File _patchinfo of Package patchinfo

<patchinfo incident="9835">
  <issue tracker="bnc" id="1116717">VUL-0: CVE-2018-19364: qemu,kvm: 9pfs: Use-after-free due to race condition while updating fid path</issue>
  <issue tracker="bnc" id="1117275">VUL-1: CVE-2018-19489: kvm,qemu: QEMU: 9pfs: crash due to race condition in renaming files</issue>
  <issue tracker="bnc" id="1114957">VUL-0: CVE-2018-18954: qemu: ppc64: Out-of-bounds r/w stack access in pnv_lpc_do_eccb</issue>
  <issue tracker="bnc" id="1123156">VUL-0: CVE-2019-6778: kvm,qemu:  A heap buffer overflow in tcp_emu() found in slirp</issue>
  <issue tracker="bnc" id="1084604">VUL-0: CVE-2018-7858: kvm,qemu: cirrus: OOB access when updating vga display allowing for DoS</issue>
  <issue tracker="bnc" id="1119493">VUL-0: CVE-2018-16872: kvm,qemu: usb-mtp: path traversal by host filesystem manipulation in Media Transfer Protocol (MTP)</issue>
  <issue tracker="bnc" id="1121600">aarch64-linux-user: inconsistent pwrite behaviour</issue>
  <issue tracker="bnc" id="1113231">after migrating KVM guests are hung with weird timestamps</issue>
  <issue id="1056386" tracker="bnc">VUL-0: CVE-2017-13673: kvm,qemu: vga: reachable assert failure during during display update</issue>
  <issue id="1056334" tracker="bnc">VUL-0: CVE-2017-13672: kvm,qemu: vga: OOB read access during display update</issue>
  <issue tracker="cve" id="2017-13673"/>
  <issue tracker="cve" id="2018-7858"/>
  <issue tracker="cve" id="2017-13672"/>
  <issue tracker="cve" id="2018-19364"/>
  <issue tracker="cve" id="2019-6778"/>
  <issue tracker="cve" id="2018-18954"/>
  <issue tracker="cve" id="2018-16872"/>
  <issue tracker="cve" id="2018-19489"/>
  <category>security</category>
  <rating>important</rating>
  <packager>bfrogers</packager>
  <description>This update for qemu fixes the following issues:

Security vulnerabilities addressed:

- CVE-2019-6778: Fixed an out-of-bounds access in slirp (bsc#1123156)
- CVE-2018-16872: Fixed a host security vulnerability related to handling symlinks in usb-mtp (bsc#1119493)
- CVE-2018-19489: Fixed a Denial-of-Service in virtfs (bsc#1117275)
- CVE-2018-19364: Fixed an use-after-free vulnerability if virtfs interface is deliberately abused (bsc#1116717)
- CVE-2018-18954: Fixed an out-of-bounds access performing PowerNV memory operations (bsc#1114957)
- CVE-2017-13673: Fixed a reachable assert failure during during display update (bsc#1056386)
- CVE-2017-13672: Fixed an out-of-bounds read access during display update (bsc#1056334)
- CVE-2018-7858: Fixed an out-of-bounds access in cirrus when updating vga display allowing for Denial-of-Service (bsc#1084604)

Other bug fixes and changes:

- Fix pwrite64/pread64/write to return 0 over -1 for a zero length NULL buffer in qemu (bsc#1121600)
- Fix bad guest time after migration (bsc#1113231)

This update was imported from the SUSE:SLE-12-SP3:Update update project.</description>
  <summary>Security update for qemu</summary>
</patchinfo>
openSUSE Build Service is sponsored by