{
	"document":{
		"aggregate_severity":{
			"namespace":"https://nvd.nist.gov/vuln-metrics/cvss",
			"text":"Medium"
		},
		"category":"csaf_vex",
		"csaf_version":"2.0",
		"distribution":{
			"tlp":{
				"label":"WHITE",
				"url":"https:/www.first.org/tlp/"
			}
		},
		"lang":"en",
		"notes":[
			{
				"text":"qemu security update",
				"category":"general",
				"title":"Synopsis"
			},
			{
				"text":"An update for qemu is now available for openEuler-20.03-LTS-SP1.",
				"category":"general",
				"title":"Summary"
			},
			{
				"text":"QEMU is a FAST! processor emulator using dynamic translation to achieve good emulation speed.\n\nSecurity Fix(es):\n\nA NULL pointer dereference flaw was found in the SCSI emulation support of QEMU in versions before 6.0.0. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.(CVE-2020-35504)\n\nA flaw was found in the USB redirector device (usb-redir) of QEMU. Small USB packets are combined into a single, large transfer request, to reduce the overhead and improve performance. The combined size of the bulk transfer is used to dynamically allocate a variable length array (VLA) on the stack without proper validation. Since the total size is not bounded, a malicious guest could use this flaw to influence the array length and cause the QEMU process to perform an excessive allocation on the stack, resulting in a denial of service.(CVE-2021-3527)\n\nAn out-of-bounds heap buffer access issue was found in the ARM Generic Interrupt Controller emulator of QEMU up to and including qemu 4.2.0on aarch64 platform. The issue occurs because while writing an interrupt ID to the controller memory area, it is not masked to be 4 bits wide. It may lead to the said issue while updating controller state fields and their subsequent processing. A privileged guest user may use this flaw to crash the QEMU process on the host resulting in DoS scenario.(CVE-2021-20221)\n\nA NULL pointer dereference flaw was found in the am53c974 SCSI host bus adapter emulation of QEMU in versions before 6.0.0. This issue occurs while handling the 'Information Transfer' command. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.(CVE-2020-35505)\n\nThe ahci_commit_buf function in ide/ahci.c in QEMU allows attackers to cause a denial of service (NULL dereference) when the command header 'ad->cur_cmd' is null.(CVE-2019-12067)",
				"category":"general",
				"title":"Description"
			},
			{
				"text":"An update for qemu is now available for openEuler-20.03-LTS-SP1.\n\nopenEuler Security has rated this update as having a security impact of medium. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.",
				"category":"general",
				"title":"Topic"
			},
			{
				"text":"Medium",
				"category":"general",
				"title":"Severity"
			},
			{
				"text":"qemu",
				"category":"general",
				"title":"Affected Component"
			}
		],
		"publisher":{
			"issuing_authority":"openEuler security committee",
			"name":"openEuler",
			"namespace":"https://www.openeuler.org",
			"contact_details":"openeuler-security@openeuler.org",
			"category":"vendor"
		},
		"references":[
			{
				"summary":"openEuler-SA-2021-1241",
				"category":"self",
				"url":"https://openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2021-1241"
			},
			{
				"summary":"CVE-2020-35504",
				"category":"self",
				"url":"https://openeuler.org/en/security/cve/detail?cveId=CVE-2020-35504&packageName=qemu"
			},
			{
				"summary":"CVE-2021-3527",
				"category":"self",
				"url":"https://openeuler.org/en/security/cve/detail?cveId=CVE-2021-3527&packageName=qemu"
			},
			{
				"summary":"CVE-2021-20221",
				"category":"self",
				"url":"https://openeuler.org/en/security/cve/detail?cveId=CVE-2021-20221&packageName=qemu"
			},
			{
				"summary":"CVE-2020-35505",
				"category":"self",
				"url":"https://openeuler.org/en/security/cve/detail?cveId=CVE-2020-35505&packageName=qemu"
			},
			{
				"summary":"CVE-2019-12067",
				"category":"self",
				"url":"https://openeuler.org/en/security/cve/detail?cveId=CVE-2019-12067&packageName=qemu"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-35504"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3527"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-20221"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-35505"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-12067"
