{"affected":[{"ecosystem_specific":{"binaries":[{"qemu":"2.11.2-9.43.1","qemu-arm":"2.11.2-9.43.1","qemu-block-curl":"2.11.2-9.43.1","qemu-block-iscsi":"2.11.2-9.43.1","qemu-block-rbd":"2.11.2-9.43.1","qemu-block-ssh":"2.11.2-9.43.1","qemu-guest-agent":"2.11.2-9.43.1","qemu-ipxe":"1.0.0+-9.43.1","qemu-kvm":"2.11.2-9.43.1","qemu-lang":"2.11.2-9.43.1","qemu-seabios":"1.11.0_0_g63451fc-9.43.1","qemu-sgabios":"8-9.43.1","qemu-tools":"2.11.2-9.43.1","qemu-vgabios":"1.11.0_0_g63451fc-9.43.1","qemu-x86":"2.11.2-9.43.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Performance Computing 15-ESPOS","name":"qemu","purl":"pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-ESPOS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.11.2-9.43.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"qemu":"2.11.2-9.43.1","qemu-arm":"2.11.2-9.43.1","qemu-block-curl":"2.11.2-9.43.1","qemu-block-iscsi":"2.11.2-9.43.1","qemu-block-rbd":"2.11.2-9.43.1","qemu-block-ssh":"2.11.2-9.43.1","qemu-guest-agent":"2.11.2-9.43.1","qemu-ipxe":"1.0.0+-9.43.1","qemu-kvm":"2.11.2-9.43.1","qemu-lang":"2.11.2-9.43.1","qemu-seabios":"1.11.0_0_g63451fc-9.43.1","qemu-sgabios":"8-9.43.1","qemu-tools":"2.11.2-9.43.1","qemu-vgabios":"1.11.0_0_g63451fc-9.43.1","qemu-x86":"2.11.2-9.43.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Performance Computing 15-LTSS","name":"qemu","purl":"pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.11.2-9.43.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"qemu":"2.11.2-9.43.1","qemu-arm":"2.11.2-9.43.1","qemu-block-curl":"2.11.2-9.43.1","qemu-block-iscsi":"2.11.2-9.43.1","qemu-block-rbd":"2.11.2-9.43.1","qemu-block-ssh":"2.11.2-9.43.1","qemu-guest-agent":"2.11.2-9.43.1","qemu-ipxe":"1.0.0+-9.43.1","qemu-kvm":"2.11.2-9.43.1","qemu-lang":"2.11.2-9.43.1","qemu-ppc":"2.11.2-9.43.1","qemu-s390":"2.11.2-9.43.1","qemu-seabios":"1.11.0_0_g63451fc-9.43.1","qemu-sgabios":"8-9.43.1","qemu-tools":"2.11.2-9.43.1","qemu-vgabios":"1.11.0_0_g63451fc-9.43.1","qemu-x86":"2.11.2-9.43.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 15-LTSS","name":"qemu","purl":"pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Server%2015-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.11.2-9.43.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"qemu":"2.11.2-9.43.1","qemu-block-curl":"2.11.2-9.43.1","qemu-block-iscsi":"2.11.2-9.43.1","qemu-block-rbd":"2.11.2-9.43.1","qemu-block-ssh":"2.11.2-9.43.1","qemu-guest-agent":"2.11.2-9.43.1","qemu-ipxe":"1.0.0+-9.43.1","qemu-kvm":"2.11.2-9.43.1","qemu-lang":"2.11.2-9.43.1","qemu-ppc":"2.11.2-9.43.1","qemu-seabios":"1.11.0_0_g63451fc-9.43.1","qemu-sgabios":"8-9.43.1","qemu-tools":"2.11.2-9.43.1","qemu-vgabios":"1.11.0_0_g63451fc-9.43.1","qemu-x86":"2.11.2-9.43.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 15","name":"qemu","purl":"pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.11.2-9.43.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for qemu fixes the following issues:\n\n- Fix OOB access in sm501 device emulation (CVE-2020-12829, bsc#1172385)\n- Fix OOB access possibility in MegaRAID SAS 8708EM2 emulation (CVE-2020-13362 bsc#1172383)\n- Fix use-after-free in usb xhci packet handling (CVE-2020-25723, bsc#1178934)\n- Fix use-after-free in usb ehci packet handling (CVE-2020-25084, bsc#1176673)\n- Fix OOB access in usb hcd-ohci emulation (CVE-2020-25624, bsc#1176682)\n- Fix infinite loop (DoS) in usb hcd-ohci emulation (CVE-2020-25625, bsc#1176684)\n- Fix guest triggerable assert in shared network handling code (CVE-2020-27617, bsc#1178174)\n- Fix infinite loop (DoS) in e1000e device emulation (CVE-2020-28916, bsc#1179468)\n- Fix OOB access in atapi emulation (CVE-2020-29443, bsc#1181108)\n- Fix null pointer deref. (DoS) in mmio ops (CVE-2020-15469, bsc#1173612)\n- Fix infinite loop (DoS) in e1000 device emulation (CVE-2021-20257, bsc#1182577)\n- Fix OOB access (stack overflow) in rtl8139 NIC emulation (CVE-2021-3416, bsc#1182968)\n- Fix OOB access (stack overflow) in other NIC emulations (CVE-2021-3416)\n- Fix OOB access in SLIRP ARP/NCSI packet processing (CVE-2020-29129, bsc#1179466, CVE-2020-29130, bsc#1179467)\n- Fix null pointer dereference possibility (DoS) in MegaRAID SAS 8708EM2 emulation (CVE-2020-13659 bsc#1172386\n- Fix OOB access in iscsi (CVE-2020-11947 bsc#1180523)\n- Fix OOB access in vmxnet3 emulation (CVE-2021-20203 bsc#1181639)\n- Fix buffer overflow in the XGMAC device (CVE-2020-15863 bsc#1174386)\n- Fix DoS in packet processing of various emulated NICs (CVE-2020-16092 bsc#1174641)\n- Fix OOB access while processing USB packets (CVE-2020-14364 bsc#1175441)\n- Fix package scripts to not use hard coded paths for temporary working directories and log files (bsc#1182425)\n- Fix potential privilege escalation in virtfs (CVE-2021-20181 bsc#1182137)\n- Drop the 'ampersand 0x25 shift altgr' line in pt-br keymap file (bsc#1129962)\n- Fix