<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for qemu</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2021:1043-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2021-07-13T22:06:05Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2021-07-13T22:06:05Z</InitialReleaseDate>
    <CurrentReleaseDate>2021-07-13T22:06:05Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for qemu</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for qemu fixes the following issues:

Security issues fixed:

- CVE-2021-3546: Fix out-of-bounds write in virgl_cmd_get_capset (bsc#1185981)
- CVE-2021-3544: Fix memory leaks found in the virtio vhost-user GPU device (bsc#1186010)
- CVE-2021-3545: Fix information disclosure due to uninitialized memory read (bsc#1185990)
- CVE-2020-25085: Fix out-of-bounds access issue while doing multi block SDMA (bsc#1176681)
- CVE-2020-10756: Fix out-of-bounds read information disclosure in icmp6_send_echoreply(bsc#1172380)
- For the record, these issues are fixed in this package already.
  Most are alternate references to previously mentioned issues:
  (CVE-2019-15890, bsc#1149813, CVE-2020-8608, bsc#1163019,
  CVE-2020-14364, bsc#1175534, CVE-2020-25707, bsc#1178683,
  CVE-2020-25723, bsc#1178935, CVE-2020-29130, bsc#1179477,
  CVE-2020-29129, bsc#1179484, CVE-2021-20257, bsc#1182846,
  CVE-2021-3419, bsc#1182975)

Non-security issues fixed:

- Fix issue where s390 guest fails to find zipl boot menu index (bsc#1183979)
- QEMU BIOS fails to read stage2 loader on s390x (bsc#1186290)
- Host CPU microcode revision will be visible inside VMs when the proper CPU-model is used (jsc#SLE-17785):
- Fix testsuite error (bsc#1184574)
- Fix qemu crash with iothread when block commit after snapshot (bsc#1187013)
- Fix qemu hang while cancelling migrating hugepage vm (bsc#1185591)
- Use RCU to avoid race during scsi hotplug/hotunplug (bsc#1184574)

This update was imported from the SUSE:SLE-15-SP2:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2021-1043</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVDDMT7IUGYOEFTYO3UWD73PJMJL4FSY/</URL>
      <Description>E-Mail link for openSUSE-SU-2021:1043-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1149813</URL>
      <Description>SUSE Bug 1149813</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1163019</URL>
      <Description>SUSE Bug 1163019</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172380</URL>
      <Description>SUSE Bug 1172380</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175534</URL>
      <Description>SUSE Bug 1175534</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176681</URL>
      <Description>SUSE Bug 1176681</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178683</URL>
      <Description>SUSE Bug 1178683</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178935</URL>
      <Description>SUSE Bug 1178935</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179477</URL>
      <Description>SUSE Bug 1179477</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179484</URL>
      <Description>SUSE Bug 1179484</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1182846</URL>
      <Description>SUSE Bug 1182846</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1182975</URL>
      <Description>SUSE Bug 1182975</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1183979</URL>
      <Description>SUSE Bug 1183979</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1184574</URL>
      <Description>SUSE Bug 1184574</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1185591</URL>
      <Description>SUSE Bug 1185591</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1185981</URL>
      <Description>SUSE Bug 1185981</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1185990</URL>
      <Description>SUSE Bug 1185990</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1186010</URL>
      <Description>SUSE Bug 1186010</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1186290</URL>
      <Description>SUSE Bug 1186290</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1187013</URL>
      <Description>SUSE Bug 1187013</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-15890/</URL>
      <Description>SUSE CVE CVE-2019-15890 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-10756/</URL>
      <Description>SUSE CVE CVE-2020-10756 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-14364/</URL>
      <Description>SUSE CVE CVE-2020-14364 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-25085/</URL>
      <Description>SUSE CVE CVE-2020-25085 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-25707/</URL>
      <Description>SUSE CVE CVE-2020-25707 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-25723/</URL>
      <Description>SUSE CVE CVE-2020-25723 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-29129/</URL>
      <Description>SUSE CVE CVE-2020-29129 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-29130/</URL>
      <Description>SUSE CVE CVE-2020-29130 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-8608/</URL>
      <Description>SUSE CVE CVE-2020-8608 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-20257/</URL>
      <Description>SUSE CVE CVE-2021-20257 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-3419/</URL>
      <Description>SUSE CVE CVE-2021-3419 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-3544/</URL>
      <Description>SUSE CVE CVE-2021-3544 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-3545/</URL>
      <Description>SUSE CVE CVE-2021-3545 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-3546/</URL>
      <Description>SUSE CVE CVE-2021-3546 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.2">
      <Branch Type="Product Name" Name="openSUSE Leap 15.2">
        <FullProductName ProductID="openSUSE Leap 15.2" CPE="cpe:/o:opensuse:leap:15.2">openSUSE Leap 15.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="qemu-4.2.1-lp152.9.16.2">
      <FullProductName ProductID="qemu-4.2.1-lp152.9.16.2">qemu-4.2.1-lp152.9.16.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-arm-4.2.1-lp152.9.16.2">
      <FullProductName ProductID="qemu-arm-4.2.1-lp152.9.16.2">qemu-arm-4.2.1-lp152.9.16.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-audio-alsa-4.2.1-lp152.9.16.2">
      <FullProductName ProductID="qemu-audio-alsa-4.2.1-lp152.9.16.2">qemu-audio-alsa-4.2.1-lp152.9.16.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-audio-pa-4.2.1-lp152.9.16.2">
      <FullProductName ProductID="qemu-audio-pa-4.2.1-lp152.9.16.2">qemu-audio-pa-4.2.1-lp152.9.16.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-audio-sdl-4.2.1-lp152.9.16.2">
      <FullProductName ProductID="qemu-audio-sdl-4.2.1-lp152.9.16.2">qemu-audio-sdl-4.2.1-lp152.9.16.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-curl-4.2.1-lp152.9.16.2">
      <FullProductName ProductID="qemu-block-curl-4.2.1-lp152.9.16.2">qemu-block-curl-4.2.1-lp152.9.16.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-dmg-4.2.1-lp152.9.16.2">
      <FullProductName ProductID="qemu-block-dmg-4.2.1-lp152.9.16.2">qemu-block-dmg-4.2.1-lp152.9.16.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-gluster-4.2.1-lp152.9.16.2">