			},
			{
				"summary":"openEuler-SA-2021-1241 vex file",
				"category":"self",
				"url":"https://repo.openeuler.org/security/data/csaf/advisories/2021/csaf-openeuler-sa-2021-1241.json"
			}
		],
		"title":"An update for qemu is now available for openEuler-20.03-LTS-SP1",
		"tracking":{
			"initial_release_date":"2021-06-26T09:20:47+08:00",
			"revision_history":[
				{
					"date":"2021-06-26T09:20:47+08:00",
					"summary":"Initial",
					"number":"1.0.0"
				},
				{
					"date":"2024-10-31T09:20:47+08:00",
					"summary":"final",
					"number":"2.0.0"
				}
			],
			"generator":{
				"date":"2024-10-31T09:20:47+08:00",
				"engine":{
					"name":"openEuler CSAF Tool V1.0"
				}
			},
			"current_release_date":"2024-10-31T09:20:47+08:00",
			"id":"openEuler-SA-2021-1241",
			"version":"2.0.0",
			"status":"final"
		}
	},
	"product_tree":{
		"branches":[
			{
				"name":"openEuler",
				"category":"vendor",
				"branches":[
					{
						"name":"openEuler",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP1"
									},
									"product_id":"openEuler-20.03-LTS-SP1",
									"name":"openEuler-20.03-LTS-SP1"
								},
								"name":"openEuler-20.03-LTS-SP1",
								"category":"product_version"
							}
						],
						"category":"product_name"
					},
					{
						"name":"aarch64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP1"
									},
									"product_id":"qemu-debugsource-4.1.0-50.oe1.aarch64.rpm(20.03-LTS-SP1)",
									"name":"qemu-debugsource-4.1.0-50.oe1.aarch64.rpm"
								},
								"name":"qemu-debugsource-4.1.0-50.oe1.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP1"
									},
									"product_id":"qemu-4.1.0-50.oe1.aarch64.rpm(20.03-LTS-SP1)",
									"name":"qemu-4.1.0-50.oe1.aarch64.rpm"
								},
								"name":"qemu-4.1.0-50.oe1.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP1"
									},
									"product_id":"qemu-block-rbd-4.1.0-50.oe1.aarch64.rpm(20.03-LTS-SP1)",
									"name":"qemu-block-rbd-4.1.0-50.oe1.aarch64.rpm"
								},
								"name":"qemu-block-rbd-4.1.0-50.oe1.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP1"
									},
									"product_id":"qemu-guest-agent-4.1.0-50.oe1.aarch64.rpm(20.03-LTS-SP1)",
									"name":"qemu-guest-agent-4.1.0-50.oe1.aarch64.rpm"
								},
								"name":"qemu-guest-agent-4.1.0-50.oe1.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP1"
									},
									"product_id":"qemu-debuginfo-4.1.0-50.oe1.aarch64.rpm(20.03-LTS-SP1)",
									"name":"qemu-debuginfo-4.1.0-50.oe1.aarch64.rpm"
								},
								"name":"qemu-debuginfo-4.1.0-50.oe1.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP1"
									},
									"product_id":"qemu-block-ssh-4.1.0-50.oe1.aarch64.rpm(20.03-LTS-SP1)",
									"name":"qemu-block-ssh-4.1.0-50.oe1.aarch64.rpm"
								},
								"name":"qemu-block-ssh-4.1.0-50.oe1.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP1"
									},
									"product_id":"qemu-img-4.1.0-50.oe1.aarch64.rpm(20.03-LTS-SP1)",
									"name":"qemu-img-4.1.0-50.oe1.aarch64.rpm"
								},
								"name":"qemu-img-4.1.0-50.oe1.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP1"
									},
									"product_id":"qemu-block-iscsi-4.1.0-50.oe1.aarch64.rpm(20.03-LTS-SP1)",
									"name":"qemu-block-iscsi-4.1.0-50.oe1.aarch64.rpm"
								},
								"name":"qemu-block-iscsi-4.1.0-50.oe1.aarch64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"noarch",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP1"
									},
									"product_id":"qemu-help-4.1.0-50.oe1.noarch.rpm(20.03-LTS-SP1)",
									"name":"qemu-help-4.1.0-50.oe1.noarch.rpm"
								},
								"name":"qemu-help-4.1.0-50.oe1.noarch.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"src",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP1"
									},
									"product_id":"qemu-4.1.0-50.oe1.src.rpm(20.03-LTS-SP1)",
									"name":"qemu-4.1.0-50.oe1.src.rpm"
								},
								"name":"qemu-4.1.0-50.oe1.src.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"x86_64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP1"
									},
									"product_id":"qemu-guest-agent-4.1.0-50.oe1.x86_64.rpm(20.03-LTS-SP1)",
									"name":"qemu-guest-agent-4.1.0-50.oe1.x86_64.rpm"
