[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250038

 
 

909

 
 

195843

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

SUSE-SU-2021:1245-1 -- SLES qemu, qemu-guest-agent

ID: oval:org.secpod.oval:def:89044339Date: (C)2021-05-28   (M)2024-04-17
Class: PATCHFamily: unix




This update for qemu fixes the following issues: - Fix OOB access in sm501 device emulation - Fix OOB access possibility in MegaRAID SAS 8708EM2 emulation - Fix use-after-free in usb xhci packet handling - Fix use-after-free in usb ehci packet handling - Fix OOB access in usb hcd-ohci emulation - Fix infinite loop in usb hcd-ohci emulation - Fix guest triggerable assert in shared network handling code - Fix infinite loop in e1000e device emulation - Fix OOB access in atapi emulation - Fix heap overflow in MSIx emulation - Fix null pointer deref. in mmio ops - Fix infinite loop in e1000 device emulation - Fix OOB access in rtl8139 NIC emulation - Fix OOB access in other NIC emulations - Fix OOB access in SLIRP ARP/NCSI packet processing - Fix null pointer dereference possibility in MegaRAID SAS 8708EM2 emulation - Fix issue where s390 guest fails to find zipl boot menu index - Fix OOB access in iscsi - Fix OOB access in vmxnet3 emulation - Fix package scripts to not use hard coded paths for temporary working directories and log files - Fix potential privilege escalation in virtfs - Apply fixes to qemu scsi passthrough with respect to timeout and error conditions, including using more correct status codes. - Fix OOB access in ARM interrupt handling - Tweaks to spec file for better formatting, and remove not needed BuildRequires for e2fsprogs-devel and libpcap-devel - Fix OOB access possibility in ES1370 audio device emulation - Fix OOB access in ROM loading - Fix OOB access while processing USB packets - Fix DoS in packet processing of various emulated NICs - Fix buffer overflow in the XGMAC device - Use "%service_del_postun_without_restart" instead of "%service_del_postun" to avoid Failed to try-restart qemu-ga at .service error while updating the qemu-guest-agent

Platform:
SUSE Linux Enterprise Server 15 SP1
Product:
qemu
qemu-guest-agent
Reference:
SUSE-SU-2021:1245-1
CVE-2020-11947
CVE-2020-12829
CVE-2020-13361
CVE-2020-13362
CVE-2020-13659
CVE-2020-13765
CVE-2020-14364
CVE-2020-15469
CVE-2020-15863
CVE-2020-16092
CVE-2020-25084
CVE-2020-25624
CVE-2020-25625
CVE-2020-25723
CVE-2020-27617
CVE-2020-27821
CVE-2020-28916
CVE-2020-29129
CVE-2020-29130
CVE-2020-29443
CVE-2021-20181
CVE-2021-20203
CVE-2021-20221
CVE-2021-20257
CVE-2021-3416
CVE    25
CVE-2021-20181
CVE-2020-11947
CVE-2020-29443
CVE-2021-20203
...

© SecPod Technologies