Vulnerability Database
Blog
FAQ
Docs
SUSE-SU-2021:14704-1
See a problem?
Please try reporting it
to the source
first.
Source
https://www.suse.com/support/update/announcement/2021/suse-su-202114704-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2021:14704-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2021:14704-1
Related
CVE-2014-3689
CVE-2015-1779
CVE-2020-12829
CVE-2020-13361
CVE-2020-13362
CVE-2020-13765
CVE-2020-14364
CVE-2020-25084
CVE-2020-25624
CVE-2020-25625
CVE-2020-25723
CVE-2020-29130
CVE-2020-29443
CVE-2021-20181
CVE-2021-20257
Published
2021-04-20T12:35:06Z
Modified
2021-04-20T12:35:06Z
Summary
Security update for kvm
Details
This update for kvm fixes the following issues:
Fix OOB read and write due to integer overflow in sm501
2d
operation() in hw/display/sm501.c (CVE-2020-12829, bsc#1172385)
Fix OOB access possibility in MegaRAID SAS 8708EM2 emulation (CVE-2020-13362 bsc#1172383)
Fix use-after-free in usb xhci packet handling (CVE-2020-25723, bsc#1178934)
Fix use-after-free in usb ehci packet handling (CVE-2020-25084, bsc#1176673)
Fix OOB access in usb hcd-ohci emulation (CVE-2020-25624, bsc#1176682)
Fix infinite loop (DoS) in usb hcd-ohci emulation (CVE-2020-25625, bsc#1176684)
Fix OOB access in atapi emulation (CVE-2020-29443, bsc#1181108)
Fix DoS in e1000 emulated device (CVE-2021-20257 bsc#1182577)
Fix OOB access in SLIRP ARP packet processing (CVE-2020-29130, bsc#1179467)
Fix OOB access while processing USB packets (CVE-2020-14364 bsc#1175441)
Fix potential privilege escalation in virtfs (CVE-2021-20181 bsc#1182137)
Fix package scripts to not use hard coded paths for temporary working directories and log files (bsc#1182425)
Fix OOB access possibility in ES1370 audio device emulation (CVE-2020-13361 bsc#1172384)
Fix OOB access in ROM loading (CVE-2020-13765 bsc#1172478)
References
https://www.suse.com/support/update/announcement/2021/suse-su-202114704-1/
https://bugzilla.suse.com/1172383
https://bugzilla.suse.com/1172384
https://bugzilla.suse.com/1172385
https://bugzilla.suse.com/1172478
https://bugzilla.suse.com/1175441
https://bugzilla.suse.com/1176673
https://bugzilla.suse.com/1176682
https://bugzilla.suse.com/1176684
https://bugzilla.suse.com/1178934
https://bugzilla.suse.com/1179467
https://bugzilla.suse.com/1181108
https://bugzilla.suse.com/1182137
https://bugzilla.suse.com/1182425
https://bugzilla.suse.com/1182577
https://www.suse.com/security/cve/CVE-2014-3689
https://www.suse.com/security/cve/CVE-2015-1779
https://www.suse.com/security/cve/CVE-2020-12829
https://www.suse.com/security/cve/CVE-2020-13361
https://www.suse.com/security/cve/CVE-2020-13362
https://www.suse.com/security/cve/CVE-2020-13765
https://www.suse.com/security/cve/CVE-2020-14364
https://www.suse.com/security/cve/CVE-2020-25084
https://www.suse.com/security/cve/CVE-2020-25624
https://www.suse.com/security/cve/CVE-2020-25625
https://www.suse.com/security/cve/CVE-2020-25723
https://www.suse.com/security/cve/CVE-2020-29130
https://www.suse.com/security/cve/CVE-2020-29443
https://www.suse.com/security/cve/CVE-2021-20181
https://www.suse.com/security/cve/CVE-2021-20257
Affected packages
SUSE:Linux Enterprise Server 11 SP4-LTSS
/
kvm
Package
Name
kvm
Purl
purl:rpm/suse/kvm&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSS
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
1.4.2-60.34.1
Ecosystem specific
{ "binaries": [ { "kvm": "1.4.2-60.34.1" } ] }
SUSE-SU-2021:14704-1 - OSV