								},
								"name":"qemu-guest-agent-4.1.0-50.oe1.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP1"
									},
									"product_id":"qemu-debugsource-4.1.0-50.oe1.x86_64.rpm(20.03-LTS-SP1)",
									"name":"qemu-debugsource-4.1.0-50.oe1.x86_64.rpm"
								},
								"name":"qemu-debugsource-4.1.0-50.oe1.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP1"
									},
									"product_id":"qemu-img-4.1.0-50.oe1.x86_64.rpm(20.03-LTS-SP1)",
									"name":"qemu-img-4.1.0-50.oe1.x86_64.rpm"
								},
								"name":"qemu-img-4.1.0-50.oe1.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP1"
									},
									"product_id":"qemu-debuginfo-4.1.0-50.oe1.x86_64.rpm(20.03-LTS-SP1)",
									"name":"qemu-debuginfo-4.1.0-50.oe1.x86_64.rpm"
								},
								"name":"qemu-debuginfo-4.1.0-50.oe1.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP1"
									},
									"product_id":"qemu-block-iscsi-4.1.0-50.oe1.x86_64.rpm(20.03-LTS-SP1)",
									"name":"qemu-block-iscsi-4.1.0-50.oe1.x86_64.rpm"
								},
								"name":"qemu-block-iscsi-4.1.0-50.oe1.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP1"
									},
									"product_id":"qemu-seabios-4.1.0-50.oe1.x86_64.rpm(20.03-LTS-SP1)",
									"name":"qemu-seabios-4.1.0-50.oe1.x86_64.rpm"
								},
								"name":"qemu-seabios-4.1.0-50.oe1.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP1"
									},
									"product_id":"qemu-4.1.0-50.oe1.x86_64.rpm(20.03-LTS-SP1)",
									"name":"qemu-4.1.0-50.oe1.x86_64.rpm"
								},
								"name":"qemu-4.1.0-50.oe1.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP1"
									},
									"product_id":"qemu-block-rbd-4.1.0-50.oe1.x86_64.rpm(20.03-LTS-SP1)",
									"name":"qemu-block-rbd-4.1.0-50.oe1.x86_64.rpm"
								},
								"name":"qemu-block-rbd-4.1.0-50.oe1.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP1"
									},
									"product_id":"qemu-block-ssh-4.1.0-50.oe1.x86_64.rpm(20.03-LTS-SP1)",
									"name":"qemu-block-ssh-4.1.0-50.oe1.x86_64.rpm"
								},
								"name":"qemu-block-ssh-4.1.0-50.oe1.x86_64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					}
				]
			}
		],
		"relationships":[
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP1",
				"product_reference":"qemu-debugsource-4.1.0-50.oe1.aarch64.rpm(20.03-LTS-SP1)",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP1:qemu-debugsource-4.1.0-50.oe1.aarch64",
					"name":"qemu-debugsource-4.1.0-50.oe1.aarch64 as a component of openEuler-20.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP1",
				"product_reference":"qemu-4.1.0-50.oe1.aarch64.rpm(20.03-LTS-SP1)",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP1:qemu-4.1.0-50.oe1.aarch64",
					"name":"qemu-4.1.0-50.oe1.aarch64 as a component of openEuler-20.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP1",
				"product_reference":"qemu-block-rbd-4.1.0-50.oe1.aarch64.rpm(20.03-LTS-SP1)",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP1:qemu-block-rbd-4.1.0-50.oe1.aarch64",
					"name":"qemu-block-rbd-4.1.0-50.oe1.aarch64 as a component of openEuler-20.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP1",
				"product_reference":"qemu-guest-agent-4.1.0-50.oe1.aarch64.rpm(20.03-LTS-SP1)",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP1:qemu-guest-agent-4.1.0-50.oe1.aarch64",
					"name":"qemu-guest-agent-4.1.0-50.oe1.aarch64 as a component of openEuler-20.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP1",
				"product_reference":"qemu-debuginfo-4.1.0-50.oe1.aarch64.rpm(20.03-LTS-SP1)",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP1:qemu-debuginfo-4.1.0-50.oe1.aarch64",
					"name":"qemu-debuginfo-4.1.0-50.oe1.aarch64 as a component of openEuler-20.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP1",
				"product_reference":"qemu-block-ssh-4.1.0-50.oe1.aarch64.rpm(20.03-LTS-SP1)",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP1:qemu-block-ssh-4.1.0-50.oe1.aarch64",
					"name":"qemu-block-ssh-4.1.0-50.oe1.aarch64 as a component of openEuler-20.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP1",
				"product_reference":"qemu-img-4.1.0-50.oe1.aarch64.rpm(20.03-LTS-SP1)",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP1:qemu-img-4.1.0-50.oe1.aarch64",
