Vulnerability from csaf_suse
Published
2021-04-20 12:35
Modified
2021-04-20 12:35
Summary
Security update for kvm

Notes

Title of the patch
Security update for kvm
Description of the patch
This update for kvm fixes the following issues: - Fix OOB read and write due to integer overflow in sm501_2d_operation() in hw/display/sm501.c (CVE-2020-12829, bsc#1172385) - Fix OOB access possibility in MegaRAID SAS 8708EM2 emulation (CVE-2020-13362 bsc#1172383) - Fix use-after-free in usb xhci packet handling (CVE-2020-25723, bsc#1178934) - Fix use-after-free in usb ehci packet handling (CVE-2020-25084, bsc#1176673) - Fix OOB access in usb hcd-ohci emulation (CVE-2020-25624, bsc#1176682) - Fix infinite loop (DoS) in usb hcd-ohci emulation (CVE-2020-25625, bsc#1176684) - Fix OOB access in atapi emulation (CVE-2020-29443, bsc#1181108) - Fix DoS in e1000 emulated device (CVE-2021-20257 bsc#1182577) - Fix OOB access in SLIRP ARP packet processing (CVE-2020-29130, bsc#1179467) - Fix OOB access while processing USB packets (CVE-2020-14364 bsc#1175441) - Fix potential privilege escalation in virtfs (CVE-2021-20181 bsc#1182137) - Fix package scripts to not use hard coded paths for temporary working directories and log files (bsc#1182425) - Fix OOB access possibility in ES1370 audio device emulation (CVE-2020-13361 bsc#1172384) - Fix OOB access in ROM loading (CVE-2020-13765 bsc#1172478)
Patchnames
slessp4-kvm-14704
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for kvm",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for kvm fixes the following issues:\n\n- Fix OOB read and write due to integer overflow in sm501_2d_operation() in hw/display/sm501.c (CVE-2020-12829, bsc#1172385)\n- Fix OOB access possibility in MegaRAID SAS 8708EM2 emulation (CVE-2020-13362 bsc#1172383)\n- Fix use-after-free in usb xhci packet handling (CVE-2020-25723, bsc#1178934)\n- Fix use-after-free in usb ehci packet handling (CVE-2020-25084, bsc#1176673)\n- Fix OOB access in usb hcd-ohci emulation (CVE-2020-25624, bsc#1176682)\n- Fix infinite loop (DoS) in usb hcd-ohci emulation (CVE-2020-25625, bsc#1176684)\n- Fix OOB access in atapi emulation (CVE-2020-29443, bsc#1181108)\n- Fix DoS in e1000 emulated device (CVE-2021-20257 bsc#1182577)\n- Fix OOB access in SLIRP ARP packet processing (CVE-2020-29130, bsc#1179467)\n- Fix OOB access while processing USB packets (CVE-2020-14364 bsc#1175441)\n- Fix potential privilege escalation in virtfs (CVE-2021-20181 bsc#1182137)\n- Fix package scripts to not use hard coded paths for temporary working directories and log files (bsc#1182425)\n- Fix OOB access possibility in ES1370 audio device emulation (CVE-2020-13361 bsc#1172384)\n- Fix OOB access in ROM loading (CVE-2020-13765 bsc#1172478)\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "slessp4-kvm-14704",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_14704-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2021:14704-1",
        "url": "https://www.suse.com/support/update/announcement/2021/suse-su-202114704-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2021:14704-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-April/008660.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172383",
        "url": "https://bugzilla.suse.com/1172383"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172384",
        "url": "https://bugzilla.suse.com/1172384"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172385",
        "url": "https://bugzilla.suse.com/1172385"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172478",
        "url": "https://bugzilla.suse.com/1172478"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175441",
        "url": "https://bugzilla.suse.com/1175441"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176673",
        "url": "https://bugzilla.suse.com/1176673"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176682",
        "url": "https://bugzilla.suse.com/1176682"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176684",
        "url": "https://bugzilla.suse.com/1176684"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1178934",
        "url": "https://bugzilla.suse.com/1178934"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179467",
        "url": "https://bugzilla.suse.com/1179467"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1181108",
        "url": "https://bugzilla.suse.com/1181108"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1182137",
        "url": "https://bugzilla.suse.com/1182137"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1182425",
        "url": "https://bugzilla.suse.com/1182425"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1182577",
        "url": "https://bugzilla.suse.com/1182577"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-3689 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-3689/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-1779 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-1779/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-12829 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-12829/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-13361 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-13361/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-13362 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-13362/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-13765 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-13765/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-14364 