[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

SUSE-SU-2020:0845-1 -- SLES qemu, qemu-guest-agent

ID: oval:org.secpod.oval:def:89000498Date: (C)2021-02-19   (M)2023-12-20
Class: PATCHFamily: unix




This update for qemu fixes the following issues: - CVE-2020-7039: Fixed a heap buffer overflow in tcp_emu routine while emulating IRC and other protocols . - CVE-2019-15034: Fixed a buffer overflow in hw/display/bochs-display.c due to improper PCI config space allocation . - CVE-2020-1711: Fixed an out of bounds heap buffer access iscsi_co_block_status routine which could have allowed a remote denial of service or arbitrary code with privileges of the QEMU process on the host . - CVE-2019-6778: Fixed a heap buffer overflow in tcp_emu routine while emulating the identification protocol and copying message data to a socket buffer . - CVE-2020-8608: Fixed a heap buffer overflow in tcp_emu routine while emulating IRC and other protocols . - CVE-2019-20382: Fixed a memory leak in the VNC display driver which could have led to exhaustion of the host memory leading to a potential Denial of service . - Fixed live migration errors . - Fixed an issue where migrating VMs on KVM gets missing features:ospke error . - Fixed an issue where booting up a guest system with mdev passthrough device as installation device was failing .

Platform:
SUSE Linux Enterprise Server 12 SP5
Product:
qemu
qemu-guest-agent
Reference:
SUSE-SU-2020:0845-1
CVE-2019-15034
CVE-2019-20382
CVE-2019-6778
CVE-2020-1711
CVE-2020-7039
CVE-2020-8608
CVE    6
CVE-2020-1711
CVE-2020-7039
CVE-2019-20382
CVE-2020-8608
...
CPE    3
cpe:/o:suse:suse_linux_enterprise_server:12:sp5
cpe:/a:qemu:qemu
cpe:/a:kvm_group:qemu_guest_agent

© SecPod Technologies