migration failure with error message: 'error while loading state section id 3(ram) (bsc#1154790)\n- Fix OOB access possibility in ES1370 audio device emulation (CVE-2020-13361 bsc#1172384)\n- Fix OOB access in ROM loading (CVE-2020-13765 bsc#1172478)\n- Fix OOB access in ARM interrupt handling (CVE-2021-20221 bsc#1181933)\n- Tweaks to spec file for better formatting, and remove not needed BuildRequires for e2fsprogs-devel and libpcap-devel\n- Use '%service_del_postun_without_restart' instead of '%service_del_postun' to avoid 'Failed to try-restart qemu-ga@.service' error while updating the qemu-guest-agent. (bsc#1178565)\n- Fix OOB access in sm501 device emulation (CVE-2020-12829, bsc#1172385)\n","id":"SUSE-SU-2021:1244-1","modified":"2021-04-16T12:46:02Z","published":"2021-04-16T12:46:02Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2021/suse-su-20211244-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1129962"},{"type":"REPORT","url":"https://bugzilla.suse.com/1154790"},{"type":"REPORT","url":"https://bugzilla.suse.com/1172383"},{"type":"REPORT","url":"https://bugzilla.suse.com/1172384"},{"type":"REPORT","url":"https://bugzilla.suse.com/1172385"},{"type":"REPORT","url":"https://bugzilla.suse.com/1172386"},{"type":"REPORT","url":"https://bugzilla.suse.com/1172478"},{"type":"REPORT","url":"https://bugzilla.suse.com/1173612"},{"type":"REPORT","url":"https://bugzilla.suse.com/1174386"},{"type":"REPORT","url":"https://bugzilla.suse.com/1174641"},{"type":"REPORT","url":"https://bugzilla.suse.com/1175441"},{"type":"REPORT","url":"https://bugzilla.suse.com/1176673"},{"type":"REPORT","url":"https://bugzilla.suse.com/1176682"},{"type":"REPORT","url":"https://bugzilla.suse.com/1176684"},{"type":"REPORT","url":"https://bugzilla.suse.com/1178174"},{"type":"REPORT","url":"https://bugzilla.suse.com/1178565"},{"type":"REPORT","url":"https://bugzilla.suse.com/1178934"},{"type":"REPORT","url":"https://bugzilla.suse.com/1179466"},{"type":"REPORT","url":"https://bugzilla.suse.com/1179467"},{"type":"REPORT","url":"https://bugzilla.suse.com/1179468"},{"type":"REPORT","url":"https://bugzilla.suse.com/1180523"},{"type":"REPORT","url":"https://bugzilla.suse.com/1181108"},{"type":"REPORT","url":"https://bugzilla.suse.com/1181639"},{"type":"REPORT","url":"https://bugzilla.suse.com/1181933"},{"type":"REPORT","url":"https://bugzilla.suse.com/1182137"},{"type":"REPORT","url":"https://bugzilla.suse.com/1182425"},{"type":"REPORT","url":"https://bugzilla.suse.com/1182577"},{"type":"REPORT","url":"https://bugzilla.suse.com/1182968"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-11947"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-12829"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-13361"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-13362"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-13659"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-13765"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-14364"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-15469"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-15863"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-16092"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-25084"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-25624"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-25625"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-25723"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-27617"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-28916"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-29129"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-29130"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-29443"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-20181"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-20203"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-20221"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-20257"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-3416"}],"related":["CVE-2020-11947","CVE-2020-12829","CVE-2020-13361","CVE-2020-13362","CVE-2020-13659","CVE-2020-13765","CVE-2020-14364","CVE-2020-15469","CVE-2020-15863","CVE-2020-16092","CVE-2020-25084","CVE-2020-25624","CVE-2020-25625","CVE-2020-25723","CVE-2020-27617","CVE-2020-28916","CVE-2020-29129","CVE-2020-29130","CVE-2020-29443","CVE-2021-20181","CVE-2021-20203","CVE-2021-20221","CVE-2021-20257","CVE-2021-3416"],"summary":"Security update for qemu","upstream":["CVE-2020-11947","CVE-2020-12829","CVE-2020-13361","CVE-2020-13362","CVE-2020-13659","CVE-2020-13765","CVE-2020-14364","CVE-2020-15469","CVE-2020-15863","CVE-2020-16092","CVE-2020-25084","CVE-2020-25624","CVE-2020-25625","CVE-2020-25723","CVE-2020-27617","CVE-2020-28916","CVE-2020-29129","CVE-2020-29130","CVE-2020-29443","CVE-2021-20181","CVE-2021-20203","CVE-2021-20221","CVE-2021-20257","CVE-2021-3416"]}