File _patchinfo of Package patchinfo.42065

<patchinfo incident="42065">
  <issue tracker="bnc" id="1252768">qemu-system-x86 exists with SIGSEV while installing SLES16 via remote ISO image</issue>
  <issue tracker="bnc" id="1253002">VUL-0: CVE-2025-12464: qemu: net: pad packets to minimum length in qemu_receive_packet()</issue>
  <issue tracker="bnc" id="1209554">VUL-0: CVE-2023-1544: kvm,qemu: pvrdma: out-of-bounds read in pvrdma_ring_next_elem_read()</issue>
  <issue tracker="bnc" id="1254286">cockpit - Virtual machines - Import VM - import qcow2 image failed and it fails to start because of missing 'qemu-hw-display-virtio-gpu' and 'qemu-hw-display-virtio-gpu-pci'</issue>
  <issue tracker="bnc" id="1227397">VUL-0: CVE-2024-6505: qemu: qemu-kvm: virtio-net: queue index out-of-bounds access in software RSS</issue>
  <issue tracker="cve" id="2024-6505"/>
  <issue tracker="cve" id="2025-12464"/>
  <issue tracker="cve" id="2023-1544"/>
  <packager>dfaggioli</packager>
  <rating>important</rating>
  <category>security</category>
  <summary>Security update for qemu</summary>
  <description>This update for qemu fixes the following issues:

Security issues fixed:

- CVE-2023-1544: out-of-bounds read in VMWare's paravirtual RDMA device operations can be exploited through a malicious
  guest driver to crash the QEMU process on the host (bsc#1209554).
- CVE-2024-6505: heap-based buffer overflow in the virtio-net device operations can be exploited by a malicious
  privileged user to crash the QEMU process on the host (bsc#1227397).
- CVE-2025-12464: stack-based buffer overflow in the e1000 network device operations can be exploited by a malicious
  guest user to crash the QEMU process on the host (bsc#1253002).

Other updates and bugfixes: 
  
- [openSUSE][RPM] spec: require qemu-hw-display-virtio-gpu-pci for x86 too.
- [openSUSE][RPM} spec: delete old specfile constructs.
- block/curl: fix curl internal handles handling (bsc#1252768).
- [openSUSE][RPM]: really fix *-virtio-gpu-pci dependency on ARM (bsc#1254286).
</description>
</patchinfo>
openSUSE Build Service is sponsored by