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-14364/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-25084 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-25084/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-25624 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-25624/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-25625 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-25625/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-25723 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-25723/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-29130 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-29130/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-29443 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-29443/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-20181 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-20181/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-20257 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-20257/"
      }
    ],
    "title": "Security update for kvm",
    "tracking": {
      "current_release_date": "2021-04-20T12:35:06Z",
      "generator": {
        "date": "2021-04-20T12:35:06Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2021:14704-1",
      "initial_release_date": "2021-04-20T12:35:06Z",
      "revision_history": [
        {
          "date": "2021-04-20T12:35:06Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kvm-1.4.2-60.34.1.i586",
                "product": {
                  "name": "kvm-1.4.2-60.34.1.i586",
                  "product_id": "kvm-1.4.2-60.34.1.i586"
                }
              }
            ],
            "category": "architecture",
            "name": "i586"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kvm-1.4.2-60.34.1.s390x",
                "product": {
                  "name": "kvm-1.4.2-60.34.1.s390x",
                  "product_id": "kvm-1.4.2-60.34.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kvm-1.4.2-60.34.1.x86_64",
                "product": {
                  "name": "kvm-1.4.2-60.34.1.x86_64",
                  "product_id": "kvm-1.4.2-60.34.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 11 SP4-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise Server 11 SP4-LTSS",
                  "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse_sles:11:sp4"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kvm-1.4.2-60.34.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.i586"
        },
        "product_reference": "kvm-1.4.2-60.34.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kvm-1.4.2-60.34.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.s390x"
        },
        "product_reference": "kvm-1.4.2-60.34.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kvm-1.4.2-60.34.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.x86_64"
        },
        "product_reference": "kvm-1.4.2-60.34.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2014-3689",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-3689"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The vmware-vga driver (hw/display/vmware_vga.c) in QEMU allows local guest users to write to qemu memory locations and gain privileges via unspecified parameters related to rectangle handling.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-3689",
          "url": "https://www.suse.com/security/cve/CVE-2014-3689"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1072223 for CVE-2014-3689",
          "url": "https://bugzilla.suse.com/1072223"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189862 for CVE-2014-3689",
          "url": "https://bugzilla.suse.com/1189862"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 901508 for CVE-2014-3689",
          "url": "https://bugzilla.suse.com/901508"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 962611 for CVE-2014-3689",
          "url": "https://bugzilla.suse.com/962611"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-04-20T12:35:06Z",
          "details": "important"
        }
      ],
      "title": "CVE-2014-3689"
    },
    {
      "cve": "CVE-2015-1779",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-1779"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The VNC websocket frame decoder in QEMU allows remote attackers to cause a denial of service (memory and CPU consumption) via a large (1) websocket payload or (2) HTTP headers section.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-1779",
          "url": "https://www.suse.com/security/cve/CVE-2015-1779"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 924018 for CVE-2015-1779",
          "url": "https://bugzilla.suse.com/924018"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 962632 for CVE-2015-1779",
          "url": "https://bugzilla.suse.com/962632"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-04-20T12:35:06Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2015-1779"
    },
    {
      "cve": "CVE-2020-12829",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-12829"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In QEMU through 5.0.0, an integer overflow was found in the SM501 display driver implementation. This flaw occurs in the COPY_AREA macro while handling MMIO write operations through the sm501_2d_engine_write() callback. A local attacker could abuse this flaw to crash the QEMU process in sm501_2d_operation() in hw/display/sm501.c on the host, resulting in a denial of service.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-12829",
