<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:cpe="http://cpe.mitre.org/language/2.0" xmlns:cvrf="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf" xmlns:cvrf-common="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/common" xmlns:cvssv2="http://scap.nist.gov/schema/cvss-v2/1.0" xmlns:cvssv3="https://www.first.org/cvss/cvss-v3.0.xsd" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:ns0="http://purl.org/dc/elements/1.1/" xmlns:prod="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod" xmlns:scap-core="http://scap.nist.gov/schema/scap-core/1.0" xmlns:sch="http://purl.oclc.org/dsdl/schematron" xmlns:vuln="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf">
  <DocumentTitle xml:lang="en">Security update for qemu</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2021:0521-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2021-02-19T10:00:45Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2021-02-19T10:00:45Z</InitialReleaseDate>
    <CurrentReleaseDate>2021-02-19T10:00:45Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for qemu</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for qemu fixes the following issues:

- Fixed potential privilege escalation in virtfs (CVE-2021-20181 bsc#1182137)
- Fixed out-of-bound access in iscsi (CVE-2020-11947 bsc#1180523)
- Fixed out-of-bound access in vmxnet3 emulation (CVE-2021-20203 bsc#1181639)
- Fixed out-of-bound access in ARM interrupt handling (CVE-2021-20221 bsc#1181933)
- Fixed vfio-pci device on s390 enters error state (bsc#1179717 bsc#1179719)
- Fixed 'Failed to try-restart qemu-ga@.service' error while updating the
  qemu-guest-agent. (bsc#1178565)
- Apply fixes to qemu scsi passthrough with respect to timeout and
  error conditions, including using more correct status codes. Add
  more qemu tracing which helped track down these issues
  (bsc#1178049)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">Container suse/sles/15.2/virt-handler:0.38.1-2021-521,Container suse/sles/15.2/virt-launcher:0.38.1-2021-521,SUSE-2021-521,SUSE-SLE-Module-Basesystem-15-SP2-2021-521,SUSE-SLE-Module-Server-Applications-15-SP2-2021-521</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2021/suse-su-20210521-1/</URL>
      <Description>Link for SUSE-SU-2021:0521-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2021-February/008346.html</URL>
      <Description>E-Mail link for SUSE-SU-2021:0521-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178049</URL>
      <Description>SUSE Bug 1178049</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178565</URL>
      <Description>SUSE Bug 1178565</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179717</URL>
      <Description>SUSE Bug 1179717</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179719</URL>
      <Description>SUSE Bug 1179719</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1180523</URL>
      <Description>SUSE Bug 1180523</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1181639</URL>
      <Description>SUSE Bug 1181639</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1181933</URL>
      <Description>SUSE Bug 1181933</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1182137</URL>
      <Description>SUSE Bug 1182137</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-11947/</URL>
      <Description>SUSE CVE CVE-2020-11947 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-20181/</URL>
      <Description>SUSE CVE CVE-2021-20181 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-20203/</URL>
      <Description>SUSE CVE CVE-2021-20203 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-20221/</URL>
      <Description>SUSE CVE CVE-2021-20221 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod">
    <Branch Type="Product Family" Name="Container suse/sles/15.2/virt-handler:0.38.1">
      <Branch Type="Product Name" Name="Container suse/sles/15.2/virt-handler:0.38.1">
        <FullProductName ProductID="Container suse/sles/15.2/virt-handler:0.38.1">Container suse/sles/15.2/virt-handler:0.38.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Container suse/sles/15.2/virt-launcher:0.38.1">
      <Branch Type="Product Name" Name="Container suse/sles/15.2/virt-launcher:0.38.1">
        <FullProductName ProductID="Container suse/sles/15.2/virt-launcher:0.38.1">Container suse/sles/15.2/virt-launcher:0.38.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for Basesystem 15 SP2">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Basesystem 15 SP2">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15 SP2" CPE="cpe:/o:suse:sle-module-basesystem:15:sp2">SUSE Linux Enterprise Module for Basesystem 15 SP2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for Server Applications 15 SP2">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Server Applications 15 SP2">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP2" CPE="cpe:/o:suse:sle-module-server-applications:15:sp2">SUSE Linux Enterprise Module for Server Applications 15 SP2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="qemu-tools-4.2.1-11.13.1">
      <FullProductName ProductID="qemu-tools-4.2.1-11.13.1">qemu-tools-4.2.1-11.13.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-4.2.1-11.13.1">
