File _patchinfo of Package patchinfo.16839
<patchinfo incident="16839"> <issue tracker="bnc" id="1180432">VUL-0: CVE-2020-35503: qemu,kvm,xen: NULL pointer dereference issue in megasas-gen2 host bus adapter</issue> <issue tracker="bnc" id="1189145">VUL-0: CVE-2021-3682: kvm,qemu: usbredir: free call on invalid pointer in bufp_alloc()</issue> <issue tracker="bnc" id="1180433">VUL-0: CVE-2020-35504: kvm,xen,qemu: NULL pointer dereference in scsi_req_continue() in hw/scsi/scsi-bus.c</issue> <issue tracker="bnc" id="1186012">VUL-1: CVE-2021-3527: qemu,kvm: QEMU: usb: unbounded stack allocation in usbredir</issue> <issue tracker="bnc" id="1180435">VUL-0: CVE-2020-35506: kvm,qemu,xen: use after free vulnerability in esp_do_dma() in hw/scsi/esp.c</issue> <issue tracker="bnc" id="1180434">VUL-0: CVE-2020-35505: qemu,xen,kvm: NULL pointer dereference in do_busid_cmd() in hw/scsi/esp.c</issue> <issue tracker="bnc" id="1182651">VUL-1: CVE-2021-20255: qemu,kvm: eepro100: stack overflow via infinite recursion</issue> <issue tracker="bnc" id="1187364">VUL-1: CVE-2021-3592: qemu,kvm: slirp: invalid pointer initialization may lead to information disclosure (bootp)</issue> <issue tracker="bnc" id="1187529">VUL-0: CVE-2021-3611: qemu: intel-hda: segmentation fault due to stack overflow</issue> <issue tracker="bnc" id="1187365">VUL-1: CVE-2021-3593: qemu: slirp: invalid pointer initialization may lead to information disclosure (udp6)</issue> <issue tracker="bnc" id="1187499">VUL-1: CVE-2021-3582: qemu: pvrdma: unproperly mremap in pvrdma_map_to_pdir()</issue> <issue tracker="bnc" id="1187367">VUL-1: CVE-2021-3594: qemu,kvm: slirp: invalid pointer initialization may lead to information disclosure (udp)</issue> <issue tracker="bnc" id="1187538">VUL-1: CVE-2021-3608: qemu: pvrdma: uninitialized memory unmap in pvrdma_ring_init()</issue> <issue tracker="bnc" id="1187366">VUL-1: CVE-2021-3595: qemu: slirp: invalid pointer initialization may lead to information disclosure (tftp)</issue> <issue tracker="bnc" id="1187539">VUL-1: CVE-2021-3607: qemu: pvrdma: unchecked malloc size due to integer overflow in init_dev_ring()</issue> <issue tracker="cve" id="2021-3608"/> <issue tracker="cve" id="2021-3611"/> <issue tracker="cve" id="2021-3593"/> <issue tracker="cve" id="2021-3595"/> <issue tracker="cve" id="2021-3592"/> <issue tracker="cve" id="2021-3594"/> <issue tracker="cve" id="2021-3607"/> <issue tracker="cve" id="2021-3582"/> <issue tracker="cve" id="2021-3682"/> <issue tracker="cve" id="2020-35506"/> <issue tracker="cve" id="2021-3527"/> <issue tracker="cve" id="2020-35504"/> <issue tracker="cve" id="2021-20255"/> <issue tracker="cve" id="2020-35505"/> <issue tracker="cve" id="2020-35503"/> <packager>jziviani</packager> <rating>important</rating> <category>security</category> <summary>Security update for qemu</summary> <description>This update for qemu fixes the following issues: Security issues fixed: - CVE-2021-3527: usb: unbounded stack allocation in usbredir (bsc#1186012) - CVE-2021-3582: Fix possible mremap overflow in the pvrdma (bsc#1187499) - CVE-2021-3592: Fix for slirp: invalid pointer initialization may lead to information disclosure (bootp) (bsc#1187364) - CVE-2021-3593: Fix for slirp: invalid pointer initialization may lead to information disclosure (udp6) (bsc#1187365) - CVE-2021-3594: Fix for slirp: invalid pointer initialization may lead to information disclosure (udp) (bsc#1187367) - CVE-2021-3595: Fixed slirp: invalid pointer initialization may lead to information disclosure (tftp) (bsc#1187366) - CVE-2021-3607: Ensure correct input on ring init (bsc#1187539) - CVE-2021-3608: Fix the ring init error flow (bsc#1187538) - CVE-2021-3611: Fix intel-hda segmentation fault due to stack overflow (bsc#1187529) - CVE-2021-3682: usbredir: free call on invalid pointer in bufp_alloc (bsc#1189145) - CVE-2020-35503: NULL pointer dereference issue in megasas-gen2 host bus adapter (bsc#1180432) - CVE-2020-35504,CVE-2020-35505,CVE-2020-35506: NULL pointer dereference in ESP (bsc#1180433 bsc#1180434 bsc#1180435) - CVE-2021-20255: eepro100: stack overflow via infinite recursion (bsc#1182651) This update was imported from the SUSE:SLE-15-SP2:Update update project.</description> </patchinfo>