					"name":"qemu-img-4.1.0-50.oe1.aarch64 as a component of openEuler-20.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP1",
				"product_reference":"qemu-block-iscsi-4.1.0-50.oe1.aarch64.rpm(20.03-LTS-SP1)",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP1:qemu-block-iscsi-4.1.0-50.oe1.aarch64",
					"name":"qemu-block-iscsi-4.1.0-50.oe1.aarch64 as a component of openEuler-20.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP1",
				"product_reference":"qemu-help-4.1.0-50.oe1.noarch.rpm(20.03-LTS-SP1)",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP1:qemu-help-4.1.0-50.oe1.noarch",
					"name":"qemu-help-4.1.0-50.oe1.noarch as a component of openEuler-20.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP1",
				"product_reference":"qemu-4.1.0-50.oe1.src.rpm(20.03-LTS-SP1)",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP1:qemu-4.1.0-50.oe1.src",
					"name":"qemu-4.1.0-50.oe1.src as a component of openEuler-20.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP1",
				"product_reference":"qemu-guest-agent-4.1.0-50.oe1.x86_64.rpm(20.03-LTS-SP1)",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP1:qemu-guest-agent-4.1.0-50.oe1.x86_64",
					"name":"qemu-guest-agent-4.1.0-50.oe1.x86_64 as a component of openEuler-20.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP1",
				"product_reference":"qemu-debugsource-4.1.0-50.oe1.x86_64.rpm(20.03-LTS-SP1)",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP1:qemu-debugsource-4.1.0-50.oe1.x86_64",
					"name":"qemu-debugsource-4.1.0-50.oe1.x86_64 as a component of openEuler-20.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP1",
				"product_reference":"qemu-img-4.1.0-50.oe1.x86_64.rpm(20.03-LTS-SP1)",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP1:qemu-img-4.1.0-50.oe1.x86_64",
					"name":"qemu-img-4.1.0-50.oe1.x86_64 as a component of openEuler-20.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP1",
				"product_reference":"qemu-debuginfo-4.1.0-50.oe1.x86_64.rpm(20.03-LTS-SP1)",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP1:qemu-debuginfo-4.1.0-50.oe1.x86_64",
					"name":"qemu-debuginfo-4.1.0-50.oe1.x86_64 as a component of openEuler-20.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP1",
				"product_reference":"qemu-block-iscsi-4.1.0-50.oe1.x86_64.rpm(20.03-LTS-SP1)",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP1:qemu-block-iscsi-4.1.0-50.oe1.x86_64",
					"name":"qemu-block-iscsi-4.1.0-50.oe1.x86_64 as a component of openEuler-20.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP1",
				"product_reference":"qemu-seabios-4.1.0-50.oe1.x86_64.rpm(20.03-LTS-SP1)",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP1:qemu-seabios-4.1.0-50.oe1.x86_64",
					"name":"qemu-seabios-4.1.0-50.oe1.x86_64 as a component of openEuler-20.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP1",
				"product_reference":"qemu-4.1.0-50.oe1.x86_64.rpm(20.03-LTS-SP1)",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP1:qemu-4.1.0-50.oe1.x86_64",
					"name":"qemu-4.1.0-50.oe1.x86_64 as a component of openEuler-20.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP1",
				"product_reference":"qemu-block-rbd-4.1.0-50.oe1.x86_64.rpm(20.03-LTS-SP1)",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP1:qemu-block-rbd-4.1.0-50.oe1.x86_64",
					"name":"qemu-block-rbd-4.1.0-50.oe1.x86_64 as a component of openEuler-20.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP1",
				"product_reference":"qemu-block-ssh-4.1.0-50.oe1.x86_64.rpm(20.03-LTS-SP1)",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP1:qemu-block-ssh-4.1.0-50.oe1.x86_64",
					"name":"qemu-block-ssh-4.1.0-50.oe1.x86_64 as a component of openEuler-20.03-LTS-SP1"
				},
				"category":"default_component_of"
			}
		]
	},
	"vulnerabilities":[
		{
			"cve":"CVE-2020-35504",
			"notes":[
				{
					"text":"A NULL pointer dereference flaw was found in the SCSI emulation support of QEMU in versions before 6.0.0. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-20.03-LTS-SP1:qemu-debugsource-4.1.0-50.oe1.aarch64",
					"openEuler-20.03-LTS-SP1:qemu-4.1.0-50.oe1.aarch64",
					"openEuler-20.03-LTS-SP1:qemu-block-rbd-4.1.0-50.oe1.aarch64",
					"openEuler-20.03-LTS-SP1:qemu-guest-agent-4.1.0-50.oe1.aarch64",
					"openEuler-20.03-LTS-SP1:qemu-debuginfo-4.1.0-50.oe1.aarch64",
