{"affected":[{"ecosystem_specific":{"binaries":[{}]},"package":{"ecosystem":"openSUSE:Leap 15.3","name":"qemu","purl":"pkg:rpm/opensuse/qemu&distro=openSUSE%20Leap%2015.3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.1.1.1-80.40.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for qemu fixes the following issues:\n\nSecurity issues fixed:\n\n- Fix out-of-bounds write in UAS (USB Attached SCSI) device emulation (bsc#1189702, CVE-2021-3713)\n- Fix heap use-after-free in virtio_net_receive_rcu (bsc#1189938, CVE-2021-3748)\n- usbredir: free call on invalid pointer in bufp_alloc (bsc#1189145, CVE-2021-3682)\n- NULL pointer dereference in ESP (bsc#1180433, CVE-2020-35504) (bsc#1180434, CVE-2020-35505) (bsc#1180435, CVE-2020-35506)\n- NULL pointer dereference issue in megasas-gen2 host bus adapter (bsc#1180432, CVE-2020-35503)\n- eepro100: stack overflow via infinite recursion (bsc#1182651, CVE-2021-20255)\n- usb: unbounded stack allocation in usbredir (bsc#1186012, CVE-2021-3527)\n\nNon-security issues fixed:\n\n- Use max host physical address if -cpu max is used (bsc#1188299)\n","id":"openSUSE-SU-2021:3614-1","modified":"2021-11-04T11:27:20Z","published":"2021-11-04T11:27:20Z","references":[{"type":"ADVISORY","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/26KPX43RJBRTCX3JER7CN7MAT4QEGAED/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1180432"},{"type":"REPORT","url":"https://bugzilla.suse.com/1180433"},{"type":"REPORT","url":"https://bugzilla.suse.com/1180434"},{"type":"REPORT","url":"https://bugzilla.suse.com/1180435"},{"type":"REPORT","url":"https://bugzilla.suse.com/1182651"},{"type":"REPORT","url":"https://bugzilla.suse.com/1186012"},{"type":"REPORT","url":"https://bugzilla.suse.com/1189145"},{"type":"REPORT","url":"https://bugzilla.suse.com/1189702"},{"type":"REPORT","url":"https://bugzilla.suse.com/1189938"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-35503"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-35504"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-35505"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-35506"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-20255"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-3527"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-3682"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-3713"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-3748"}],"related":["CVE-2020-35503","CVE-2020-35504","CVE-2020-35505","CVE-2020-35506","CVE-2021-20255","CVE-2021-3527","CVE-2021-3682","CVE-2021-3713","CVE-2021-3748"],"summary":"Security update for qemu","upstream":["CVE-2020-35503","CVE-2020-35504","CVE-2020-35505","CVE-2020-35506","CVE-2021-20255","CVE-2021-3527","CVE-2021-3682","CVE-2021-3713","CVE-2021-3748"]}