      <FullProductName ProductID="qemu-block-gluster-4.2.1-lp152.9.16.2">qemu-block-gluster-4.2.1-lp152.9.16.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-iscsi-4.2.1-lp152.9.16.2">
      <FullProductName ProductID="qemu-block-iscsi-4.2.1-lp152.9.16.2">qemu-block-iscsi-4.2.1-lp152.9.16.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-nfs-4.2.1-lp152.9.16.2">
      <FullProductName ProductID="qemu-block-nfs-4.2.1-lp152.9.16.2">qemu-block-nfs-4.2.1-lp152.9.16.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-rbd-4.2.1-lp152.9.16.2">
      <FullProductName ProductID="qemu-block-rbd-4.2.1-lp152.9.16.2">qemu-block-rbd-4.2.1-lp152.9.16.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-ssh-4.2.1-lp152.9.16.2">
      <FullProductName ProductID="qemu-block-ssh-4.2.1-lp152.9.16.2">qemu-block-ssh-4.2.1-lp152.9.16.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-extra-4.2.1-lp152.9.16.2">
      <FullProductName ProductID="qemu-extra-4.2.1-lp152.9.16.2">qemu-extra-4.2.1-lp152.9.16.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-guest-agent-4.2.1-lp152.9.16.2">
      <FullProductName ProductID="qemu-guest-agent-4.2.1-lp152.9.16.2">qemu-guest-agent-4.2.1-lp152.9.16.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-ipxe-1.0.0+-lp152.9.16.2">
      <FullProductName ProductID="qemu-ipxe-1.0.0+-lp152.9.16.2">qemu-ipxe-1.0.0+-lp152.9.16.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-ksm-4.2.1-lp152.9.16.2">
      <FullProductName ProductID="qemu-ksm-4.2.1-lp152.9.16.2">qemu-ksm-4.2.1-lp152.9.16.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-kvm-4.2.1-lp152.9.16.2">
      <FullProductName ProductID="qemu-kvm-4.2.1-lp152.9.16.2">qemu-kvm-4.2.1-lp152.9.16.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-lang-4.2.1-lp152.9.16.2">
      <FullProductName ProductID="qemu-lang-4.2.1-lp152.9.16.2">qemu-lang-4.2.1-lp152.9.16.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-linux-user-4.2.1-lp152.9.16.1">
      <FullProductName ProductID="qemu-linux-user-4.2.1-lp152.9.16.1">qemu-linux-user-4.2.1-lp152.9.16.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-microvm-4.2.1-lp152.9.16.2">
      <FullProductName ProductID="qemu-microvm-4.2.1-lp152.9.16.2">qemu-microvm-4.2.1-lp152.9.16.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-ppc-4.2.1-lp152.9.16.2">
      <FullProductName ProductID="qemu-ppc-4.2.1-lp152.9.16.2">qemu-ppc-4.2.1-lp152.9.16.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-s390-4.2.1-lp152.9.16.2">
      <FullProductName ProductID="qemu-s390-4.2.1-lp152.9.16.2">qemu-s390-4.2.1-lp152.9.16.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-seabios-1.12.1+-lp152.9.16.2">
      <FullProductName ProductID="qemu-seabios-1.12.1+-lp152.9.16.2">qemu-seabios-1.12.1+-lp152.9.16.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-sgabios-8-lp152.9.16.2">
      <FullProductName ProductID="qemu-sgabios-8-lp152.9.16.2">qemu-sgabios-8-lp152.9.16.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-testsuite-4.2.1-lp152.9.16.7">
      <FullProductName ProductID="qemu-testsuite-4.2.1-lp152.9.16.7">qemu-testsuite-4.2.1-lp152.9.16.7</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-tools-4.2.1-lp152.9.16.2">
      <FullProductName ProductID="qemu-tools-4.2.1-lp152.9.16.2">qemu-tools-4.2.1-lp152.9.16.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-ui-curses-4.2.1-lp152.9.16.2">
      <FullProductName ProductID="qemu-ui-curses-4.2.1-lp152.9.16.2">qemu-ui-curses-4.2.1-lp152.9.16.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-ui-gtk-4.2.1-lp152.9.16.2">
      <FullProductName ProductID="qemu-ui-gtk-4.2.1-lp152.9.16.2">qemu-ui-gtk-4.2.1-lp152.9.16.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-ui-sdl-4.2.1-lp152.9.16.2">
      <FullProductName ProductID="qemu-ui-sdl-4.2.1-lp152.9.16.2">qemu-ui-sdl-4.2.1-lp152.9.16.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-ui-spice-app-4.2.1-lp152.9.16.2">
      <FullProductName ProductID="qemu-ui-spice-app-4.2.1-lp152.9.16.2">qemu-ui-spice-app-4.2.1-lp152.9.16.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-vgabios-1.12.1+-lp152.9.16.2">
      <FullProductName ProductID="qemu-vgabios-1.12.1+-lp152.9.16.2">qemu-vgabios-1.12.1+-lp152.9.16.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-vhost-user-gpu-4.2.1-lp152.9.16.2">
      <FullProductName ProductID="qemu-vhost-user-gpu-4.2.1-lp152.9.16.2">qemu-vhost-user-gpu-4.2.1-lp152.9.16.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-x86-4.2.1-lp152.9.16.2">
      <FullProductName ProductID="qemu-x86-4.2.1-lp152.9.16.2">qemu-x86-4.2.1-lp152.9.16.2</FullProductName>
    </Branch>
    <Relationship ProductReference="qemu-4.2.1-lp152.9.16.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:qemu-4.2.1-lp152.9.16.2">qemu-4.2.1-lp152.9.16.2 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-arm-4.2.1-lp152.9.16.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:qemu-arm-4.2.1-lp152.9.16.2">qemu-arm-4.2.1-lp152.9.16.2 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-audio-alsa-4.2.1-lp152.9.16.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:qemu-audio-alsa-4.2.1-lp152.9.16.2">qemu-audio-alsa-4.2.1-lp152.9.16.2 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-audio-pa-4.2.1-lp152.9.16.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:qemu-audio-pa-4.2.1-lp152.9.16.2">qemu-audio-pa-4.2.1-lp152.9.16.2 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-audio-sdl-4.2.1-lp152.9.16.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:qemu-audio-sdl-4.2.1-lp152.9.16.2">qemu-audio-sdl-4.2.1-lp152.9.16.2 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-curl-4.2.1-lp152.9.16.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:qemu-block-curl-4.2.1-lp152.9.16.2">qemu-block-curl-4.2.1-lp152.9.16.2 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-dmg-4.2.1-lp152.9.16.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:qemu-block-dmg-4.2.1-lp152.9.16.2">qemu-block-dmg-4.2.1-lp152.9.16.2 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-gluster-4.2.1-lp152.9.16.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:qemu-block-gluster-4.2.1-lp152.9.16.2">qemu-block-gluster-4.2.1-lp152.9.16.2 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-iscsi-4.2.1-lp152.9.16.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:qemu-block-iscsi-4.2.1-lp152.9.16.2">qemu-block-iscsi-4.2.1-lp152.9.16.2 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-nfs-4.2.1-lp152.9.16.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:qemu-block-nfs-4.2.1-lp152.9.16.2">qemu-block-nfs-4.2.1-lp152.9.16.2 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-rbd-4.2.1-lp152.9.16.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:qemu-block-rbd-4.2.1-lp152.9.16.2">qemu-block-rbd-4.2.1-lp152.9.16.2 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-ssh-4.2.1-lp152.9.16.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:qemu-block-ssh-4.2.1-lp152.9.16.2">qemu-block-ssh-4.2.1-lp152.9.16.2 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-extra-4.2.1-lp152.9.16.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:qemu-extra-4.2.1-lp152.9.16.2">qemu-extra-4.2.1-lp152.9.16.2 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-guest-agent-4.2.1-lp152.9.16.