suse-su-2021:14774-1
Vulnerability from csaf_suse
Published
2021-08-06 09:11
Modified
2021-08-06 09:11
Summary
Security update for kvm

Notes

Title of the patch
Security update for kvm
Description of the patch
This update for kvm fixes the following issues: - CVE-2021-3594: invalid pointer initialization may lead to information disclosure in slirp (udp) (bsc#1187367) - CVE-2021-3592: invalid pointer initialization may lead to information disclosure (bootp). (bsc#1187364) - CVE-2021-3416: infinite loop in loopback mode may lead to stack overflow. (bsc#1186473) - CVE-2020-15469: MMIO ops null pointer dereference may lead to DoS. (bsc#1173612) - CVE-2020-11947: iscsi_aio_ioctl_cb in block/iscsi.c has a heap-based buffer over-read. (bsc#1180523) - CVE-2021-20221: out-of-bound heap buffer access via an interrupt ID field. (bsc#1181933) - CVE-2020-25707: infinite loop in e1000e_write_packet_to_guest() in hw/net/e1000e_core.c. (bsc#1178683) - CVE-2020-15863: stack-based overflow in xgmac_enet_send() in hw/net/xgmac.c. (bsc#1174386)
Patchnames
sleposp3-kvm-14774
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for kvm",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for kvm fixes the following issues:\n\n- CVE-2021-3594: invalid pointer initialization may lead to information disclosure in slirp (udp) (bsc#1187367)\n- CVE-2021-3592: invalid pointer initialization may lead to information disclosure (bootp). (bsc#1187364)\n- CVE-2021-3416: infinite loop in loopback mode may lead to stack overflow. (bsc#1186473)\n- CVE-2020-15469: MMIO ops null pointer dereference may lead to DoS. (bsc#1173612)\n- CVE-2020-11947: iscsi_aio_ioctl_cb in block/iscsi.c has a heap-based buffer over-read. (bsc#1180523)\n- CVE-2021-20221: out-of-bound heap buffer access via an interrupt ID field. (bsc#1181933)\n- CVE-2020-25707: infinite loop in e1000e_write_packet_to_guest() in hw/net/e1000e_core.c. (bsc#1178683)\n- CVE-2020-15863: stack-based overflow in xgmac_enet_send() in hw/net/xgmac.c. (bsc#1174386)\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "sleposp3-kvm-14774",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_14774-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2021:14774-1",
        "url": "https://www.suse.com/support/update/announcement/2021/suse-su-202114774-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2021:14774-1",
        "url": "https://lists.suse.com/pipermail/sle-updates/2021-August/019812.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1031692",
        "url": "https://bugzilla.suse.com/1031692"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1173612",
        "url": "https://bugzilla.suse.com/1173612"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1174386",
        "url": "https://bugzilla.suse.com/1174386"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1178683",
        "url": "https://bugzilla.suse.com/1178683"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1180523",
        "url": "https://bugzilla.suse.com/1180523"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1181933",
        "url": "https://bugzilla.suse.com/1181933"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186473",
        "url": "https://bugzilla.suse.com/1186473"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1187364",
        "url": "https://bugzilla.suse.com/1187364"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1187367",
        "url": "https://bugzilla.suse.com/1187367"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-11947 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-11947/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-15469 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-15469/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-15863 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-15863/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-25707 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-25707/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-20221 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-20221/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3416 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3416/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3592 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3592/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3594 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3594/"
      }
    ],
    "title": "Security update for kvm",
    "tracking": {
      "current_release_date": "2021-08-06T09:11:49Z",
      "generator": {
        "date": "2021-08-06T09:11:49Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2021:14774-1",
      "initial_release_date": "2021-08-06T09:11:49Z",
      "revision_history": [
        {
          "date": "2021-08-06T09:11:49Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kvm-1.4.2-53.41.1.i586",
                "product": {
                  "name": "kvm-1.4.2-53.41.1.i586",
                  "product_id": "kvm-1.4.2-53.41.1.i586"
                }
              }
            ],
            "category": "architecture",
            "name": "i586"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Point of Sale 11 SP3",
                "product": {
                  "name": "SUSE Linux Enterprise Point of Sale 11 SP3",
                  "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-pos:11:sp3"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kvm-1.4.2-53.41.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
          "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kvm-1.4.2-53.41.1.i586"
        },
        "product_reference": "kvm-1.4.2-53.41.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2020-11947",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-11947"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "iscsi_aio_ioctl_cb in block/iscsi.c in QEMU 4.1.0 has a heap-based buffer over-read that may disclose unrelated information from process memory to an attacker.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Point of Sale 11 SP3:kvm-1.4.2-53.41.1.i586"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-11947",
          "url": "https://www.suse.com/security/cve/CVE-2020-11947"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1180523 for CVE-2020-11947",
          "url": "https://bugzilla.suse.com/1180523"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:kvm-1.4.2-53.41.1.i586"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:kvm-1.4.2-53.41.1.i586"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-06T09:11:49Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-11947"
    },
    {
      "cve": "CVE-2020-15469",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-15469"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In QEMU 4.2.0, a MemoryRegionOps object may lack read/write callback methods, leading to a NULL pointer dereference.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Point of Sale 11 SP3:kvm-1.4.2-53.41.1.i586"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-15469",
          "url": "https://www.suse.com/security/cve/CVE-2020-15469"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1173612 for CVE-2020-15469",
          "url": "https://bugzilla.suse.com/1173612"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:kvm-1.4.2-53.41.1.i586"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:kvm-1.4.2-53.41.1.i586"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-06T09:11:49Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-15469"
