SUSE-SU-2021:1829-1

Source
https://www.suse.com/support/update/announcement/2021/suse-su-20211829-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2021:1829-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2021:1829-1
Related
Published
2021-06-02T12:21:01Z
Modified
2021-06-02T12:21:01Z
Summary
Security update for qemu
Details

This update for qemu fixes the following issues:

  • Fix OOB access during mmio operations (CVE-2020-13754, bsc#1172382)
  • Fix sPAPR emulator leaks the host hardware identity (CVE-2019-8934, bsc#1126455)
  • Fix out-of-bounds read information disclosure in icmp6sendechoreply (CVE-2020-10756, bsc#1172380)
  • Fix out-of-bound heap buffer access via an interrupt ID field (CVE-2021-20221, bsc#1181933)
  • For the record, these issues are fixed in this package already. Most are alternate references to previously mentioned issues: (CVE-2019-15890, bsc#1149813, CVE-2020-8608, bsc#1163019, CVE-2020-14364, bsc#1175534, CVE-2020-25723, bsc#1178935, CVE-2020-29130, bsc#1179477, CVE-2021-20257, bsc#1182846, CVE-2021-3419, bsc#1182975, bsc#1031692, bsc#1094725)
References

Affected packages

SUSE:Linux Enterprise Server 12 SP2-BCL / qemu

Package

Name
qemu
Purl
purl:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCL

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.6.2-41.65.1

Ecosystem specific

{
    "binaries": [
        {
            "qemu-tools": "2.6.2-41.65.1",
            "qemu": "2.6.2-41.65.1",
            "qemu-guest-agent": "2.6.2-41.65.1",
            "qemu-block-curl": "2.6.2-41.65.1",
            "qemu-lang": "2.6.2-41.65.1",
            "qemu-ipxe": "1.0.0-41.65.1",
            "qemu-kvm": "2.6.2-41.65.1",
            "qemu-seabios": "1.9.1_0_gb3ef39f-41.65.1",
            "qemu-block-ssh": "2.6.2-41.65.1",
            "qemu-vgabios": "1.9.1_0_gb3ef39f-41.65.1",
            "qemu-x86": "2.6.2-41.65.1",
            "qemu-sgabios": "8-41.65.1",
            "qemu-block-rbd": "2.6.2-41.65.1"
        }
    ]
}