Описание
Security update for qemu
This update for qemu fixes the following issues:
Security issue fixed:
- CVE-2020-1983: Fixed a use-after-free in the ip_reass function of slirp (bsc#1170940).
Non-security issue fixed:
- Fixed an issue where limiting the memory bandwidth was not possible (bsc#1167816).
- Miscellaneous fixes to the in-package support documentation.
Список пакетов
Image SLES12-SP5-EC2-ECS-On-Demand
qemu-tools-3.1.1.1-3.14.1
SUSE Linux Enterprise Server 12 SP5
qemu-3.1.1.1-3.14.1
qemu-arm-3.1.1.1-3.14.1
qemu-audio-alsa-3.1.1.1-3.14.1
qemu-audio-oss-3.1.1.1-3.14.1
qemu-audio-pa-3.1.1.1-3.14.1
qemu-audio-sdl-3.1.1.1-3.14.1
qemu-block-curl-3.1.1.1-3.14.1
qemu-block-iscsi-3.1.1.1-3.14.1
qemu-block-rbd-3.1.1.1-3.14.1
qemu-block-ssh-3.1.1.1-3.14.1
qemu-guest-agent-3.1.1.1-3.14.1
qemu-ipxe-1.0.0+-3.14.1
qemu-kvm-3.1.1.1-3.14.1
qemu-lang-3.1.1.1-3.14.1
qemu-ppc-3.1.1.1-3.14.1
qemu-s390-3.1.1.1-3.14.1
qemu-seabios-1.12.0-3.14.1
qemu-sgabios-8-3.14.1
qemu-tools-3.1.1.1-3.14.1
qemu-ui-curses-3.1.1.1-3.14.1
qemu-ui-gtk-3.1.1.1-3.14.1
qemu-ui-sdl-3.1.1.1-3.14.1
qemu-vgabios-1.12.0-3.14.1
qemu-x86-3.1.1.1-3.14.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5
qemu-3.1.1.1-3.14.1
qemu-arm-3.1.1.1-3.14.1
qemu-audio-alsa-3.1.1.1-3.14.1
qemu-audio-oss-3.1.1.1-3.14.1
qemu-audio-pa-3.1.1.1-3.14.1
qemu-audio-sdl-3.1.1.1-3.14.1
qemu-block-curl-3.1.1.1-3.14.1
qemu-block-iscsi-3.1.1.1-3.14.1
qemu-block-rbd-3.1.1.1-3.14.1
qemu-block-ssh-3.1.1.1-3.14.1
qemu-guest-agent-3.1.1.1-3.14.1
qemu-ipxe-1.0.0+-3.14.1
qemu-kvm-3.1.1.1-3.14.1
qemu-lang-3.1.1.1-3.14.1
qemu-ppc-3.1.1.1-3.14.1
qemu-s390-3.1.1.1-3.14.1
qemu-seabios-1.12.0-3.14.1
qemu-sgabios-8-3.14.1
qemu-tools-3.1.1.1-3.14.1
qemu-ui-curses-3.1.1.1-3.14.1
qemu-ui-gtk-3.1.1.1-3.14.1
qemu-ui-sdl-3.1.1.1-3.14.1
qemu-vgabios-1.12.0-3.14.1
qemu-x86-3.1.1.1-3.14.1
Ссылки
- Link for SUSE-SU-2020:1516-1
- E-Mail link for SUSE-SU-2020:1516-1
- SUSE Security Ratings
- SUSE Bug 1167816
- SUSE Bug 1170940
- SUSE CVE CVE-2020-1983 page
Описание
A use after free vulnerability in ip_reass() in ip_input.c of libslirp 4.2.0 and prior releases allows crafted packets to cause a denial of service.
Затронутые продукты
Image SLES12-SP5-EC2-ECS-On-Demand:qemu-tools-3.1.1.1-3.14.1
SUSE Linux Enterprise Server 12 SP5:qemu-3.1.1.1-3.14.1
SUSE Linux Enterprise Server 12 SP5:qemu-arm-3.1.1.1-3.14.1
SUSE Linux Enterprise Server 12 SP5:qemu-audio-alsa-3.1.1.1-3.14.1
Ссылки
- CVE-2020-1983
- SUSE Bug 1170940