SUSE: 2020:0017-1 important: virglrenderer
Summary
This update for virglrenderer fixes the following issues: - CVE-2019-18388: Fixed a null pointer dereference which could have led to denial of service (bsc#1159479). - CVE-2019-18390: Fixed an out of bound read which could have led to denial of service (bsc#1159478). - CVE-2019-18389: Fixed a heap buffer overflow which could have led to guest escape or denial of service (bsc#1159482). - CVE-2019-18391: Fixed a heap based buffer overflow which could have led to guest escape or denial of service (bsc#1159486). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Module for Server Applications 15-SP1: zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP1-2020-17=1 - SUSE Linux Enterprise Module for Server Applications 15: zypper ...
Read the Full AdvisoryReferences
#1159478 #1159479 #1159482 #1159486
Cross- CVE-2019-18388 CVE-2019-18389 CVE-2019-18390
CVE-2019-18391
Affected Products:
SUSE Linux Enterprise Module for Server Applications 15-SP1
SUSE Linux Enterprise Module for Server Applications 15
SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1
SUSE Linux Enterprise Module for Open Buildservice Development Tools 15
https://www.suse.com/security/cve/CVE-2019-18388.html
https://www.suse.com/security/cve/CVE-2019-18389.html
https://www.suse.com/security/cve/CVE-2019-18390.html
https://www.suse.com/security/cve/CVE-2019-18391.html
https://bugzilla.suse.com/1159478
https://bugzilla.suse.com/1159479
https://bugzilla.suse.com/1159482
https://bugzilla.suse.com/1159486