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:qemu-guest-agent-4.2.1-lp152.9.16.2">qemu-guest-agent-4.2.1-lp152.9.16.2 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-ipxe-1.0.0+-lp152.9.16.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:qemu-ipxe-1.0.0+-lp152.9.16.2">qemu-ipxe-1.0.0+-lp152.9.16.2 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-ksm-4.2.1-lp152.9.16.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:qemu-ksm-4.2.1-lp152.9.16.2">qemu-ksm-4.2.1-lp152.9.16.2 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-kvm-4.2.1-lp152.9.16.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:qemu-kvm-4.2.1-lp152.9.16.2">qemu-kvm-4.2.1-lp152.9.16.2 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-lang-4.2.1-lp152.9.16.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:qemu-lang-4.2.1-lp152.9.16.2">qemu-lang-4.2.1-lp152.9.16.2 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-linux-user-4.2.1-lp152.9.16.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:qemu-linux-user-4.2.1-lp152.9.16.1">qemu-linux-user-4.2.1-lp152.9.16.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-microvm-4.2.1-lp152.9.16.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:qemu-microvm-4.2.1-lp152.9.16.2">qemu-microvm-4.2.1-lp152.9.16.2 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-ppc-4.2.1-lp152.9.16.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:qemu-ppc-4.2.1-lp152.9.16.2">qemu-ppc-4.2.1-lp152.9.16.2 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-s390-4.2.1-lp152.9.16.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:qemu-s390-4.2.1-lp152.9.16.2">qemu-s390-4.2.1-lp152.9.16.2 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-seabios-1.12.1+-lp152.9.16.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:qemu-seabios-1.12.1+-lp152.9.16.2">qemu-seabios-1.12.1+-lp152.9.16.2 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-sgabios-8-lp152.9.16.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:qemu-sgabios-8-lp152.9.16.2">qemu-sgabios-8-lp152.9.16.2 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-testsuite-4.2.1-lp152.9.16.7" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:qemu-testsuite-4.2.1-lp152.9.16.7">qemu-testsuite-4.2.1-lp152.9.16.7 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-tools-4.2.1-lp152.9.16.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:qemu-tools-4.2.1-lp152.9.16.2">qemu-tools-4.2.1-lp152.9.16.2 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-ui-curses-4.2.1-lp152.9.16.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:qemu-ui-curses-4.2.1-lp152.9.16.2">qemu-ui-curses-4.2.1-lp152.9.16.2 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-ui-gtk-4.2.1-lp152.9.16.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:qemu-ui-gtk-4.2.1-lp152.9.16.2">qemu-ui-gtk-4.2.1-lp152.9.16.2 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-ui-sdl-4.2.1-lp152.9.16.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:qemu-ui-sdl-4.2.1-lp152.9.16.2">qemu-ui-sdl-4.2.1-lp152.9.16.2 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-ui-spice-app-4.2.1-lp152.9.16.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:qemu-ui-spice-app-4.2.1-lp152.9.16.2">qemu-ui-spice-app-4.2.1-lp152.9.16.2 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-vgabios-1.12.1+-lp152.9.16.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:qemu-vgabios-1.12.1+-lp152.9.16.2">qemu-vgabios-1.12.1+-lp152.9.16.2 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-vhost-user-gpu-4.2.1-lp152.9.16.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:qemu-vhost-user-gpu-4.2.1-lp152.9.16.2">qemu-vhost-user-gpu-4.2.1-lp152.9.16.2 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-x86-4.2.1-lp152.9.16.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:qemu-x86-4.2.1-lp152.9.16.2">qemu-x86-4.2.1-lp152.9.16.2 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libslirp 4.0.0, as used in QEMU 4.1.0, has a use-after-free in ip_reass in ip_input.c.</Note>
    </Notes>
    <CVE>CVE-2019-15890</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:qemu-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-arm-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-audio-alsa-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-audio-pa-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-audio-sdl-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-curl-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-dmg-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-gluster-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-iscsi-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-nfs-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-rbd-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-ssh-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-extra-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-guest-agent-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ipxe-1.0.0+-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ksm-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-kvm-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-lang-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-linux-user-4.2.1-lp152.9.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-microvm-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ppc-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-s390-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-seabios-1.12.1+-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-sgabios-8-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-testsuite-4.2.1-lp152.9.16.7</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-tools-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ui-curses-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ui-gtk-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ui-sdl-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ui-spice-app-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-vgabios-1.12.1+-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-vhost-user-gpu-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-x86-4.2.1-lp152.9.16.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVDDMT7IUGYOEFTYO3UWD73PJMJL4FSY/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-15890.html</URL>
        <Description>CVE-2019-15890</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1149811</URL>
        <Description>SUSE Bug 1149811</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1149813</URL>
        <Description>SUSE Bug 1149813</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An out-of-bounds read vulnerability was found in the SLiRP networking implementation of the QEMU emulator. This flaw occurs in the icmp6_send_echoreply() routine while replying to an ICMP echo request, also known as ping. This flaw allows a malicious guest to leak the contents of the host memory, resulting in possible information disclosure. This flaw affects versions of libslirp before 4.3.1.</Note>
    </Notes>
