{"id":"openSUSE-SU-2021:2474-1","summary":"Security update for qemu","details":"This update for qemu fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2021-3595: Fixed slirp: invalid pointer initialization may lead to information disclosure (tftp) (bsc#1187366)\n- CVE-2021-3592: Fix for slirp: invalid pointer initialization may lead to information disclosure (bootp) (bsc#1187364)\n- CVE-2021-3594: Fix for slirp: invalid pointer initialization may lead to information disclosure (udp) (bsc#1187367)\n- CVE-2021-3593: Fix for slirp: invalid pointer initialization may lead to information disclosure (udp6) (bsc#1187365)\n- CVE-2021-3582: Fix possible mremap overflow in the pvrdma (bsc#1187499)\n- CVE-2021-3607: Ensure correct input on ring init (bsc#1187539)\n- CVE-2021-3608: Fix the ring init error flow (bsc#1187538)\n- CVE-2021-3611: Fix intel-hda segmentation fault due to stack overflow (bsc#1187529)\n","modified":"2026-02-04T04:09:20.891392Z","published":"2021-07-27T09:41:19Z","related":["CVE-2021-3582","CVE-2021-3592","CVE-2021-3593","CVE-2021-3594","CVE-2021-3595","CVE-2021-3607","CVE-2021-3608","CVE-2021-3611"],"upstream":["CVE-2021-3582","CVE-2021-3592","CVE-2021-3593","CVE-2021-3594","CVE-2021-3595","CVE-2021-3607","CVE-2021-3608","CVE-2021-3611"],"references":[{"type":"ADVISORY","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LOEJDVTTKRPTW4JLAPXEN46YAGYFJMDT/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1187364"},{"type":"REPORT","url":"https://bugzilla.suse.com/1187365"},{"type":"REPORT","url":"https://bugzilla.suse.com/1187366"},{"type":"REPORT","url":"https://bugzilla.suse.com/1187367"},{"type":"REPORT","url":"https://bugzilla.suse.com/1187499"},{"type":"REPORT","url":"https://bugzilla.suse.com/1187529"},{"type":"REPORT","url":"https://bugzilla.suse.com/1187538"},{"type":"REPORT","url":"https://bugzilla.suse.com/1187539"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-3582"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-3592"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-3593"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-3594"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-3595"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-3607"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-3608"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-3611"}],"affected":[{"package":{"name":"qemu","ecosystem":"openSUSE:Leap 15.3","purl":"pkg:rpm/opensuse/qemu&distro=openSUSE%20Leap%2015.3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.2.1-11.25.2"}]}],"ecosystem_specific":{"binaries":[{"qemu-s390":"4.2.1-11.25.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/openSUSE-SU-2021:2474-1.json"}}],"schema_version":"1.7.3"}