File _patchinfo of Package patchinfo.16839

<patchinfo incident="16839">
  <issue tracker="bnc" id="1180432">VUL-0: CVE-2020-35503: qemu,kvm,xen: NULL pointer dereference issue in megasas-gen2 host bus adapter</issue>
  <issue tracker="bnc" id="1189145">VUL-0: CVE-2021-3682: kvm,qemu: usbredir: free call on invalid pointer in bufp_alloc()</issue>
  <issue tracker="bnc" id="1180433">VUL-0: CVE-2020-35504: kvm,xen,qemu: NULL pointer dereference in scsi_req_continue() in hw/scsi/scsi-bus.c</issue>
  <issue tracker="bnc" id="1186012">VUL-1: CVE-2021-3527: qemu,kvm: QEMU: usb: unbounded stack allocation in usbredir</issue>
  <issue tracker="bnc" id="1180435">VUL-0: CVE-2020-35506: kvm,qemu,xen: use after free vulnerability in esp_do_dma() in hw/scsi/esp.c</issue>
  <issue tracker="bnc" id="1180434">VUL-0: CVE-2020-35505: qemu,xen,kvm: NULL pointer dereference in do_busid_cmd() in hw/scsi/esp.c</issue>
  <issue tracker="bnc" id="1182651">VUL-1: CVE-2021-20255: qemu,kvm: eepro100: stack overflow via infinite recursion</issue>
  <issue tracker="bnc" id="1187364">VUL-1: CVE-2021-3592: qemu,kvm: slirp: invalid pointer initialization may lead to information disclosure (bootp)</issue>
  <issue tracker="bnc" id="1187529">VUL-0: CVE-2021-3611: qemu: intel-hda: segmentation fault due to stack overflow</issue>
  <issue tracker="bnc" id="1187365">VUL-1: CVE-2021-3593: qemu: slirp: invalid pointer initialization may lead to information disclosure (udp6)</issue>
  <issue tracker="bnc" id="1187499">VUL-1: CVE-2021-3582: qemu: pvrdma: unproperly mremap in pvrdma_map_to_pdir()</issue>
  <issue tracker="bnc" id="1187367">VUL-1: CVE-2021-3594: qemu,kvm: slirp: invalid pointer initialization may lead to information disclosure (udp)</issue>
  <issue tracker="bnc" id="1187538">VUL-1: CVE-2021-3608: qemu: pvrdma: uninitialized memory unmap in pvrdma_ring_init()</issue>
  <issue tracker="bnc" id="1187366">VUL-1: CVE-2021-3595: qemu: slirp: invalid pointer initialization may lead to information disclosure (tftp)</issue>
  <issue tracker="bnc" id="1187539">VUL-1: CVE-2021-3607: qemu: pvrdma: unchecked malloc size due to integer overflow in init_dev_ring()</issue>
  <issue tracker="cve" id="2021-3608"/>
  <issue tracker="cve" id="2021-3611"/>
  <issue tracker="cve" id="2021-3593"/>
  <issue tracker="cve" id="2021-3595"/>
  <issue tracker="cve" id="2021-3592"/>
  <issue tracker="cve" id="2021-3594"/>
  <issue tracker="cve" id="2021-3607"/>
  <issue tracker="cve" id="2021-3582"/>
  <issue tracker="cve" id="2021-3682"/>
  <issue tracker="cve" id="2020-35506"/>
  <issue tracker="cve" id="2021-3527"/>
  <issue tracker="cve" id="2020-35504"/>
  <issue tracker="cve" id="2021-20255"/>
  <issue tracker="cve" id="2020-35505"/>
  <issue tracker="cve" id="2020-35503"/>
  <packager>jziviani</packager>
  <rating>important</rating>
  <category>security</category>
  <summary>Security update for qemu</summary>
  <description>This update for qemu fixes the following issues:

Security issues fixed:

- CVE-2021-3527: usb: unbounded stack allocation in usbredir (bsc#1186012)
- CVE-2021-3582: Fix possible mremap overflow in the pvrdma (bsc#1187499)
- CVE-2021-3592: Fix for slirp: invalid pointer initialization may lead to information disclosure (bootp) (bsc#1187364)
- CVE-2021-3593: Fix for slirp: invalid pointer initialization may lead to information disclosure (udp6) (bsc#1187365)
- CVE-2021-3594: Fix for slirp: invalid pointer initialization may lead to information disclosure (udp) (bsc#1187367)
- CVE-2021-3595: Fixed slirp: invalid pointer initialization may lead to information disclosure (tftp) (bsc#1187366)
- CVE-2021-3607: Ensure correct input on ring init (bsc#1187539)
- CVE-2021-3608: Fix the ring init error flow (bsc#1187538)
- CVE-2021-3611: Fix intel-hda segmentation fault due to stack overflow (bsc#1187529)
- CVE-2021-3682: usbredir: free call on invalid pointer in bufp_alloc (bsc#1189145)
- CVE-2020-35503: NULL pointer dereference issue in megasas-gen2 host bus adapter (bsc#1180432)
- CVE-2020-35504,CVE-2020-35505,CVE-2020-35506: NULL pointer dereference in ESP (bsc#1180433 bsc#1180434 bsc#1180435)
- CVE-2021-20255: eepro100: stack overflow via infinite recursion (bsc#1182651)

This update was imported from the SUSE:SLE-15-SP2:Update update project.</description>
</patchinfo>
openSUSE Build Service is sponsored by