					"openEuler-20.03-LTS-SP1:qemu-block-ssh-4.1.0-50.oe1.aarch64",
					"openEuler-20.03-LTS-SP1:qemu-img-4.1.0-50.oe1.aarch64",
					"openEuler-20.03-LTS-SP1:qemu-block-iscsi-4.1.0-50.oe1.aarch64",
					"openEuler-20.03-LTS-SP1:qemu-help-4.1.0-50.oe1.noarch",
					"openEuler-20.03-LTS-SP1:qemu-4.1.0-50.oe1.src",
					"openEuler-20.03-LTS-SP1:qemu-guest-agent-4.1.0-50.oe1.x86_64",
					"openEuler-20.03-LTS-SP1:qemu-debugsource-4.1.0-50.oe1.x86_64",
					"openEuler-20.03-LTS-SP1:qemu-img-4.1.0-50.oe1.x86_64",
					"openEuler-20.03-LTS-SP1:qemu-debuginfo-4.1.0-50.oe1.x86_64",
					"openEuler-20.03-LTS-SP1:qemu-block-iscsi-4.1.0-50.oe1.x86_64",
					"openEuler-20.03-LTS-SP1:qemu-seabios-4.1.0-50.oe1.x86_64",
					"openEuler-20.03-LTS-SP1:qemu-4.1.0-50.oe1.x86_64",
					"openEuler-20.03-LTS-SP1:qemu-block-rbd-4.1.0-50.oe1.x86_64",
					"openEuler-20.03-LTS-SP1:qemu-block-ssh-4.1.0-50.oe1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-20.03-LTS-SP1:qemu-debugsource-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-block-rbd-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-guest-agent-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-debuginfo-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-block-ssh-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-img-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-block-iscsi-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-help-4.1.0-50.oe1.noarch",
						"openEuler-20.03-LTS-SP1:qemu-4.1.0-50.oe1.src",
						"openEuler-20.03-LTS-SP1:qemu-guest-agent-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-debugsource-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-img-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-debuginfo-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-block-iscsi-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-seabios-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-block-rbd-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-block-ssh-4.1.0-50.oe1.x86_64"
					],
					"details":"qemu security update",
					"category":"vendor_fix",
					"url":"https://openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2021-1241"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":6.0,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-20.03-LTS-SP1:qemu-debugsource-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-block-rbd-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-guest-agent-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-debuginfo-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-block-ssh-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-img-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-block-iscsi-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-help-4.1.0-50.oe1.noarch",
						"openEuler-20.03-LTS-SP1:qemu-4.1.0-50.oe1.src",
						"openEuler-20.03-LTS-SP1:qemu-guest-agent-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-debugsource-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-img-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-debuginfo-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-block-iscsi-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-seabios-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-block-rbd-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-block-ssh-4.1.0-50.oe1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2020-35504"
		},
		{
			"cve":"CVE-2021-3527",
			"notes":[
				{
					"text":"A flaw was found in the USB redirector device (usb-redir) of QEMU. Small USB packets are combined into a single, large transfer request, to reduce the overhead and improve performance. The combined size of the bulk transfer is used to dynamically allocate a variable length array (VLA) on the stack without proper validation. Since the total size is not bounded, a malicious guest could use this flaw to influence the array length and cause the QEMU process to perform an excessive allocation on the stack, resulting in a denial of service.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-20.03-LTS-SP1:qemu-debugsource-4.1.0-50.oe1.aarch64",
					"openEuler-20.03-LTS-SP1:qemu-4.1.0-50.oe1.aarch64",
					"openEuler-20.03-LTS-SP1:qemu-block-rbd-4.1.0-50.oe1.aarch64",
					"openEuler-20.03-LTS-SP1:qemu-guest-agent-4.1.0-50.oe1.aarch64",
