openSUSE: 2020:1108-1: important: qemu

    Date 28 Jul 2020
    105
    Posted By LinuxSecurity Advisories
    An update that fixes 5 vulnerabilities is now available.
       openSUSE Security Update: Security update for qemu
    ______________________________________________________________________________
    
    Announcement ID:    openSUSE-SU-2020:1108-1
    Rating:             important
    References:         #1172383 #1172384 #1172386 #1172495 #1172710 
                        
    Cross-References:   CVE-2020-10761 CVE-2020-13361 CVE-2020-13362
                        CVE-2020-13659 CVE-2020-13800
    Affected Products:
                        openSUSE Leap 15.2
    ______________________________________________________________________________
    
       An update that fixes 5 vulnerabilities is now available.
    
    Description:
    
       This update for qemu to version 4.2.1 fixes the following issues:
    
       - CVE-2020-10761: Fixed a denial of service in Network Block Device (nbd)
         support infrastructure (bsc#1172710).
       - CVE-2020-13800: Fixed a denial of service possibility in ati-vga
         emulation (bsc#1172495).
       - CVE-2020-13659: Fixed a null pointer dereference possibility in MegaRAID
         SAS 8708EM2 emulation (bsc#1172386).
       - CVE-2020-13362: Fixed an OOB access possibility in MegaRAID SAS 8708EM2
         emulation (bsc#1172383).
       - CVE-2020-13361: Fixed an OOB access possibility in ES1370 audio device
         emulation (bsc#1172384).
    
       This update was imported from the SUSE:SLE-15-SP2:Update update project.
    
    
    Patch Instructions:
    
       To install this openSUSE Security Update use the SUSE recommended installation methods
       like YaST online_update or "zypper patch".
    
       Alternatively you can run the command listed for your product:
    
       - openSUSE Leap 15.2:
    
          zypper in -t patch openSUSE-2020-1108=1
    
    
    
    Package List:
    
       - openSUSE Leap 15.2 (noarch):
    
          qemu-ipxe-1.0.0+-lp152.9.3.1
          qemu-microvm-4.2.1-lp152.9.3.1
          qemu-seabios-1.12.1+-lp152.9.3.1
          qemu-sgabios-8-lp152.9.3.1
          qemu-vgabios-1.12.1+-lp152.9.3.1
    
       - openSUSE Leap 15.2 (x86_64):
    
          qemu-4.2.1-lp152.9.3.1
          qemu-arm-4.2.1-lp152.9.3.1
          qemu-arm-debuginfo-4.2.1-lp152.9.3.1
          qemu-audio-alsa-4.2.1-lp152.9.3.1
          qemu-audio-alsa-debuginfo-4.2.1-lp152.9.3.1
          qemu-audio-pa-4.2.1-lp152.9.3.1
          qemu-audio-pa-debuginfo-4.2.1-lp152.9.3.1
          qemu-audio-sdl-4.2.1-lp152.9.3.1
          qemu-audio-sdl-debuginfo-4.2.1-lp152.9.3.1
          qemu-block-curl-4.2.1-lp152.9.3.1
          qemu-block-curl-debuginfo-4.2.1-lp152.9.3.1
          qemu-block-dmg-4.2.1-lp152.9.3.1
          qemu-block-dmg-debuginfo-4.2.1-lp152.9.3.1
          qemu-block-gluster-4.2.1-lp152.9.3.1
          qemu-block-gluster-debuginfo-4.2.1-lp152.9.3.1
          qemu-block-iscsi-4.2.1-lp152.9.3.1
          qemu-block-iscsi-debuginfo-4.2.1-lp152.9.3.1
          qemu-block-nfs-4.2.1-lp152.9.3.1
          qemu-block-nfs-debuginfo-4.2.1-lp152.9.3.1
          qemu-block-rbd-4.2.1-lp152.9.3.1
          qemu-block-rbd-debuginfo-4.2.1-lp152.9.3.1
          qemu-block-ssh-4.2.1-lp152.9.3.1
          qemu-block-ssh-debuginfo-4.2.1-lp152.9.3.1
          qemu-debuginfo-4.2.1-lp152.9.3.1
          qemu-debugsource-4.2.1-lp152.9.3.1
          qemu-extra-4.2.1-lp152.9.3.1
          qemu-extra-debuginfo-4.2.1-lp152.9.3.1
          qemu-guest-agent-4.2.1-lp152.9.3.1
          qemu-guest-agent-debuginfo-4.2.1-lp152.9.3.1
          qemu-ksm-4.2.1-lp152.9.3.1
          qemu-kvm-4.2.1-lp152.9.3.1
          qemu-lang-4.2.1-lp152.9.3.1
          qemu-linux-user-4.2.1-lp152.9.3.1
          qemu-linux-user-debuginfo-4.2.1-lp152.9.3.1
          qemu-linux-user-debugsource-4.2.1-lp152.9.3.1
          qemu-ppc-4.2.1-lp152.9.3.1
          qemu-ppc-debuginfo-4.2.1-lp152.9.3.1
          qemu-s390-4.2.1-lp152.9.3.1
          qemu-s390-debuginfo-4.2.1-lp152.9.3.1
          qemu-testsuite-4.2.1-lp152.9.3.1
          qemu-tools-4.2.1-lp152.9.3.1
          qemu-tools-debuginfo-4.2.1-lp152.9.3.1
          qemu-ui-curses-4.2.1-lp152.9.3.1
          qemu-ui-curses-debuginfo-4.2.1-lp152.9.3.1
          qemu-ui-gtk-4.2.1-lp152.9.3.1
          qemu-ui-gtk-debuginfo-4.2.1-lp152.9.3.1
          qemu-ui-sdl-4.2.1-lp152.9.3.1
          qemu-ui-sdl-debuginfo-4.2.1-lp152.9.3.1
          qemu-ui-spice-app-4.2.1-lp152.9.3.1
          qemu-ui-spice-app-debuginfo-4.2.1-lp152.9.3.1
          qemu-vhost-user-gpu-4.2.1-lp152.9.3.1
          qemu-vhost-user-gpu-debuginfo-4.2.1-lp152.9.3.1
          qemu-x86-4.2.1-lp152.9.3.1
          qemu-x86-debuginfo-4.2.1-lp152.9.3.1
    
    
    References:
    
       https://www.suse.com/security/cve/CVE-2020-10761.html
       https://www.suse.com/security/cve/CVE-2020-13361.html
       https://www.suse.com/security/cve/CVE-2020-13362.html
       https://www.suse.com/security/cve/CVE-2020-13659.html
       https://www.suse.com/security/cve/CVE-2020-13800.html
       https://bugzilla.suse.com/1172383
       https://bugzilla.suse.com/1172384
       https://bugzilla.suse.com/1172386
       https://bugzilla.suse.com/1172495
       https://bugzilla.suse.com/1172710
    
    -- 
    

    LinuxSecurity Poll

    Are you planning to use the 1Password password manager now that it is available to Linux users?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/35-are-you-planning-to-use-the-1password-password-manager-now-that-it-is-available-to-linux-users?task=poll.vote&format=json
    35
    radio
    [{"id":"122","title":"Yes","votes":"1","type":"x","order":"1","pct":20,"resources":[]},{"id":"123","title":"No ","votes":"3","type":"x","order":"2","pct":60,"resources":[]},{"id":"124","title":"Not sure at the moment","votes":"1","type":"x","order":"3","pct":20,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
    bottom 200

    Advisories

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.