    <CVE>CVE-2020-10756</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:qemu-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-arm-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-audio-alsa-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-audio-pa-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-audio-sdl-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-curl-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-dmg-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-gluster-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-iscsi-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-nfs-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-rbd-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-ssh-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-extra-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-guest-agent-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ipxe-1.0.0+-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ksm-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-kvm-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-lang-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-linux-user-4.2.1-lp152.9.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-microvm-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ppc-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-s390-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-seabios-1.12.1+-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-sgabios-8-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-testsuite-4.2.1-lp152.9.16.7</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-tools-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ui-curses-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ui-gtk-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ui-sdl-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ui-spice-app-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-vgabios-1.12.1+-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-vhost-user-gpu-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-x86-4.2.1-lp152.9.16.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVDDMT7IUGYOEFTYO3UWD73PJMJL4FSY/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-10756.html</URL>
        <Description>CVE-2020-10756</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172380</URL>
        <Description>SUSE Bug 1172380</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184743</URL>
        <Description>SUSE Bug 1184743</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An out-of-bounds read/write access flaw was found in the USB emulator of the QEMU in versions before 5.2.0. This issue occurs while processing USB packets from a guest when USBDevice 'setup_len' exceeds its 'data_buf[4096]' in the do_token_in, do_token_out routines. This flaw allows a guest user to crash the QEMU process, resulting in a denial of service, or the potential execution of arbitrary code with the privileges of the QEMU process on the host.</Note>
    </Notes>
    <CVE>CVE-2020-14364</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:qemu-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-arm-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-audio-alsa-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-audio-pa-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-audio-sdl-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-curl-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-dmg-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-gluster-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-iscsi-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-nfs-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-rbd-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-ssh-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-extra-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-guest-agent-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ipxe-1.0.0+-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ksm-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-kvm-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-lang-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-linux-user-4.2.1-lp152.9.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-microvm-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ppc-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-s390-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-seabios-1.12.1+-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-sgabios-8-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-testsuite-4.2.1-lp152.9.16.7</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-tools-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ui-curses-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ui-gtk-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ui-sdl-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ui-spice-app-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-vgabios-1.12.1+-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-vhost-user-gpu-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-x86-4.2.1-lp152.9.16.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVDDMT7IUGYOEFTYO3UWD73PJMJL4FSY/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-14364.html</URL>
        <Description>CVE-2020-14364</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1175441</URL>
        <Description>SUSE Bug 1175441</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1175534</URL>
        <Description>SUSE Bug 1175534</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1176494</URL>
        <Description>SUSE Bug 1176494</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1177130</URL>
        <Description>SUSE Bug 1177130</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">QEMU 5.0.0 has a heap-based Buffer Overflow in flatview_read_continue in exec.c because hw/sd/sdhci.c mishandles a write operation in the SDHC_BLKSIZE case.</Note>
    </Notes>
    <CVE>CVE-2020-25085</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:qemu-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-arm-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-audio-alsa-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-audio-pa-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-audio-sdl-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-curl-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-dmg-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-gluster-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-iscsi-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-nfs-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-rbd-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-ssh-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-extra-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-guest-agent-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ipxe-1.0.0+-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ksm-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-kvm-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-lang-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-linux-user-4.2.1-lp152.9.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-microvm-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ppc-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-s390-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-seabios-1.12.1+-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-sgabios-8-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-testsuite-4.2.1-lp152.9.16.7</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-tools-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ui-curses-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ui-gtk-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ui-sdl-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ui-spice-app-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-vgabios-1.12.1+-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-vhost-user-gpu-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-x86-4.2.1-lp152.9.16.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVDDMT7IUGYOEFTYO3UWD73PJMJL4FSY/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-25085.html</URL>