					"openEuler-20.03-LTS-SP1:qemu-debuginfo-4.1.0-50.oe1.aarch64",
					"openEuler-20.03-LTS-SP1:qemu-block-ssh-4.1.0-50.oe1.aarch64",
					"openEuler-20.03-LTS-SP1:qemu-img-4.1.0-50.oe1.aarch64",
					"openEuler-20.03-LTS-SP1:qemu-block-iscsi-4.1.0-50.oe1.aarch64",
					"openEuler-20.03-LTS-SP1:qemu-help-4.1.0-50.oe1.noarch",
					"openEuler-20.03-LTS-SP1:qemu-4.1.0-50.oe1.src",
					"openEuler-20.03-LTS-SP1:qemu-guest-agent-4.1.0-50.oe1.x86_64",
					"openEuler-20.03-LTS-SP1:qemu-debugsource-4.1.0-50.oe1.x86_64",
					"openEuler-20.03-LTS-SP1:qemu-img-4.1.0-50.oe1.x86_64",
					"openEuler-20.03-LTS-SP1:qemu-debuginfo-4.1.0-50.oe1.x86_64",
					"openEuler-20.03-LTS-SP1:qemu-block-iscsi-4.1.0-50.oe1.x86_64",
					"openEuler-20.03-LTS-SP1:qemu-seabios-4.1.0-50.oe1.x86_64",
					"openEuler-20.03-LTS-SP1:qemu-4.1.0-50.oe1.x86_64",
					"openEuler-20.03-LTS-SP1:qemu-block-rbd-4.1.0-50.oe1.x86_64",
					"openEuler-20.03-LTS-SP1:qemu-block-ssh-4.1.0-50.oe1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-20.03-LTS-SP1:qemu-debugsource-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-block-rbd-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-guest-agent-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-debuginfo-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-block-ssh-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-img-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-block-iscsi-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-help-4.1.0-50.oe1.noarch",
						"openEuler-20.03-LTS-SP1:qemu-4.1.0-50.oe1.src",
						"openEuler-20.03-LTS-SP1:qemu-guest-agent-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-debugsource-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-img-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-debuginfo-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-block-iscsi-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-seabios-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-block-rbd-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-block-ssh-4.1.0-50.oe1.x86_64"
					],
					"details":"qemu security update",
					"category":"vendor_fix",
					"url":"https://openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2021-1241"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-20.03-LTS-SP1:qemu-debugsource-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-block-rbd-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-guest-agent-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-debuginfo-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-block-ssh-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-img-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-block-iscsi-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-help-4.1.0-50.oe1.noarch",
						"openEuler-20.03-LTS-SP1:qemu-4.1.0-50.oe1.src",
						"openEuler-20.03-LTS-SP1:qemu-guest-agent-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-debugsource-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-img-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-debuginfo-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-block-iscsi-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-seabios-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-block-rbd-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-block-ssh-4.1.0-50.oe1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2021-3527"
		},
		{
			"cve":"CVE-2021-20221",
			"notes":[
				{
					"text":"An out-of-bounds heap buffer access issue was found in the ARM Generic Interrupt Controller emulator of QEMU up to and including qemu 4.2.0on aarch64 platform. The issue occurs because while writing an interrupt ID to the controller memory area, it is not masked to be 4 bits wide. It may lead to the said issue while updating controller state fields and their subsequent processing. A privileged guest user may use this flaw to crash the QEMU process on the host resulting in DoS scenario.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-20.03-LTS-SP1:qemu-debugsource-4.1.0-50.oe1.aarch64",
					"openEuler-20.03-LTS-SP1:qemu-4.1.0-50.oe1.aarch64",
					"openEuler-20.03-LTS-SP1:qemu-block-rbd-4.1.0-50.oe1.aarch64",
					"openEuler-20.03-LTS-SP1:qemu-guest-agent-4.1.0-50.oe1.aarch64",
