File _patchinfo of Package patchinfo.28166
<patchinfo incident="28166">
<issue tracker="bnc" id="1180207">VUL-1: CVE-2020-14394: qemu, kvm: infinite loop in xhci_ring_chain_length()</issue>
<issue tracker="bnc" id="1185000">VUL-0: CVE-2021-3507: qemu,kvm: fdc: heap buffer overflow in DMA read data transfers</issue>
<issue tracker="bnc" id="1193880">VUL-0: CVE-2021-3929: kvm, qemu: DMA reentrancy issue leads to use-after-free in nvme</issue>
<issue tracker="bnc" id="1197653">VUL-0: CVE-2022-1050: qemu,kvm: pvrdma: use-after-free issue in pvrdma_exec_cmd()</issue>
<issue tracker="bnc" id="1202364">qemu "block limits" VPD emulation broken in SLES15 SP3 [ref:_00D1igLOd._5005q9eCWF:ref]</issue>
<issue tracker="bnc" id="1205808">VUL-0: CVE-2022-4144: kvm,qemu: qxl_phys2virt unsafe address translation can lead to out-of-bounds read</issue>
<issue tracker="bnc" id="1198038">VUL-1: CVE-2022-0216: kvm,qemu: use-after-free in lsi_do_msgout function in hw/scsi/lsi53c895a.c</issue>
<issue tracker="cve" id="2022-1050"/>
<issue tracker="cve" id="2022-4144"/>
<issue tracker="cve" id="2020-14394"/>
<issue tracker="cve" id="2022-0216"/>
<issue tracker="cve" id="2021-3929"/>
<issue tracker="cve" id="2021-3507"/>
<packager>dfaggioli</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for qemu</summary>
<description>This update for qemu fixes the following issues:
- CVE-2022-4144: Fixed unsafe address translation can lead to out-of-bounds read in qxl_phys2virt (bsc#1205808).
- CVE-2021-3507: Fixed heap buffer overflow in DMA read data transfers in fdc (bsc#1185000).
- CVE-2020-14394: Fixed infinite loop in xhci_ring_chain_length() (bsc#1180207).
- CVE-2022-0216: Fixed a use-after-free in lsi_do_msgout function in hw/scsi/lsi53c895a.c (bsc#1198038).
- CVE-2022-1050: Fixed a use-after-free issue in pvrdma_exec_cmd() in pvrdma (bsc#1197653).
- CVE-2021-3929: Fixed a DMA reentrancy issue leads to use-after-free in nvme (bsc#1193880).
The following non-security bugs were fixed:
- Fix bsc#1202364.
</description>
</patchinfo>