        <Description>CVE-2020-25085</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1176681</URL>
        <Description>SUSE Bug 1176681</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1182282</URL>
        <Description>SUSE Bug 1182282</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate is a duplicate of CVE-2020-28916</Note>
    </Notes>
    <CVE>CVE-2020-25707</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:qemu-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-arm-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-audio-alsa-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-audio-pa-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-audio-sdl-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-curl-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-dmg-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-gluster-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-iscsi-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-nfs-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-rbd-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-ssh-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-extra-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-guest-agent-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ipxe-1.0.0+-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ksm-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-kvm-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-lang-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-linux-user-4.2.1-lp152.9.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-microvm-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ppc-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-s390-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-seabios-1.12.1+-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-sgabios-8-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-testsuite-4.2.1-lp152.9.16.7</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-tools-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ui-curses-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ui-gtk-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ui-sdl-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ui-spice-app-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-vgabios-1.12.1+-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-vhost-user-gpu-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-x86-4.2.1-lp152.9.16.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVDDMT7IUGYOEFTYO3UWD73PJMJL4FSY/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-25707.html</URL>
        <Description>CVE-2020-25707</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178683</URL>
        <Description>SUSE Bug 1178683</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179468</URL>
        <Description>SUSE Bug 1179468</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A reachable assertion issue was found in the USB EHCI emulation code of QEMU. It could occur while processing USB requests due to missing handling of DMA memory map failure. A malicious privileged user within the guest may abuse this flaw to send bogus USB requests and crash the QEMU process on the host, resulting in a denial of service.</Note>
    </Notes>
    <CVE>CVE-2020-25723</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:qemu-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-arm-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-audio-alsa-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-audio-pa-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-audio-sdl-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-curl-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-dmg-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-gluster-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-iscsi-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-nfs-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-rbd-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-ssh-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-extra-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-guest-agent-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ipxe-1.0.0+-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ksm-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-kvm-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-lang-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-linux-user-4.2.1-lp152.9.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-microvm-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ppc-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-s390-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-seabios-1.12.1+-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-sgabios-8-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-testsuite-4.2.1-lp152.9.16.7</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-tools-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ui-curses-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ui-gtk-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ui-sdl-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ui-spice-app-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-vgabios-1.12.1+-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-vhost-user-gpu-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-x86-4.2.1-lp152.9.16.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVDDMT7IUGYOEFTYO3UWD73PJMJL4FSY/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-25723.html</URL>
        <Description>CVE-2020-25723</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178934</URL>
        <Description>SUSE Bug 1178934</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178935</URL>
        <Description>SUSE Bug 1178935</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ncsi.c in libslirp through 4.3.1 has a buffer over-read because it tries to read a certain amount of header data even if that exceeds the total packet length.</Note>
    </Notes>