          "url": "https://www.suse.com/security/cve/CVE-2020-12829"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1172385 for CVE-2020-12829",
          "url": "https://bugzilla.suse.com/1172385"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-04-20T12:35:06Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-12829"
    },
    {
      "cve": "CVE-2020-13361",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-13361"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In QEMU 5.0.0 and earlier, es1370_transfer_audio in hw/audio/es1370.c does not properly validate the frame count, which allows guest OS users to trigger an out-of-bounds access during an es1370_write() operation.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-13361",
          "url": "https://www.suse.com/security/cve/CVE-2020-13361"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1172384 for CVE-2020-13361",
          "url": "https://bugzilla.suse.com/1172384"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.9,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-04-20T12:35:06Z",
          "details": "low"
        }
      ],
      "title": "CVE-2020-13361"
    },
    {
      "cve": "CVE-2020-13362",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-13362"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In QEMU 5.0.0 and earlier, megasas_lookup_frame in hw/scsi/megasas.c has an out-of-bounds read via a crafted reply_queue_head field from a guest OS user.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-13362",
          "url": "https://www.suse.com/security/cve/CVE-2020-13362"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1172383 for CVE-2020-13362",
          "url": "https://bugzilla.suse.com/1172383"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.2,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-04-20T12:35:06Z",
          "details": "low"
        }
      ],
      "title": "CVE-2020-13362"
    },
    {
      "cve": "CVE-2020-13765",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-13765"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "rom_copy() in hw/core/loader.c in QEMU 4.0 and 4.1.0 does not validate the relationship between two addresses, which allows attackers to trigger an invalid memory copy operation.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-13765",
          "url": "https://www.suse.com/security/cve/CVE-2020-13765"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1172478 for CVE-2020-13765",
          "url": "https://bugzilla.suse.com/1172478"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.2,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-04-20T12:35:06Z",
          "details": "important"
        }
      ],
      "title": "CVE-2020-13765"
    },
    {
      "cve": "CVE-2020-14364",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-14364"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An out-of-bounds read/write access flaw was found in the USB emulator of the QEMU in versions before 5.2.0. This issue occurs while processing USB packets from a guest when USBDevice \u0027setup_len\u0027 exceeds its \u0027data_buf[4096]\u0027 in the do_token_in, do_token_out routines. This flaw allows a guest user to crash the QEMU process, resulting in a denial of service, or the potential execution of arbitrary code with the privileges of the QEMU process on the host.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-14364",
          "url": "https://www.suse.com/security/cve/CVE-2020-14364"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1175441 for CVE-2020-14364",
          "url": "https://bugzilla.suse.com/1175441"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1175534 for CVE-2020-14364",
          "url": "https://bugzilla.suse.com/1175534"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1176494 for CVE-2020-14364",
          "url": "https://bugzilla.suse.com/1176494"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1177130 for CVE-2020-14364",
          "url": "https://bugzilla.suse.com/1177130"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-04-20T12:35:06Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-14364"
    },
    {
      "cve": "CVE-2020-25084",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-25084"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "QEMU 5.0.0 has a use-after-free in hw/usb/hcd-xhci.c because the usb_packet_map return value is not checked.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-25084",
          "url": "https://www.suse.com/security/cve/CVE-2020-25084"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1176673 for CVE-2020-25084",
          "url": "https://bugzilla.suse.com/1176673"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-04-20T12:35:06Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-25084"
    },
    {
      "cve": "CVE-2020-25624",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-25624"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "hw/usb/hcd-ohci.c in QEMU 5.0.0 has a stack-based buffer over-read via values obtained from the host controller driver.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-25624",
          "url": "https://www.suse.com/security/cve/CVE-2020-25624"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1176682 for CVE-2020-25624",
          "url": "https://bugzilla.suse.com/1176682"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-04-20T12:35:06Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-25624"