      <FullProductName ProductID="qemu-4.2.1-11.13.1">qemu-4.2.1-11.13.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-ipxe-1.0.0+-11.13.1">
      <FullProductName ProductID="qemu-ipxe-1.0.0+-11.13.1">qemu-ipxe-1.0.0+-11.13.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-seabios-1.12.1+-11.13.1">
      <FullProductName ProductID="qemu-seabios-1.12.1+-11.13.1">qemu-seabios-1.12.1+-11.13.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-sgabios-8-11.13.1">
      <FullProductName ProductID="qemu-sgabios-8-11.13.1">qemu-sgabios-8-11.13.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-vgabios-1.12.1+-11.13.1">
      <FullProductName ProductID="qemu-vgabios-1.12.1+-11.13.1">qemu-vgabios-1.12.1+-11.13.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-x86-4.2.1-11.13.1">
      <FullProductName ProductID="qemu-x86-4.2.1-11.13.1">qemu-x86-4.2.1-11.13.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-arm-4.2.1-11.13.1">
      <FullProductName ProductID="qemu-arm-4.2.1-11.13.1">qemu-arm-4.2.1-11.13.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-audio-alsa-4.2.1-11.13.1">
      <FullProductName ProductID="qemu-audio-alsa-4.2.1-11.13.1">qemu-audio-alsa-4.2.1-11.13.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-audio-pa-4.2.1-11.13.1">
      <FullProductName ProductID="qemu-audio-pa-4.2.1-11.13.1">qemu-audio-pa-4.2.1-11.13.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-curl-4.2.1-11.13.1">
      <FullProductName ProductID="qemu-block-curl-4.2.1-11.13.1">qemu-block-curl-4.2.1-11.13.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-dmg-4.2.1-11.13.1">
      <FullProductName ProductID="qemu-block-dmg-4.2.1-11.13.1">qemu-block-dmg-4.2.1-11.13.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-iscsi-4.2.1-11.13.1">
      <FullProductName ProductID="qemu-block-iscsi-4.2.1-11.13.1">qemu-block-iscsi-4.2.1-11.13.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-rbd-4.2.1-11.13.1">
      <FullProductName ProductID="qemu-block-rbd-4.2.1-11.13.1">qemu-block-rbd-4.2.1-11.13.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-ssh-4.2.1-11.13.1">
      <FullProductName ProductID="qemu-block-ssh-4.2.1-11.13.1">qemu-block-ssh-4.2.1-11.13.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-extra-4.2.1-11.13.1">
      <FullProductName ProductID="qemu-extra-4.2.1-11.13.1">qemu-extra-4.2.1-11.13.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-guest-agent-4.2.1-11.13.1">
      <FullProductName ProductID="qemu-guest-agent-4.2.1-11.13.1">qemu-guest-agent-4.2.1-11.13.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-kvm-4.2.1-11.13.1">
      <FullProductName ProductID="qemu-kvm-4.2.1-11.13.1">qemu-kvm-4.2.1-11.13.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-lang-4.2.1-11.13.1">
      <FullProductName ProductID="qemu-lang-4.2.1-11.13.1">qemu-lang-4.2.1-11.13.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-linux-user-4.2.1-11.13.1">
      <FullProductName ProductID="qemu-linux-user-4.2.1-11.13.1">qemu-linux-user-4.2.1-11.13.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-microvm-4.2.1-11.13.1">
      <FullProductName ProductID="qemu-microvm-4.2.1-11.13.1">qemu-microvm-4.2.1-11.13.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-ppc-4.2.1-11.13.1">
      <FullProductName ProductID="qemu-ppc-4.2.1-11.13.1">qemu-ppc-4.2.1-11.13.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-s390-4.2.1-11.13.1">
      <FullProductName ProductID="qemu-s390-4.2.1-11.13.1">qemu-s390-4.2.1-11.13.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-testsuite-4.2.1-11.13.2">
      <FullProductName ProductID="qemu-testsuite-4.2.1-11.13.2">qemu-testsuite-4.2.1-11.13.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-ui-curses-4.2.1-11.13.1">
      <FullProductName ProductID="qemu-ui-curses-4.2.1-11.13.1">qemu-ui-curses-4.2.1-11.13.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-ui-gtk-4.2.1-11.13.1">
      <FullProductName ProductID="qemu-ui-gtk-4.2.1-11.13.1">qemu-ui-gtk-4.2.1-11.13.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-ui-spice-app-4.2.1-11.13.1">
      <FullProductName ProductID="qemu-ui-spice-app-4.2.1-11.13.1">qemu-ui-spice-app-4.2.1-11.13.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-vhost-user-gpu-4.2.1-11.13.1">
      <FullProductName ProductID="qemu-vhost-user-gpu-4.2.1-11.13.1">qemu-vhost-user-gpu-4.2.1-11.13.1</FullProductName>
    </Branch>
    <Relationship ProductReference="qemu-tools-4.2.1-11.13.1" RelationType="Default Component Of" RelatesToProductReference="Container suse/sles/15.2/virt-handler:0.38.1">
      <FullProductName ProductID="Container suse/sles/15.2/virt-handler:0.38.1:qemu-tools-4.2.1-11.13.1">qemu-tools-4.2.1-11.13.1 as a component of Container suse/sles/15.2/virt-handler:0.38.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-4.2.1-11.13.1" RelationType="Default Component Of" RelatesToProductReference="Container suse/sles/15.2/virt-launcher:0.38.1">
      <FullProductName ProductID="Container suse/sles/15.2/virt-launcher:0.38.1:qemu-4.2.1-11.13.1">qemu-4.2.1-11.13.1 as a component of Container suse/sles/15.2/virt-launcher:0.38.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-ipxe-1.0.0+-11.13.1" RelationType="Default Component Of" RelatesToProductReference="Container suse/sles/15.2/virt-launcher:0.38.1">
