Ubuntu Security Notice 4632-1 - It was discovered that the SLiRP networking implementation of the QEMU emulator did not properly manage memory under certain circumstances. An attacker could use this to cause a heap-based buffer overflow or other out- of-bounds access, which can lead to a denial of service or potentially execute arbitrary code. It was discovered that the SLiRP networking implementation of the QEMU emulator misuses snprintf return values. An attacker could use this to cause a denial of service or potentially execute arbitrary code. Various other issues were also addressed.
d70710491b9afbed7831436acc6b4cd20956288de37f7423b8f7860816c3bedc
Debian Linux Security Advisory 4733-1 - It was discovered that incorrect memory handling in the SLIRP networking implementation could result in denial of service or potentially the execution of arbitrary code.
62e5fb46b33b62418f094f1cb8663cd35f0013942ceabe9900648c3ca33849a2
Red Hat Security Advisory 2020-3040-01 - Kernel-based Virtual Machine offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Issues addressed include an out of bounds access vulnerability.
c2b0212400d34402f382aae52b3c08e422e6e74e99f1f0bf5b3571e3c5eb567e
Red Hat Security Advisory 2020-2844-01 - Kernel-based Virtual Machine is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM. Issues addressed include an out of bounds access vulnerability.
4999e4fd46f3504491e63ef0f0bc3cf682b401e214b56a282bbb6ccb74db88c2
Red Hat Security Advisory 2020-2774-01 - Kernel-based Virtual Machine offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Issues addressed include memory leak and out of bounds access vulnerabilities.
b1a1fa2f14aaeb9bd9a12bda699302978d1804ce1ee49ad38649947d77f1d54f
Red Hat Security Advisory 2020-2773-01 - Kernel-based Virtual Machine offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Issues addressed include an out of bounds access vulnerability.
6e5afa1cbe1584c0b4ce65523ddf5afbc29f27d7a131f2ed8d22dc85faa81a93
Red Hat Security Advisory 2020-2730-01 - KVM is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-rhev packages provide the user-space component for running virtual machines that use KVM in environments managed by Red Hat products. Issues addressed include an out of bounds access vulnerability.
8de74c7470b1fcaf3482f20656fa146112016670e278f067b714e6707fc55d2a
Red Hat Security Advisory 2020-2342-01 - KVM is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-rhev packages provide the user-space component for running virtual machines that use KVM in environments managed by Red Hat products. Issues addressed include buffer overflow and out of bounds access vulnerabilities.
e543f9fef4963291f074e800e0194dcf8281b6d582e9a925d4bf1a1baa86e1ad
Red Hat Security Advisory 2020-1403-01 - Kernel-based Virtual Machine is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM. Issues addressed include an out of bounds access vulnerability.
cb873a7c6fcd27a328056807510562b48a02381d2a284825d8d1bfb28eb2f0e2
Red Hat Security Advisory 2020-1379-01 - The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Issues addressed include an out of bounds access vulnerability.
47febdee0362fc180a5203915dbf3943f4e82b3eefcb10196c40be3e44e251bc
Red Hat Security Advisory 2020-1352-01 - Kernel-based Virtual Machine is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-ma packages provide the user-space component for running virtual machines that use KVM on the IBM z Systems, IBM Power, and 64-bit ARM architectures. Issues addressed include an out of bounds access vulnerability.
abab3af6ab91cddd444c056748413aea3ec3b5bb4f82fbfbdf5428e6961aab58
Red Hat Security Advisory 2020-1351-01 - Kernel-based Virtual Machine is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM. Issues addressed include an out of bounds access vulnerability.
3021f0047dbd6e4ea1771ecc9ae7f6acbba1eeefae5a9383a628b427fcf92d3b
Red Hat Security Advisory 2020-1300-01 - KVM is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-rhev packages provide the user-space component for running virtual machines that use KVM in environments managed by Red Hat products. Issues addressed include an out of bounds access vulnerability.
3b3c803f11b4c41a45febe8388c0473da3dde22357cdfbf6ed410e72a987fcf3
Red Hat Security Advisory 2020-1292-01 - KVM is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-rhev packages provide the user-space component for running virtual machines that use KVM in environments managed by Red Hat products. Issues addressed include an out of bounds access vulnerability.
822a88fbde4ba430ccfe12abfad61ca2fa5862dcf015836281560a4ca8943b73
Red Hat Security Advisory 2020-1261-01 - The Advanced Virtualization module provides the user-space component for running virtual machines that use KVM in environments managed by Red Hat products. Issues addressed include an out of bounds access vulnerability.
b2e46d4c0863cdd73ebf6a5739b3b8afcf0274012a3d439df57ae2ac55fbaab1
Red Hat Security Advisory 2020-1208-01 - Kernel-based Virtual Machine is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM. Issues addressed include an out of bounds access vulnerability.
1d49bb6b341004aa7a707a11335975ea56427a37199f06435075f0d7f516c0ed
Red Hat Security Advisory 2020-1209-01 - Kernel-based Virtual Machine is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-ma packages provide the user-space component for running virtual machines that use KVM on the IBM z Systems, IBM Power, and 64-bit ARM architectures. Issues addressed include an out of bounds access vulnerability.
19245a194fa94c23c16505fc216ae38b170c9579cd06b93437063e6f6dec1e1e
Gentoo Linux Security Advisory 202003-66 - Multiple vulnerabilities have been found in QEMU, the worst of which could result in the arbitrary execution of code. Versions less than 4.2.0-r2 are affected.
26d01ed289b866f334e985320e13cc92a34d670f55069043019c8c11db2221aa
Red Hat Security Advisory 2020-0889-01 - The slirp4netns package contains user-mode networking for unprivileged network namespaces. It is required to enable networking for rootless containers. Issues addressed include buffer overflow and use-after-free vulnerabilities.
cb90c6cd9a262933377b552a4fe0e120111a99614cf0f6c9da1cefaa8d581cbd