{"affected":[{"ecosystem_specific":{"binaries":[{"qemu-tools":"4.2.1-11.16.3"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Basesystem 15 SP2","name":"qemu","purl":"pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.2.1-11.16.3"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"qemu":"4.2.1-11.16.3","qemu-arm":"4.2.1-11.16.3","qemu-audio-alsa":"4.2.1-11.16.3","qemu-audio-pa":"4.2.1-11.16.3","qemu-block-curl":"4.2.1-11.16.3","qemu-block-iscsi":"4.2.1-11.16.3","qemu-block-rbd":"4.2.1-11.16.3","qemu-block-ssh":"4.2.1-11.16.3","qemu-guest-agent":"4.2.1-11.16.3","qemu-ipxe":"1.0.0+-11.16.3","qemu-kvm":"4.2.1-11.16.3","qemu-lang":"4.2.1-11.16.3","qemu-microvm":"4.2.1-11.16.3","qemu-ppc":"4.2.1-11.16.3","qemu-s390":"4.2.1-11.16.3","qemu-seabios":"1.12.1+-11.16.3","qemu-sgabios":"8-11.16.3","qemu-ui-curses":"4.2.1-11.16.3","qemu-ui-gtk":"4.2.1-11.16.3","qemu-ui-spice-app":"4.2.1-11.16.3","qemu-vgabios":"1.12.1+-11.16.3","qemu-x86":"4.2.1-11.16.3"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Server Applications 15 SP2","name":"qemu","purl":"pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.2.1-11.16.3"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"qemu":"4.2.1-11.16.3","qemu-arm":"4.2.1-11.16.3","qemu-ipxe":"1.0.0+-11.16.3","qemu-seabios":"1.12.1+-11.16.3","qemu-sgabios":"8-11.16.3","qemu-tools":"4.2.1-11.16.3","qemu-vgabios":"1.12.1+-11.16.3","qemu-x86":"4.2.1-11.16.3"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Micro 5.0","name":"qemu","purl":"pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Micro%205.0"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.2.1-11.16.3"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for qemu fixes the following issues:\n\n- CVE-2020-12829: Fix OOB access in sm501 device emulation (bsc#1172385)\n- CVE-2020-25723: Fix use-after-free in usb xhci packet handling (bsc#1178934)\n- CVE-2020-25084: Fix use-after-free in usb ehci packet handling (bsc#1176673)\n- CVE-2020-25625: Fix infinite loop (DoS) in usb hcd-ohci emulation (bsc#1176684)\n- CVE-2020-25624: Fix OOB access in usb hcd-ohci emulation (bsc#1176682)\n- CVE-2020-27617: Fix guest triggerable assert in shared network handling code (bsc#1178174)\n- CVE-2020-28916: Fix infinite loop (DoS) in e1000e device emulation (bsc#1179468)\n- CVE-2020-29443: Fix OOB access in atapi emulation (bsc#1181108)\n- CVE-2020-27821: Fix heap overflow in MSIx emulation (bsc#1179686)\n- CVE-2020-15469: Fix null pointer deref. (DoS) in mmio ops (bsc#1173612)\n- CVE-2021-20257: Fix infinite loop (DoS) in e1000 device emulation (bsc#1182577)\n- CVE-2021-3416:  Fix OOB access (stack overflow) in rtl8139 NIC emulation (bsc#1182968)\n- CVE-2021-3416:  Fix OOB access (stack overflow) in other NIC emulations (bsc#1182968)\n- CVE-2020-27616: Fix OOB access in ati-vga emulation (bsc#1178400)\n- CVE-2020-29129: Fix OOB access in SLIRP ARP/NCSI packet processing (bsc#1179466, CVE-2020-29130, bsc#1179467)\n- Fix package scripts to not use hard coded paths for temporary working directories and log files (bsc#1182425)\n- Add split-provides through forsplits/13 to cover updates of SLE15-SP2 to SLE15-SP3, and openSUSE equivalents (bsc#1184064)\n- Added a few more usability improvements for our git packaging workflow\n","id":"SUSE-SU-2021:1243-1","modified":"2021-04-16T12:45:20Z","published":"2021-04-16T12:45:20Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2021/suse-su-20211243-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1172385"},{"type":"REPORT","url":"https://bugzilla.suse.com/1173612"},{"type":"REPORT","url":"https://bugzilla.suse.com/1176673"},{"type":"REPORT","url":"https://bugzilla.suse.com/1176682"},{"type":"REPORT","url":"https://bugzilla.suse.com/1176684"},{"type":"REPORT","url":"https://bugzilla.suse.com/1178174"},{"type":"REPORT","url":"https://bugzilla.suse.com/1178400"},{"type":"REPORT","url":"https://bugzilla.suse.com/1178934"},{"type":"REPORT","url":"https://bugzilla.suse.com/1179466"},{"type":"REPORT","url":"https://bugzilla.suse.com/1179467"},{"type":"REPORT","url":"https://bugzilla.suse.com/1179468"},{"type":"REPORT","url":"https://bugzilla.suse.com/1179686"},{"type":"REPORT","url":"https://bugzilla.suse.com/1181108"},{"type":"REPORT","url":"https://bugzilla.suse.com/1182425"},{"type":"REPORT","url":"https://bugzilla.suse.com/1182577"},{"type":"REPORT","url":"https://bugzilla.suse.com/1182968"},{"type":"REPORT","url":"https://bugzilla.suse.com/1184064"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-12829"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-15469"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-25084"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-25624"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-25625"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-25723"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-27616"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-27617"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-27821"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-28916"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-29129"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-29130"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-29443"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-20257"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-3416"}],"related":["CVE-2020-12829","CVE-2020-15469","CVE-2020-25084","CVE-2020-25624","CVE-2020-25625","CVE-2020-25723","CVE-2020-27616","CVE-2020-27617","CVE-2020-27821","CVE-2020-28916","CVE-2020-29129","CVE-2020-29130","CVE-2020-29443","CVE-2021-20257","CVE-2021-3416"],"summary":"Security update for qemu","upstream":["CVE-2020-12829","CVE-2020-15469","CVE-2020-25084","CVE-2020-25624","CVE-2020-25625","CVE-2020-25723","CVE-2020-27616","CVE-2020-27617","CVE-2020-27821","CVE-2020-28916","CVE-2020-29129","CVE-2020-29130","CVE-2020-29443","CVE-2021-20257","CVE-2021-3416"]}