    },
    {
      "cve": "CVE-2020-15863",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-15863"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "hw/net/xgmac.c in the XGMAC Ethernet controller in QEMU before 07-20-2020 has a buffer overflow. This occurs during packet transmission and affects the highbank and midway emulated machines. A guest user or process could use this flaw to crash the QEMU process on the host, resulting in a denial of service or potential privileged code execution. This was fixed in commit 5519724a13664b43e225ca05351c60b4468e4555.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Point of Sale 11 SP3:kvm-1.4.2-53.41.1.i586"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-15863",
          "url": "https://www.suse.com/security/cve/CVE-2020-15863"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1174386 for CVE-2020-15863",
          "url": "https://bugzilla.suse.com/1174386"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:kvm-1.4.2-53.41.1.i586"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.2,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:kvm-1.4.2-53.41.1.i586"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-06T09:11:49Z",
          "details": "important"
        }
      ],
      "title": "CVE-2020-15863"
    },
    {
      "cve": "CVE-2020-25707",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-25707"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate is a duplicate of CVE-2020-2891",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Point of Sale 11 SP3:kvm-1.4.2-53.41.1.i586"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-25707",
          "url": "https://www.suse.com/security/cve/CVE-2020-25707"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1178683 for CVE-2020-25707",
          "url": "https://bugzilla.suse.com/1178683"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179468 for CVE-2020-25707",
          "url": "https://bugzilla.suse.com/1179468"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:kvm-1.4.2-53.41.1.i586"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:kvm-1.4.2-53.41.1.i586"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-06T09:11:49Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-25707"
    },
    {
      "cve": "CVE-2021-20221",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-20221"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An out-of-bounds heap buffer access issue was found in the ARM Generic Interrupt Controller emulator of QEMU up to and including qemu 4.2.0on aarch64 platform. The issue occurs because while writing an interrupt ID to the controller memory area, it is not masked to be 4 bits wide. It may lead to the said issue while updating controller state fields and their subsequent processing. A privileged guest user may use this flaw to crash the QEMU process on the host resulting in DoS scenario.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Point of Sale 11 SP3:kvm-1.4.2-53.41.1.i586"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-20221",
          "url": "https://www.suse.com/security/cve/CVE-2021-20221"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1181933 for CVE-2021-20221",
          "url": "https://bugzilla.suse.com/1181933"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:kvm-1.4.2-53.41.1.i586"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:kvm-1.4.2-53.41.1.i586"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-06T09:11:49Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-20221"
    },
    {
      "cve": "CVE-2021-3416",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3416"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A potential stack overflow via infinite loop issue was found in various NIC emulators of QEMU in versions up to and including 5.2.0. The issue occurs in loopback mode of a NIC wherein reentrant DMA checks get bypassed. A guest user/process may use this flaw to consume CPU cycles or crash the QEMU process on the host resulting in DoS scenario.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Point of Sale 11 SP3:kvm-1.4.2-53.41.1.i586"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3416",
          "url": "https://www.suse.com/security/cve/CVE-2021-3416"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1182968 for CVE-2021-3416",
          "url": "https://bugzilla.suse.com/1182968"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1186473 for CVE-2021-3416",
          "url": "https://bugzilla.suse.com/1186473"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:kvm-1.4.2-53.41.1.i586"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.2,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:kvm-1.4.2-53.41.1.i586"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-06T09:11:49Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-3416"
    },
    {
      "cve": "CVE-2021-3592",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3592"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the bootp_input() function and could occur while processing a udp packet that is smaller than the size of the \u0027bootp_t\u0027 structure. A malicious guest could use this flaw to leak 10 bytes of uninitialized heap memory from the host. The highest threat from this vulnerability is to data confidentiality. This flaw affects libslirp versions prior to 4.6.0.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Point of Sale 11 SP3:kvm-1.4.2-53.41.1.i586"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3592",
          "url": "https://www.suse.com/security/cve/CVE-2021-3592"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1187364 for CVE-2021-3592",
          "url": "https://bugzilla.suse.com/1187364"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1187369 for CVE-2021-3592",
          "url": "https://bugzilla.suse.com/1187369"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:kvm-1.4.2-53.41.1.i586"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.8,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:kvm-1.4.2-53.41.1.i586"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-06T09:11:49Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-3592"
    },
    {
      "cve": "CVE-2021-3594",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3594"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the udp_input() function and could occur while processing a udp packet that is smaller than the size of the \u0027udphdr\u0027 structure. This issue may lead to out-of-bounds read access or indirect host memory disclosure to the guest. The highest threat from this vulnerability is to data confidentiality. This flaw affects libslirp versions prior to 4.6.0.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Point of Sale 11 SP3:kvm-1.4.2-53.41.1.i586"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3594",
          "url": "https://www.suse.com/security/cve/CVE-2021-3594"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1187367 for CVE-2021-3594",
          "url": "https://bugzilla.suse.com/1187367"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:kvm-1.4.2-53.41.1.i586"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.8,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:kvm-1.4.2-53.41.1.i586"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-08-06T09:11:49Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-3594"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…