    <CVE>CVE-2020-29129</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:qemu-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-arm-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-audio-alsa-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-audio-pa-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-audio-sdl-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-curl-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-dmg-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-gluster-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-iscsi-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-nfs-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-rbd-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-ssh-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-extra-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-guest-agent-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ipxe-1.0.0+-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ksm-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-kvm-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-lang-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-linux-user-4.2.1-lp152.9.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-microvm-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ppc-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-s390-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-seabios-1.12.1+-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-sgabios-8-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-testsuite-4.2.1-lp152.9.16.7</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-tools-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ui-curses-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ui-gtk-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ui-sdl-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ui-spice-app-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-vgabios-1.12.1+-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-vhost-user-gpu-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-x86-4.2.1-lp152.9.16.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVDDMT7IUGYOEFTYO3UWD73PJMJL4FSY/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-29129.html</URL>
        <Description>CVE-2020-29129</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179466</URL>
        <Description>SUSE Bug 1179466</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179467</URL>
        <Description>SUSE Bug 1179467</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179477</URL>
        <Description>SUSE Bug 1179477</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179484</URL>
        <Description>SUSE Bug 1179484</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">slirp.c in libslirp through 4.3.1 has a buffer over-read because it tries to read a certain amount of header data even if that exceeds the total packet length.</Note>
    </Notes>
    <CVE>CVE-2020-29130</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:qemu-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-arm-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-audio-alsa-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-audio-pa-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-audio-sdl-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-curl-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-dmg-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-gluster-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-iscsi-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-nfs-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-rbd-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-ssh-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-extra-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-guest-agent-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ipxe-1.0.0+-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ksm-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-kvm-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-lang-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-linux-user-4.2.1-lp152.9.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-microvm-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ppc-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-s390-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-seabios-1.12.1+-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-sgabios-8-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-testsuite-4.2.1-lp152.9.16.7</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-tools-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ui-curses-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ui-gtk-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ui-sdl-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ui-spice-app-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-vgabios-1.12.1+-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-vhost-user-gpu-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-x86-4.2.1-lp152.9.16.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVDDMT7IUGYOEFTYO3UWD73PJMJL4FSY/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-29130.html</URL>
        <Description>CVE-2020-29130</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179467</URL>
        <Description>SUSE Bug 1179467</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179477</URL>
        <Description>SUSE Bug 1179477</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In libslirp 4.1.0, as used in QEMU 4.2.0, tcp_subr.c misuses snprintf return values, leading to a buffer overflow in later code.</Note>
    </Notes>
    <CVE>CVE-2020-8608</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:qemu-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-arm-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-audio-alsa-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-audio-pa-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-audio-sdl-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-curl-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-dmg-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-gluster-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-iscsi-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-nfs-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-rbd-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-ssh-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-extra-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-guest-agent-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ipxe-1.0.0+-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ksm-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-kvm-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-lang-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-linux-user-4.2.1-lp152.9.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-microvm-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ppc-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-s390-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-seabios-1.12.1+-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-sgabios-8-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-testsuite-4.2.1-lp152.9.16.7</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-tools-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ui-curses-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ui-gtk-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ui-sdl-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ui-spice-app-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-vgabios-1.12.1+-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-vhost-user-gpu-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-x86-4.2.1-lp152.9.16.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVDDMT7IUGYOEFTYO3UWD73PJMJL4FSY/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-8608.html</URL>
