[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

SUSE-SU-2023:0840-1 -- SLES qemu, qemu-guest-agent

ID: oval:org.secpod.oval:def:89048604Date: (C)2023-07-17   (M)2024-05-22
Class: PATCHFamily: unix




This update for qemu fixes the following issues: * CVE-2022-4144: Fixed unsafe address translation can lead to out-of-bounds read in qxl_phys2virt . * CVE-2021-3507: Fixed heap buffer overflow in DMA read data transfers in fdc . * CVE-2020-14394: Fixed infinite loop in xhci_ring_chain_length . * CVE-2022-0216: Fixed a use-after-free in lsi_do_msgout function in hw/scsi/lsi53c895a.c . * CVE-2022-1050: Fixed a use-after-free issue in pvrdma_exec_cmd in pvrdma . * CVE-2021-3929: Fixed a DMA reentrancy issue leads to use-after-free in nvme . The following non-security bugs were fixed: * Fix bsc#1202364.

Platform:
SUSE Linux Enterprise Server 15 SP3
Product:
qemu
qemu-guest-agent
Reference:
SUSE-SU-2023:0840-1
CVE-2020-14394
CVE-2021-3507
CVE-2021-3929
CVE-2022-0216
CVE-2022-1050
CVE-2022-4144
CVE    6
CVE-2021-3507
CVE-2021-3929
CVE-2022-1050
CVE-2022-0216
...
CPE    3
cpe:/a:qemu:qemu
cpe:/a:kvm_group:qemu_guest_agent
cpe:/o:suse:suse_linux_enterprise_server:15:sp3

© SecPod Technologies