[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

SUSE-SU-2023:3800-1 -- SLES qemu, qemu-guest-agent

ID: oval:org.secpod.oval:def:89049568Date: (C)2023-11-17   (M)2024-04-25
Class: PATCHFamily: unix




This update for qemu fixes the following issues: * CVE-2022-26354: Fixed a memory leak due to a missing virtqueue detach on error. * CVE-2021-3929: Fixed an use-after-free in nvme DMA reentrancy issue. * CVE-2023-0330: Fixed a stack overflow due to a DMA reentrancy issue. * CVE-2020-13754: Fixed a DoS due to an OOB access during mmio operations. * CVE-2023-3354: Fixed a remote unauthenticated DoS due to an improper I/O watch removal in VNC TLS handshake. * CVE-2023-3180: Fixed a heap buffer overflow in virtio_crypto_sym_op_helper. * CVE-2023-2861: Fixed improper access control on special files in 9pfs . * CVE-2022-1050: Fixed use-after-free issue in pvrdma_exec_cmd . * CVE-2021-3750: Fixed DMA reentrancy issue leads to use-after-free in hcd- ehci . The following non-security bug was fixed: * Prepare for binutils update to 2.41 update .

Platform:
SUSE Linux Enterprise Server 15 SP1
Product:
qemu
qemu-guest-agent
Reference:
SUSE-SU-2023:3800-1
CVE-2019-13754
CVE-2021-3750
CVE-2021-3929
CVE-2022-1050
CVE-2022-26354
CVE-2023-0330
CVE-2023-2861
CVE-2023-3180
CVE-2023-3354
CVE-2020-13754
CVE    10
CVE-2023-3180
CVE-2023-3354
CVE-2021-3929
CVE-2021-3750
...
CPE    3
cpe:/o:suse:suse_linux_enterprise_server:15:sp1
cpe:/a:qemu:qemu
cpe:/a:kvm_group:qemu_guest_agent

© SecPod Technologies