        <Description>CVE-2020-8608</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1163018</URL>
        <Description>SUSE Bug 1163018</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1163019</URL>
        <Description>SUSE Bug 1163019</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An infinite loop flaw was found in the e1000 NIC emulator of the QEMU. This issue occurs while processing transmits (tx) descriptors in process_tx_desc if various descriptor fields are initialized with invalid values. This flaw allows a guest to consume CPU cycles on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.</Note>
    </Notes>
    <CVE>CVE-2021-20257</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:qemu-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-arm-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-audio-alsa-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-audio-pa-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-audio-sdl-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-curl-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-dmg-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-gluster-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-iscsi-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-nfs-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-rbd-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-ssh-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-extra-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-guest-agent-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ipxe-1.0.0+-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ksm-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-kvm-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-lang-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-linux-user-4.2.1-lp152.9.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-microvm-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ppc-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-s390-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-seabios-1.12.1+-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-sgabios-8-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-testsuite-4.2.1-lp152.9.16.7</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-tools-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ui-curses-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ui-gtk-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ui-sdl-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ui-spice-app-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-vgabios-1.12.1+-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-vhost-user-gpu-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-x86-4.2.1-lp152.9.16.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVDDMT7IUGYOEFTYO3UWD73PJMJL4FSY/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-20257.html</URL>
        <Description>CVE-2021-20257</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1182577</URL>
        <Description>SUSE Bug 1182577</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1182846</URL>
        <Description>SUSE Bug 1182846</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.</Note>
    </Notes>
    <CVE>CVE-2021-3419</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:qemu-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-arm-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-audio-alsa-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-audio-pa-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-audio-sdl-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-curl-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-dmg-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-gluster-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-iscsi-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-nfs-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-rbd-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-ssh-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-extra-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-guest-agent-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ipxe-1.0.0+-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ksm-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-kvm-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-lang-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-linux-user-4.2.1-lp152.9.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-microvm-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ppc-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-s390-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-seabios-1.12.1+-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-sgabios-8-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-testsuite-4.2.1-lp152.9.16.7</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-tools-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ui-curses-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ui-gtk-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ui-sdl-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ui-spice-app-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-vgabios-1.12.1+-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-vhost-user-gpu-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-x86-4.2.1-lp152.9.16.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVDDMT7IUGYOEFTYO3UWD73PJMJL4FSY/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-3419.html</URL>
        <Description>CVE-2021-3419</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1182968</URL>
        <Description>SUSE Bug 1182968</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1182975</URL>
        <Description>SUSE Bug 1182975</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Several memory leaks were found in the virtio vhost-user GPU device (vhost-user-gpu) of QEMU in versions up to and including 6.0. They exist in contrib/vhost-user-gpu/vhost-user-gpu.c and contrib/vhost-user-gpu/virgl.c due to improper release of memory (i.e., free) after effective lifetime.</Note>
    </Notes>