					"openEuler-20.03-LTS-SP1:qemu-debuginfo-4.1.0-50.oe1.aarch64",
					"openEuler-20.03-LTS-SP1:qemu-block-ssh-4.1.0-50.oe1.aarch64",
					"openEuler-20.03-LTS-SP1:qemu-img-4.1.0-50.oe1.aarch64",
					"openEuler-20.03-LTS-SP1:qemu-block-iscsi-4.1.0-50.oe1.aarch64",
					"openEuler-20.03-LTS-SP1:qemu-help-4.1.0-50.oe1.noarch",
					"openEuler-20.03-LTS-SP1:qemu-4.1.0-50.oe1.src",
					"openEuler-20.03-LTS-SP1:qemu-guest-agent-4.1.0-50.oe1.x86_64",
					"openEuler-20.03-LTS-SP1:qemu-debugsource-4.1.0-50.oe1.x86_64",
					"openEuler-20.03-LTS-SP1:qemu-img-4.1.0-50.oe1.x86_64",
					"openEuler-20.03-LTS-SP1:qemu-debuginfo-4.1.0-50.oe1.x86_64",
					"openEuler-20.03-LTS-SP1:qemu-block-iscsi-4.1.0-50.oe1.x86_64",
					"openEuler-20.03-LTS-SP1:qemu-seabios-4.1.0-50.oe1.x86_64",
					"openEuler-20.03-LTS-SP1:qemu-4.1.0-50.oe1.x86_64",
					"openEuler-20.03-LTS-SP1:qemu-block-rbd-4.1.0-50.oe1.x86_64",
					"openEuler-20.03-LTS-SP1:qemu-block-ssh-4.1.0-50.oe1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-20.03-LTS-SP1:qemu-debugsource-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-block-rbd-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-guest-agent-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-debuginfo-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-block-ssh-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-img-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-block-iscsi-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-help-4.1.0-50.oe1.noarch",
						"openEuler-20.03-LTS-SP1:qemu-4.1.0-50.oe1.src",
						"openEuler-20.03-LTS-SP1:qemu-guest-agent-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-debugsource-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-img-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-debuginfo-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-block-iscsi-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-seabios-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-block-rbd-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-block-ssh-4.1.0-50.oe1.x86_64"
					],
					"details":"qemu security update",
					"category":"vendor_fix",
					"url":"https://openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2021-1241"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":6.0,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-20.03-LTS-SP1:qemu-debugsource-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-block-rbd-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-guest-agent-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-debuginfo-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-block-ssh-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-img-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-block-iscsi-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-help-4.1.0-50.oe1.noarch",
						"openEuler-20.03-LTS-SP1:qemu-4.1.0-50.oe1.src",
						"openEuler-20.03-LTS-SP1:qemu-guest-agent-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-debugsource-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-img-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-debuginfo-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-block-iscsi-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-seabios-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-block-rbd-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-block-ssh-4.1.0-50.oe1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2021-20221"
		},
		{
			"cve":"CVE-2020-35505",
			"notes":[
				{
					"text":"A NULL pointer dereference flaw was found in the am53c974 SCSI host bus adapter emulation of QEMU in versions before 6.0.0. This issue occurs while handling the 'Information Transfer' command. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-20.03-LTS-SP1:qemu-debugsource-4.1.0-50.oe1.aarch64",
					"openEuler-20.03-LTS-SP1:qemu-4.1.0-50.oe1.aarch64",
					"openEuler-20.03-LTS-SP1:qemu-block-rbd-4.1.0-50.oe1.aarch64",
					"openEuler-20.03-LTS-SP1:qemu-guest-agent-4.1.0-50.oe1.aarch64",
					"openEuler-20.03-LTS-SP1:qemu-debuginfo-4.1.0-50.oe1.aarch64",
					"openEuler-20.03-LTS-SP1:qemu-block-ssh-4.1.0-50.oe1.aarch64",
					"openEuler-20.03-LTS-SP1:qemu-img-4.1.0-50.oe1.aarch64",
					"openEuler-20.03-LTS-SP1:qemu-block-iscsi-4.1.0-50.oe1.aarch64",
