File _patchinfo of Package patchinfo.15027
<patchinfo incident="15027">
<issue tracker="cve" id="2019-12068"/>
<issue tracker="cve" id="2020-1711"/>
<issue tracker="cve" id="2020-8608"/>
<issue tracker="cve" id="2019-15890"/>
<issue tracker="cve" id="2020-1983"/>
<issue tracker="cve" id="2020-7039"/>
<issue tracker="cve" id="2019-6778"/>
<issue tracker="bnc" id="1161066">VUL-0: CVE-2020-7039: kvm,qemu: OOB buffer access while emulating TCP protocols in tcp_emu()</issue>
<issue tracker="bnc" id="1146873">VUL-0: CVE-2019-12068: kvm,qemu: infinite loop while executing script</issue>
<issue tracker="bnc" id="1166240">VUL-0: CVE-2020-1711: kvm,qemu: block: iscsi: OOB heap access via an unexpected response of iSCSI Server</issue>
<issue tracker="bnc" id="1163018">VUL-0: CVE-2020-8608: kvm,qemu: potential OOB access due to unsafe snprintf() usages</issue>
<issue tracker="bnc" id="1123156">VUL-0: CVE-2019-6778: kvm,qemu: A heap buffer overflow in tcp_emu() found in slirp</issue>
<issue tracker="bnc" id="1170940">VUL-0: CVE-2020-1983: slirp4netns,libslirp,kvm,qemu: use-after-free in ip_reass function in ip_input.c</issue>
<issue tracker="bnc" id="1149811">VUL-0: CVE-2019-15890: kvm, qemu: use-after-free during packet reassembly</issue>
<packager>bfrogers</packager>
<rating>moderate</rating>
<category>security</category>
<summary>Security update for qemu</summary>
<description>This update for qemu fixes the following issues:
Security issues fixed:
- CVE-2020-1711: Fixed a potential OOB access in the iSCSI client code (bsc#1166240).
- CVE-2019-12068: Fixed a potential DoS in the LSI SCSI controller emulation (bsc#1146873).
- CVE-2020-1983: Fixed a use-after-free in the ip_reass function of slirp (bsc#1170940).
- CVE-2020-8608: Fixed a potential OOB access in slirp (bsc#1163018).
- CVE-2020-7039: Fixed a potential OOB access in slirp (bsc#1161066).
- CVE-2019-15890: Fixed a use-after-free during packet reassembly in slirp (bsc#1149811).
- Fixed multiple potential DoS issues in SLIRP, similar to CVE-2019-6778 (bsc#1123156).
</description>
</patchinfo>