    <CVE>CVE-2021-3544</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:qemu-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-arm-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-audio-alsa-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-audio-pa-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-audio-sdl-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-curl-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-dmg-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-gluster-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-iscsi-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-nfs-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-rbd-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-ssh-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-extra-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-guest-agent-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ipxe-1.0.0+-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ksm-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-kvm-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-lang-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-linux-user-4.2.1-lp152.9.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-microvm-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ppc-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-s390-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-seabios-1.12.1+-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-sgabios-8-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-testsuite-4.2.1-lp152.9.16.7</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-tools-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ui-curses-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ui-gtk-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ui-sdl-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ui-spice-app-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-vgabios-1.12.1+-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-vhost-user-gpu-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-x86-4.2.1-lp152.9.16.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVDDMT7IUGYOEFTYO3UWD73PJMJL4FSY/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-3544.html</URL>
        <Description>CVE-2021-3544</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1186010</URL>
        <Description>SUSE Bug 1186010</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An information disclosure vulnerability was found in the virtio vhost-user GPU device (vhost-user-gpu) of QEMU in versions up to and including 6.0. The flaw exists in virgl_cmd_get_capset_info() in contrib/vhost-user-gpu/virgl.c and could occur due to the read of uninitialized memory. A malicious guest could exploit this issue to leak memory from the host.</Note>
    </Notes>
    <CVE>CVE-2021-3545</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:qemu-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-arm-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-audio-alsa-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-audio-pa-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-audio-sdl-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-curl-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-dmg-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-gluster-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-iscsi-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-nfs-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-rbd-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-ssh-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-extra-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-guest-agent-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ipxe-1.0.0+-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ksm-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-kvm-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-lang-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-linux-user-4.2.1-lp152.9.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-microvm-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ppc-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-s390-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-seabios-1.12.1+-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-sgabios-8-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-testsuite-4.2.1-lp152.9.16.7</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-tools-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ui-curses-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ui-gtk-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ui-sdl-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ui-spice-app-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-vgabios-1.12.1+-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-vhost-user-gpu-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-x86-4.2.1-lp152.9.16.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVDDMT7IUGYOEFTYO3UWD73PJMJL4FSY/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-3545.html</URL>
        <Description>CVE-2021-3545</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1185990</URL>
        <Description>SUSE Bug 1185990</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An out-of-bounds write vulnerability was found in the virtio vhost-user GPU device (vhost-user-gpu) of QEMU in versions up to and including 6.0. The flaw occurs while processing the 'VIRTIO_GPU_CMD_GET_CAPSET' command from the guest. It could allow a privileged guest user to crash the QEMU process on the host, resulting in a denial of service condition, or potential code execution with the privileges of the QEMU process.</Note>
    </Notes>
    <CVE>CVE-2021-3546</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:qemu-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-arm-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-audio-alsa-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-audio-pa-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-audio-sdl-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-curl-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-dmg-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-gluster-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-iscsi-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-nfs-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-rbd-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-block-ssh-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-extra-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-guest-agent-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ipxe-1.0.0+-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ksm-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-kvm-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-lang-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-linux-user-4.2.1-lp152.9.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-microvm-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ppc-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-s390-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-seabios-1.12.1+-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-sgabios-8-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-testsuite-4.2.1-lp152.9.16.7</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-tools-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ui-curses-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ui-gtk-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ui-sdl-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-ui-spice-app-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-vgabios-1.12.1+-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-vhost-user-gpu-4.2.1-lp152.9.16.2</ProductID>
        <ProductID>openSUSE Leap 15.2:qemu-x86-4.2.1-lp152.9.16.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVDDMT7IUGYOEFTYO3UWD73PJMJL4FSY/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-3546.html</URL>
        <Description>CVE-2021-3546</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1185981</URL>
        <Description>SUSE Bug 1185981</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
