File _patchinfo of Package patchinfo.15631

<patchinfo incident="15631">
  <issue tracker="cve" id="2020-13362"/>
  <issue tracker="cve" id="2020-10761"/>
  <issue tracker="cve" id="2020-13361"/>
  <issue tracker="cve" id="2020-13659"/>
  <issue tracker="cve" id="2020-13800"/>
  <issue tracker="bnc" id="1172710">VUL-0: CVE-2020-10761: qemu: qemu-nbd: reachable assertion failure in nbd_negotiate_send_rep_verr via remote client</issue>
  <issue tracker="bnc" id="1172495">VUL-0: CVE-2020-13800: qemu: ati-vga: infinite recursion in ati_mm_read/write calls may lead to DoS</issue>
  <issue tracker="bnc" id="1172386">VUL-0: CVE-2020-13659: qemu: NULL pointer dereference in the MegaRAID SAS 8708EM2 emulator</issue>
  <issue tracker="bnc" id="1172384">VUL-1: CVE-2020-13361: kvm,qemu: es1370: OOB access due to incorrect frame count leads to DoS</issue>
  <issue tracker="bnc" id="1172383">VUL-1: CVE-2020-13362: kvm,qemu: megasas: OOB read access due to invalid index leads to DoS</issue>
  <packager>bfrogers</packager>
  <rating>important</rating>
  <category>security</category>
  <summary>Security update for qemu</summary>
  <description>This update for qemu to version 4.2.1 fixes the following issues:

- CVE-2020-10761: Fixed a denial of service in Network Block Device (nbd) support infrastructure (bsc#1172710).
- CVE-2020-13800: Fixed a denial of service possibility in ati-vga emulation (bsc#1172495).
- CVE-2020-13659: Fixed a null pointer dereference possibility in MegaRAID SAS 8708EM2 emulation (bsc#1172386).
- CVE-2020-13362: Fixed an OOB access possibility in MegaRAID SAS 8708EM2 emulation (bsc#1172383).
- CVE-2020-13361: Fixed an OOB access possibility in ES1370 audio device emulation (bsc#1172384).
</description>
</patchinfo>
openSUSE Build Service is sponsored by