB access in atapi emulation (CVE-2020-29443, bsc#1181108) - Fix null pointer deref. (DoS) in mmio ops (CVE-2020-15469, bsc#1173612) - Fix infinite loop (DoS) in e1000 device emulation (CVE-2021-20257, bsc#1182577) - Fix OOB access (stack overflow) in rtl8139 NIC emulation (CVE-2021-3416, bsc#1182968) - Fix OOB access (stack overflow) in other NIC emulations (CVE-2021-3416) - Fix OOB access in SLIRP ARP packet processing (CVE-2020-29130, bsc#1179467) - Fix null pointer dereference possibility (DoS) in MegaRAID SAS 8708EM2 emulation (CVE-2020-13659 bsc#1172386 - Fix OOB access in iscsi (CVE-2020-11947 bsc#1180523) - Fix OOB access in vmxnet3 emulation (CVE-2021-20203 bsc#1181639) - Fix buffer overflow in the XGMAC device (CVE-2020-15863, bsc#1174386) - Fix DoS in packet processing of various emulated NICs (CVE-2020-16092 bsc#1174641) - Fix OOB access while processing USB packets (CVE-2020-14364 bsc#1175441) - Fix package scripts to not use hard coded paths for temporary working directories and log files (bsc#1182425) - Fix potential privilege escalation in virtfs (CVE-2021-20181 bsc#1182137) - Fix OOB access possibility in ES1370 audio device emulation (CVE-2020-13361 bsc#1172384) - Fix OOB access in ROM loading (CVE-2020-13765 bsc#1172478)
Family:unixClass:patch
Status:Reference(s):1172383
1172384
1172385
1172386
1172478
1173612
1174386
1174641
1175441
1176673
1176682
1176684
1178174
1178934
1179467
1179468
1180523
1181108
1181639
1182137
1182425
1182577
1182968
CVE-2020-11947
CVE-2020-12829
CVE-2020-13361
CVE-2020-13362
CVE-2020-13659
CVE-2020-13765
CVE-2020-14364
CVE-2020-15469
CVE-2020-15863
CVE-2020-16092
CVE-2020-25084
CVE-2020-25624
CVE-2020-25625
CVE-2020-25723
CVE-2020-27617
CVE-2020-28916
CVE-2020-29130
CVE-2020-29443
CVE-2021-20181
CVE-2021-20203
CVE-2021-20257
CVE-2021-3416
Platform(s):SUSE Linux Enterprise Server 12 SP3-TERADATA
Product(s):
Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP3-TERADATA is installed
  • AND Package Information
  • qemu-2.9.1-6.47.1 is installed
  • OR qemu-block-curl-2.9.1-6.47.1 is installed
  • OR qemu-block-iscsi-2.9.1-6.47.1 is installed
  • OR qemu-block-rbd-2.9.1-6.47.1 is installed
  • OR qemu-block-ssh-2.9.1-6.47.1 is installed
  • OR qemu-guest-agent-2.9.1-6.47.1 is installed
  • OR qemu-ipxe-1.0.0+-6.47.1 is installed
  • OR qemu-kvm-2.9.1-6.47.1 is installed
  • OR qemu-lang-2.9.1-6.47.1 is installed
  • OR qemu-seabios-1.10.2_0_g5f4c7b1-6.47.1 is installed
  • OR qemu-sgabios-8-6.47.1 is installed
  • OR qemu-tools-2.9.1-6.47.1 is installed
  • OR qemu-vgabios-1.10.2_0_g5f4c7b1-6.47.1 is installed
  • OR qemu-x86-2.9.1-6.47.1 is installed
  • BACK