[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

SUSE-SU-2020:0844-1 -- SLES qemu, qemu-guest-agent

ID: oval:org.secpod.oval:def:89050266Date: (C)2023-10-10   (M)2023-10-10
Class: PATCHFamily: unix




This update for qemu fixes the following issues: - CVE-2020-7039: Fixed a heap buffer overflow in tcp_emu routine while emulating IRC and other protocols . - CVE-2019-15034: Fixed a buffer overflow in hw/display/bochs-display.c due to improper PCI config space allocation . - CVE-2020-1711: Fixed an out of bounds heap buffer access iscsi_co_block_status routine which could have allowed a remote denial of service or arbitrary code with privileges of the QEMU process on the host . - CVE-2019-6778: Fixed a heap buffer overflow in tcp_emu routine while emulating the identification protocol and copying message data to a socket buffer . - CVE-2020-8608: Fixed a heap buffer overflow in tcp_emu routine while emulating IRC and other protocols . - CVE-2019-20382: Fixed a memory leak in the VNC display driver which could have led to exhaustion of the host memory leading to a potential Denial of service . - Fixed a live migration error . - Fixed an issue where migrating VMs on KVM gets missing features:ospke error .

Platform:
SUSE Linux Enterprise Desktop 15 SP1
SUSE Linux Enterprise Server 15 SP1
Product:
qemu
qemu-guest-agent
Reference:
SUSE-SU-2020:0844-1
CVE-2019-15034
CVE-2019-20382
CVE-2019-6778
CVE-2020-1711
CVE-2020-7039
CVE-2020-8608
CVE    6
CVE-2020-1711
CVE-2020-7039
CVE-2019-20382
CVE-2020-8608
...
CPE    3
cpe:/o:suse:suse_linux_enterprise_server:15:sp1
cpe:/a:qemu:qemu
cpe:/a:kvm_group:qemu_guest_agent

© SecPod Technologies