      <FullProductName ProductID="Container suse/sles/15.2/virt-launcher:0.38.1:qemu-ipxe-1.0.0+-11.13.1">qemu-ipxe-1.0.0+-11.13.1 as a component of Container suse/sles/15.2/virt-launcher:0.38.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-seabios-1.12.1+-11.13.1" RelationType="Default Component Of" RelatesToProductReference="Container suse/sles/15.2/virt-launcher:0.38.1">
      <FullProductName ProductID="Container suse/sles/15.2/virt-launcher:0.38.1:qemu-seabios-1.12.1+-11.13.1">qemu-seabios-1.12.1+-11.13.1 as a component of Container suse/sles/15.2/virt-launcher:0.38.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-sgabios-8-11.13.1" RelationType="Default Component Of" RelatesToProductReference="Container suse/sles/15.2/virt-launcher:0.38.1">
      <FullProductName ProductID="Container suse/sles/15.2/virt-launcher:0.38.1:qemu-sgabios-8-11.13.1">qemu-sgabios-8-11.13.1 as a component of Container suse/sles/15.2/virt-launcher:0.38.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-tools-4.2.1-11.13.1" RelationType="Default Component Of" RelatesToProductReference="Container suse/sles/15.2/virt-launcher:0.38.1">
      <FullProductName ProductID="Container suse/sles/15.2/virt-launcher:0.38.1:qemu-tools-4.2.1-11.13.1">qemu-tools-4.2.1-11.13.1 as a component of Container suse/sles/15.2/virt-launcher:0.38.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-vgabios-1.12.1+-11.13.1" RelationType="Default Component Of" RelatesToProductReference="Container suse/sles/15.2/virt-launcher:0.38.1">
      <FullProductName ProductID="Container suse/sles/15.2/virt-launcher:0.38.1:qemu-vgabios-1.12.1+-11.13.1">qemu-vgabios-1.12.1+-11.13.1 as a component of Container suse/sles/15.2/virt-launcher:0.38.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-x86-4.2.1-11.13.1" RelationType="Default Component Of" RelatesToProductReference="Container suse/sles/15.2/virt-launcher:0.38.1">
      <FullProductName ProductID="Container suse/sles/15.2/virt-launcher:0.38.1:qemu-x86-4.2.1-11.13.1">qemu-x86-4.2.1-11.13.1 as a component of Container suse/sles/15.2/virt-launcher:0.38.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-tools-4.2.1-11.13.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Basesystem 15 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15 SP2:qemu-tools-4.2.1-11.13.1">qemu-tools-4.2.1-11.13.1 as a component of SUSE Linux Enterprise Module for Basesystem 15 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-4.2.1-11.13.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Server Applications 15 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-4.2.1-11.13.1">qemu-4.2.1-11.13.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-arm-4.2.1-11.13.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Server Applications 15 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-arm-4.2.1-11.13.1">qemu-arm-4.2.1-11.13.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-audio-alsa-4.2.1-11.13.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Server Applications 15 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-audio-alsa-4.2.1-11.13.1">qemu-audio-alsa-4.2.1-11.13.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-audio-pa-4.2.1-11.13.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Server Applications 15 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-audio-pa-4.2.1-11.13.1">qemu-audio-pa-4.2.1-11.13.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-curl-4.2.1-11.13.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Server Applications 15 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-block-curl-4.2.1-11.13.1">qemu-block-curl-4.2.1-11.13.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-iscsi-4.2.1-11.13.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Server Applications 15 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-block-iscsi-4.2.1-11.13.1">qemu-block-iscsi-4.2.1-11.13.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-rbd-4.2.1-11.13.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Server Applications 15 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-block-rbd-4.2.1-11.13.1">qemu-block-rbd-4.2.1-11.13.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-ssh-4.2.1-11.13.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Server Applications 15 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-block-ssh-4.2.1-11.13.1">qemu-block-ssh-4.2.1-11.13.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-guest-agent-4.2.1-11.13.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Server Applications 15 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-guest-agent-4.2.1-11.13.1">qemu-guest-agent-4.2.1-11.13.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-ipxe-1.0.0+-11.13.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Server Applications 15 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-ipxe-1.0.0+-11.13.1">qemu-ipxe-1.0.0+-11.13.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-kvm-4.2.1-11.13.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Server Applications 15 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-kvm-4.2.1-11.13.1">qemu-kvm-4.2.1-11.13.