File _patchinfo of Package patchinfo
<patchinfo incident="9835"> <issue tracker="bnc" id="1116717">VUL-0: CVE-2018-19364: qemu,kvm: 9pfs: Use-after-free due to race condition while updating fid path</issue> <issue tracker="bnc" id="1117275">VUL-1: CVE-2018-19489: kvm,qemu: QEMU: 9pfs: crash due to race condition in renaming files</issue> <issue tracker="bnc" id="1114957">VUL-0: CVE-2018-18954: qemu: ppc64: Out-of-bounds r/w stack access in pnv_lpc_do_eccb</issue> <issue tracker="bnc" id="1123156">VUL-0: CVE-2019-6778: kvm,qemu: A heap buffer overflow in tcp_emu() found in slirp</issue> <issue tracker="bnc" id="1084604">VUL-0: CVE-2018-7858: kvm,qemu: cirrus: OOB access when updating vga display allowing for DoS</issue> <issue tracker="bnc" id="1119493">VUL-0: CVE-2018-16872: kvm,qemu: usb-mtp: path traversal by host filesystem manipulation in Media Transfer Protocol (MTP)</issue> <issue tracker="bnc" id="1121600">aarch64-linux-user: inconsistent pwrite behaviour</issue> <issue tracker="bnc" id="1113231">after migrating KVM guests are hung with weird timestamps</issue> <issue id="1056386" tracker="bnc">VUL-0: CVE-2017-13673: kvm,qemu: vga: reachable assert failure during during display update</issue> <issue id="1056334" tracker="bnc">VUL-0: CVE-2017-13672: kvm,qemu: vga: OOB read access during display update</issue> <issue tracker="cve" id="2017-13673"/> <issue tracker="cve" id="2018-7858"/> <issue tracker="cve" id="2017-13672"/> <issue tracker="cve" id="2018-19364"/> <issue tracker="cve" id="2019-6778"/> <issue tracker="cve" id="2018-18954"/> <issue tracker="cve" id="2018-16872"/> <issue tracker="cve" id="2018-19489"/> <category>security</category> <rating>important</rating> <packager>bfrogers</packager> <description>This update for qemu fixes the following issues: Security vulnerabilities addressed: - CVE-2019-6778: Fixed an out-of-bounds access in slirp (bsc#1123156) - CVE-2018-16872: Fixed a host security vulnerability related to handling symlinks in usb-mtp (bsc#1119493) - CVE-2018-19489: Fixed a Denial-of-Service in virtfs (bsc#1117275) - CVE-2018-19364: Fixed an use-after-free vulnerability if virtfs interface is deliberately abused (bsc#1116717) - CVE-2018-18954: Fixed an out-of-bounds access performing PowerNV memory operations (bsc#1114957) - CVE-2017-13673: Fixed a reachable assert failure during during display update (bsc#1056386) - CVE-2017-13672: Fixed an out-of-bounds read access during display update (bsc#1056334) - CVE-2018-7858: Fixed an out-of-bounds access in cirrus when updating vga display allowing for Denial-of-Service (bsc#1084604) Other bug fixes and changes: - Fix pwrite64/pread64/write to return 0 over -1 for a zero length NULL buffer in qemu (bsc#1121600) - Fix bad guest time after migration (bsc#1113231) This update was imported from the SUSE:SLE-12-SP3:Update update project.</description> <summary>Security update for qemu</summary> </patchinfo>