SUSE-SU-2023:2358-1

Source
https://www.suse.com/support/update/announcement/2023/suse-su-20232358-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2023:2358-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2023:2358-1
Related
Published
2023-06-02T11:36:51Z
Modified
2023-06-02T11:36:51Z
Summary
Security update for qemu
Details

This update for qemu fixes the following issues:

  • CVE-2022-0216: Fixed a use-after-free in lsidomsgout() in hw/scsi/lsi53c895a.c (bsc#1198038).
  • CVE-2021-3929: Fixed use-after-free in nvme, caused by DMA reentrancy issue (bsc#1193880).
  • CVE-2021-4207: Fixed heap buffer overflow caused by double fetch in qxl_cursor() (bsc#1198037).
  • CVE-2021-4206: Fixed integer overflow in cursor_alloc() (bsc#1198035).
  • Amend .changes file: avoid declaring a still unfixed CVE, as fixed (bsc#1187529)
  • Fix the build breaks caused by binutils update (bsc#1192463, bsc#1193621)
References

Affected packages

SUSE:Linux Enterprise Server 12 SP2-BCL / qemu

Package

Name
qemu
Purl
purl:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCL

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.6.2-41.76.1

Ecosystem specific

{
    "binaries": [
        {
            "qemu-tools": "2.6.2-41.76.1",
            "qemu": "2.6.2-41.76.1",
            "qemu-guest-agent": "2.6.2-41.76.1",
            "qemu-block-curl": "2.6.2-41.76.1",
            "qemu-lang": "2.6.2-41.76.1",
            "qemu-ipxe": "1.0.0-41.76.1",
            "qemu-kvm": "2.6.2-41.76.1",
            "qemu-seabios": "1.9.1_0_gb3ef39f-41.76.1",
            "qemu-block-ssh": "2.6.2-41.76.1",
            "qemu-vgabios": "1.9.1_0_gb3ef39f-41.76.1",
            "qemu-x86": "2.6.2-41.76.1",
            "qemu-sgabios": "8-41.76.1",
            "qemu-block-rbd": "2.6.2-41.76.1"
        }
    ]
}