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-lang-4.2.1-11.13.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Server Applications 15 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-lang-4.2.1-11.13.1">qemu-lang-4.2.1-11.13.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-microvm-4.2.1-11.13.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Server Applications 15 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-microvm-4.2.1-11.13.1">qemu-microvm-4.2.1-11.13.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-ppc-4.2.1-11.13.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Server Applications 15 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-ppc-4.2.1-11.13.1">qemu-ppc-4.2.1-11.13.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-s390-4.2.1-11.13.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Server Applications 15 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-s390-4.2.1-11.13.1">qemu-s390-4.2.1-11.13.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-seabios-1.12.1+-11.13.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Server Applications 15 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-seabios-1.12.1+-11.13.1">qemu-seabios-1.12.1+-11.13.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-sgabios-8-11.13.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Server Applications 15 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-sgabios-8-11.13.1">qemu-sgabios-8-11.13.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-ui-curses-4.2.1-11.13.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Server Applications 15 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-ui-curses-4.2.1-11.13.1">qemu-ui-curses-4.2.1-11.13.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-ui-gtk-4.2.1-11.13.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Server Applications 15 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-ui-gtk-4.2.1-11.13.1">qemu-ui-gtk-4.2.1-11.13.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-ui-spice-app-4.2.1-11.13.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Server Applications 15 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-ui-spice-app-4.2.1-11.13.1">qemu-ui-spice-app-4.2.1-11.13.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-vgabios-1.12.1+-11.13.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Server Applications 15 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-vgabios-1.12.1+-11.13.1">qemu-vgabios-1.12.1+-11.13.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-x86-4.2.1-11.13.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Server Applications 15 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-x86-4.2.1-11.13.1">qemu-x86-4.2.1-11.13.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP2</FullProductName>
    </Relationship>
  </ProductTree>
  <vuln:Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">iscsi_aio_ioctl_cb in block/iscsi.c in QEMU 4.1.0 has a heap-based buffer over-read that may disclose unrelated information from process memory to an attacker.</Note>
    </Notes>
    <CVE>CVE-2020-11947</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sles/15.2/virt-handler:0.38.1:qemu-tools-4.2.1-11.13.1</ProductID>
        <ProductID>Container suse/sles/15.2/virt-launcher:0.38.1:qemu-4.2.1-11.13.1</ProductID>
        <ProductID>Container suse/sles/15.2/virt-launcher:0.38.1:qemu-ipxe-1.0.0+-11.13.1</ProductID>
        <ProductID>Container suse/sles/15.2/virt-launcher:0.38.1:qemu-seabios-1.12.1+-11.13.1</ProductID>
        <ProductID>Container suse/sles/15.2/virt-launcher:0.38.1:qemu-sgabios-8-11.13.1</ProductID>
        <ProductID>Container suse/sles/15.2/virt-launcher:0.38.1:qemu-tools-4.2.1-11.13.1</ProductID>
        <ProductID>Container suse/sles/15.2/virt-launcher:0.38.1:qemu-vgabios-1.12.1+-11.13.1</ProductID>
        <ProductID>Container suse/sles/15.2/virt-launcher:0.38.1:qemu-x86-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP2:qemu-tools-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-arm-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-audio-alsa-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-audio-pa-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-block-curl-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-block-iscsi-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-block-rbd-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-block-ssh-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-guest-agent-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-ipxe-1.0.0+-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-kvm-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-lang-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-microvm-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-ppc-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-s390-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-seabios-1.12.1+-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-sgabios-8-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-ui-curses-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-ui-gtk-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-ui-spice-app-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-vgabios-1.12.1+-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-x86-4.2.1-11.13.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV2>
