{"affected":[{"ecosystem_specific":{"binaries":[{"kvm":"1.4.2-60.27.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP4-LTSS","name":"kvm","purl":"pkg:rpm/suse/kvm&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.4.2-60.27.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for kvm fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2019-14378: Security fix for heap overflow in ip_reass on big packet input (bsc#1143794).\n- CVE-2019-12155: Security fix for null pointer dereference while releasing spice resources (bsc#1135902).\n- CVE-2019-13164: Security fix for qemu-bridge-helper ACL can be bypassed when names are too long (bsc#1140402).\n","id":"SUSE-SU-2019:14151-1","modified":"2019-08-21T16:01:41Z","published":"2019-08-21T16:01:41Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2019/suse-su-201914151-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1135902"},{"type":"REPORT","url":"https://bugzilla.suse.com/1140402"},{"type":"REPORT","url":"https://bugzilla.suse.com/1143794"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-12155"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-13164"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-14378"}],"related":["CVE-2019-12155","CVE-2019-13164","CVE-2019-14378"],"summary":"Security update for kvm","upstream":["CVE-2019-12155","CVE-2019-13164","CVE-2019-14378"]}