Affected Products: SUSE Linux Enterprise Server 12-SP5 ______________________________________________________________________________
An update that solves 6 vulnerabilities and has 6 fixes is now available.
This update for qemu fixes the following issues:
- CVE-2020-7039: Fixed a heap buffer overflow in tcp_emu() routine while emulating IRC and other protocols (bsc#1161066). - CVE-2019-15034: Fixed a buffer overflow in hw/display/bochs-display.c due to improper PCI config space allocation (bsc#1166379). - CVE-2020-1711: Fixed an out of bounds heap buffer access iscsi_co_block_status() routine which could have allowed a remote denial of service or arbitrary code with privileges of the QEMU process on the host (bsc#1166240). - CVE-2019-6778: Fixed a heap buffer overflow in tcp_emu() routine while emulating the identification protocol and copying message data to a socket buffer (bsc#1123156). - CVE-2020-8608: Fixed a heap buffer overflow in tcp_emu() routine while emulating IRC and other protocols (bsc#1163018). - CVE-2019-20382: Fixed a memory leak in the VNC display driver which could have led to exhaustion of the host memory leading to a potential Denial of service (bsc#1165776). - Fixed live migration errors (bsc#1154790, bsc#1156794, bsc#1156642). - Fixed an issue where migrating VMs on KVM gets missing features:ospke error (bsc#1162729). - Fixed an issue where booting up a guest system with mdev passthrough device as installation device was failing (bsc#1158880).
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server 12-SP5:
zypper in -t patch SUSE-SLE-SERVER-12-SP5-2020-845=1
- SUSE Linux Enterprise Server 12-SP5 (aarch64 ppc64le s390x x86_64):