        <BaseScoreV2>2.1</BaseScoreV2>
        <VectorV2>AV:L/AC:L/Au:N/C:P/I:N/A:N</VectorV2>
      </ScoreSetV2>
      <ScoreSetV3>
        <BaseScoreV3>5.5</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-20210521-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-11947.html</URL>
        <Description>CVE-2020-11947</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1180523</URL>
        <Description>SUSE Bug 1180523</Description>
      </Reference>
    </References>
  </vuln:Vulnerability>
  <vuln:Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A race condition flaw was found in the 9pfs server implementation of QEMU up to and including 5.2.0. This flaw allows a malicious 9p client to cause a use-after-free error, potentially escalating their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity as well as system availability.</Note>
    </Notes>
    <CVE>CVE-2021-20181</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sles/15.2/virt-handler:0.38.1:qemu-tools-4.2.1-11.13.1</ProductID>
        <ProductID>Container suse/sles/15.2/virt-launcher:0.38.1:qemu-4.2.1-11.13.1</ProductID>
        <ProductID>Container suse/sles/15.2/virt-launcher:0.38.1:qemu-ipxe-1.0.0+-11.13.1</ProductID>
        <ProductID>Container suse/sles/15.2/virt-launcher:0.38.1:qemu-seabios-1.12.1+-11.13.1</ProductID>
        <ProductID>Container suse/sles/15.2/virt-launcher:0.38.1:qemu-sgabios-8-11.13.1</ProductID>
        <ProductID>Container suse/sles/15.2/virt-launcher:0.38.1:qemu-tools-4.2.1-11.13.1</ProductID>
        <ProductID>Container suse/sles/15.2/virt-launcher:0.38.1:qemu-vgabios-1.12.1+-11.13.1</ProductID>
        <ProductID>Container suse/sles/15.2/virt-launcher:0.38.1:qemu-x86-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP2:qemu-tools-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-arm-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-audio-alsa-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-audio-pa-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-block-curl-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-block-iscsi-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-block-rbd-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-block-ssh-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-guest-agent-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-ipxe-1.0.0+-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-kvm-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-lang-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-microvm-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-ppc-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-s390-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-seabios-1.12.1+-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-sgabios-8-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-ui-curses-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-ui-gtk-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-ui-spice-app-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-vgabios-1.12.1+-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-x86-4.2.1-11.13.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV2>
        <BaseScoreV2>6.9</BaseScoreV2>
        <VectorV2>AV:L/AC:M/Au:N/C:C/I:C/A:C</VectorV2>
      </ScoreSetV2>
      <ScoreSetV3>
        <BaseScoreV3>7.5</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-20210521-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-20181.html</URL>
        <Description>CVE-2021-20181</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1182137</URL>
        <Description>SUSE Bug 1182137</Description>
      </Reference>
    </References>
  </vuln:Vulnerability>
  <vuln:Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An integer overflow issue was found in the vmxnet3 NIC emulator of the QEMU for versions up to v5.2.0. It may occur if a guest was to supply invalid values for rx/tx queue size or other NIC parameters. A privileged guest user may use this flaw to crash the QEMU process on the host resulting in DoS scenario.</Note>
    </Notes>
    <CVE>CVE-2021-20203</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sles/15.2/virt-handler:0.38.1:qemu-tools-4.2.1-11.13.1</ProductID>
        <ProductID>Container suse/sles/15.2/virt-launcher:0.38.1:qemu-4.2.1-11.13.1</ProductID>
        <ProductID>Container suse/sles/15.2/virt-launcher:0.38.1:qemu-ipxe-1.0.0+-11.13.1</ProductID>
        <ProductID>Container suse/sles/15.2/virt-launcher:0.38.1:qemu-seabios-1.12.1+-11.13.1</ProductID>
        <ProductID>Container suse/sles/15.2/virt-launcher:0.38.1:qemu-sgabios-8-11.13.1</ProductID>
        <ProductID>Container suse/sles/15.2/virt-launcher:0.38.1:qemu-tools-4.2.1-11.13.1</ProductID>
        <ProductID>Container suse/sles/15.2/virt-launcher:0.38.1:qemu-vgabios-1.12.1+-11.13.1</ProductID>