    },
    {
      "cve": "CVE-2020-25625",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-25625"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "hw/usb/hcd-ohci.c in QEMU 5.0.0 has an infinite loop when a TD list has a loop.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-25625",
          "url": "https://www.suse.com/security/cve/CVE-2020-25625"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1176684 for CVE-2020-25625",
          "url": "https://bugzilla.suse.com/1176684"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.5,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-04-20T12:35:06Z",
          "details": "low"
        }
      ],
      "title": "CVE-2020-25625"
    },
    {
      "cve": "CVE-2020-25723",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-25723"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A reachable assertion issue was found in the USB EHCI emulation code of QEMU. It could occur while processing USB requests due to missing handling of DMA memory map failure. A malicious privileged user within the guest may abuse this flaw to send bogus USB requests and crash the QEMU process on the host, resulting in a denial of service.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-25723",
          "url": "https://www.suse.com/security/cve/CVE-2020-25723"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1178934 for CVE-2020-25723",
          "url": "https://bugzilla.suse.com/1178934"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1178935 for CVE-2020-25723",
          "url": "https://bugzilla.suse.com/1178935"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.2,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-04-20T12:35:06Z",
          "details": "low"
        }
      ],
      "title": "CVE-2020-25723"
    },
    {
      "cve": "CVE-2020-29130",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-29130"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "slirp.c in libslirp through 4.3.1 has a buffer over-read because it tries to read a certain amount of header data even if that exceeds the total packet length.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-29130",
          "url": "https://www.suse.com/security/cve/CVE-2020-29130"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1178658 for CVE-2020-29130",
          "url": "https://bugzilla.suse.com/1178658"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179467 for CVE-2020-29130",
          "url": "https://bugzilla.suse.com/1179467"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179477 for CVE-2020-29130",
          "url": "https://bugzilla.suse.com/1179477"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-04-20T12:35:06Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-29130"
    },
    {
      "cve": "CVE-2020-29443",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-29443"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "ide_atapi_cmd_reply_end in hw/ide/atapi.c in QEMU 5.1.0 allows out-of-bounds read access because a buffer index is not validated.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-29443",
          "url": "https://www.suse.com/security/cve/CVE-2020-29443"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1181108 for CVE-2020-29443",
          "url": "https://bugzilla.suse.com/1181108"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.9,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-04-20T12:35:06Z",
          "details": "low"
        }
      ],
      "title": "CVE-2020-29443"
    },
    {
      "cve": "CVE-2021-20181",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-20181"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A race condition flaw was found in the 9pfs server implementation of QEMU up to and including 5.2.0. This flaw allows a malicious 9p client to cause a use-after-free error, potentially escalating their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity as well as system availability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-20181",
          "url": "https://www.suse.com/security/cve/CVE-2021-20181"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1182137 for CVE-2021-20181",
          "url": "https://bugzilla.suse.com/1182137"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-04-20T12:35:06Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-20181"
    },
    {
      "cve": "CVE-2021-20257",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-20257"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An infinite loop flaw was found in the e1000 NIC emulator of the QEMU. This issue occurs while processing transmits (tx) descriptors in process_tx_desc if various descriptor fields are initialized with invalid values. This flaw allows a guest to consume CPU cycles on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-20257",
          "url": "https://www.suse.com/security/cve/CVE-2021-20257"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1182577 for CVE-2021-20257",
          "url": "https://bugzilla.suse.com/1182577"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1182846 for CVE-2021-20257",
          "url": "https://bugzilla.suse.com/1182846"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.2,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kvm-1.4.2-60.34.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-04-20T12:35:06Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-20257"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.