        <ProductID>Container suse/sles/15.2/virt-launcher:0.38.1:qemu-x86-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP2:qemu-tools-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-arm-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-audio-alsa-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-audio-pa-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-block-curl-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-block-iscsi-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-block-rbd-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-block-ssh-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-guest-agent-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-ipxe-1.0.0+-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-kvm-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-lang-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-microvm-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-ppc-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-s390-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-seabios-1.12.1+-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-sgabios-8-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-ui-curses-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-ui-gtk-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-ui-spice-app-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-vgabios-1.12.1+-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-x86-4.2.1-11.13.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV2>
        <BaseScoreV2>2.1</BaseScoreV2>
        <VectorV2>AV:L/AC:L/Au:N/C:N/I:N/A:P</VectorV2>
      </ScoreSetV2>
      <ScoreSetV3>
        <BaseScoreV3>3.2</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-20210521-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-20203.html</URL>
        <Description>CVE-2021-20203</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1181639</URL>
        <Description>SUSE Bug 1181639</Description>
      </Reference>
    </References>
  </vuln:Vulnerability>
  <vuln:Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An out-of-bounds heap buffer access issue was found in the ARM Generic Interrupt Controller emulator of QEMU up to and including qemu 4.2.0on aarch64 platform. The issue occurs because while writing an interrupt ID to the controller memory area, it is not masked to be 4 bits wide. It may lead to the said issue while updating controller state fields and their subsequent processing. A privileged guest user may use this flaw to crash the QEMU process on the host resulting in DoS scenario.</Note>
    </Notes>
    <CVE>CVE-2021-20221</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sles/15.2/virt-handler:0.38.1:qemu-tools-4.2.1-11.13.1</ProductID>
        <ProductID>Container suse/sles/15.2/virt-launcher:0.38.1:qemu-4.2.1-11.13.1</ProductID>
        <ProductID>Container suse/sles/15.2/virt-launcher:0.38.1:qemu-ipxe-1.0.0+-11.13.1</ProductID>
        <ProductID>Container suse/sles/15.2/virt-launcher:0.38.1:qemu-seabios-1.12.1+-11.13.1</ProductID>
        <ProductID>Container suse/sles/15.2/virt-launcher:0.38.1:qemu-sgabios-8-11.13.1</ProductID>
        <ProductID>Container suse/sles/15.2/virt-launcher:0.38.1:qemu-tools-4.2.1-11.13.1</ProductID>
        <ProductID>Container suse/sles/15.2/virt-launcher:0.38.1:qemu-vgabios-1.12.1+-11.13.1</ProductID>
        <ProductID>Container suse/sles/15.2/virt-launcher:0.38.1:qemu-x86-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP2:qemu-tools-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-arm-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-audio-alsa-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-audio-pa-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-block-curl-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-block-iscsi-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-block-rbd-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-block-ssh-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-guest-agent-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-ipxe-1.0.0+-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-kvm-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-lang-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-microvm-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-ppc-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-s390-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-seabios-1.12.1+-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-sgabios-8-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-ui-curses-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-ui-gtk-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-ui-spice-app-4.2.1-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-vgabios-1.12.1+-11.13.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:qemu-x86-4.2.1-11.13.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV2>
        <BaseScoreV2>2.1</BaseScoreV2>
        <VectorV2>AV:L/AC:L/Au:N/C:N/I:N/A:P</VectorV2>
      </ScoreSetV2>
      <ScoreSetV3>
        <BaseScoreV3>5.3</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-20210521-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-20221.html</URL>
        <Description>CVE-2021-20221</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1181933</URL>
        <Description>SUSE Bug 1181933</Description>
      </Reference>
    </References>
  </vuln:Vulnerability>
</cvrfdoc>