					"openEuler-20.03-LTS-SP1:qemu-help-4.1.0-50.oe1.noarch",
					"openEuler-20.03-LTS-SP1:qemu-4.1.0-50.oe1.src",
					"openEuler-20.03-LTS-SP1:qemu-guest-agent-4.1.0-50.oe1.x86_64",
					"openEuler-20.03-LTS-SP1:qemu-debugsource-4.1.0-50.oe1.x86_64",
					"openEuler-20.03-LTS-SP1:qemu-img-4.1.0-50.oe1.x86_64",
					"openEuler-20.03-LTS-SP1:qemu-debuginfo-4.1.0-50.oe1.x86_64",
					"openEuler-20.03-LTS-SP1:qemu-block-iscsi-4.1.0-50.oe1.x86_64",
					"openEuler-20.03-LTS-SP1:qemu-seabios-4.1.0-50.oe1.x86_64",
					"openEuler-20.03-LTS-SP1:qemu-4.1.0-50.oe1.x86_64",
					"openEuler-20.03-LTS-SP1:qemu-block-rbd-4.1.0-50.oe1.x86_64",
					"openEuler-20.03-LTS-SP1:qemu-block-ssh-4.1.0-50.oe1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-20.03-LTS-SP1:qemu-debugsource-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-block-rbd-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-guest-agent-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-debuginfo-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-block-ssh-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-img-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-block-iscsi-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-help-4.1.0-50.oe1.noarch",
						"openEuler-20.03-LTS-SP1:qemu-4.1.0-50.oe1.src",
						"openEuler-20.03-LTS-SP1:qemu-guest-agent-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-debugsource-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-img-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-debuginfo-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-block-iscsi-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-seabios-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-block-rbd-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-block-ssh-4.1.0-50.oe1.x86_64"
					],
					"details":"qemu security update",
					"category":"vendor_fix",
					"url":"https://openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2021-1241"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":4.4,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-20.03-LTS-SP1:qemu-debugsource-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-block-rbd-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-guest-agent-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-debuginfo-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-block-ssh-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-img-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-block-iscsi-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-help-4.1.0-50.oe1.noarch",
						"openEuler-20.03-LTS-SP1:qemu-4.1.0-50.oe1.src",
						"openEuler-20.03-LTS-SP1:qemu-guest-agent-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-debugsource-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-img-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-debuginfo-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-block-iscsi-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-seabios-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-block-rbd-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-block-ssh-4.1.0-50.oe1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2020-35505"
		},
		{
			"cve":"CVE-2019-12067",
			"notes":[
				{
					"text":"The ahci_commit_buf function in ide/ahci.c in QEMU allows attackers to cause a denial of service (NULL dereference) when the command header 'ad->cur_cmd' is null.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-20.03-LTS-SP1:qemu-debugsource-4.1.0-50.oe1.aarch64",
					"openEuler-20.03-LTS-SP1:qemu-4.1.0-50.oe1.aarch64",
					"openEuler-20.03-LTS-SP1:qemu-block-rbd-4.1.0-50.oe1.aarch64",
					"openEuler-20.03-LTS-SP1:qemu-guest-agent-4.1.0-50.oe1.aarch64",
					"openEuler-20.03-LTS-SP1:qemu-debuginfo-4.1.0-50.oe1.aarch64",
					"openEuler-20.03-LTS-SP1:qemu-block-ssh-4.1.0-50.oe1.aarch64",
					"openEuler-20.03-LTS-SP1:qemu-img-4.1.0-50.oe1.aarch64",
					"openEuler-20.03-LTS-SP1:qemu-block-iscsi-4.1.0-50.oe1.aarch64",
					"openEuler-20.03-LTS-SP1:qemu-help-4.1.0-50.oe1.noarch",
					"openEuler-20.03-LTS-SP1:qemu-4.1.0-50.oe1.src",
					"openEuler-20.03-LTS-SP1:qemu-guest-agent-4.1.0-50.oe1.x86_64",
					"openEuler-20.03-LTS-SP1:qemu-debugsource-4.1.0-50.oe1.x86_64",
					"openEuler-20.03-LTS-SP1:qemu-img-4.1.0-50.oe1.x86_64",
					"openEuler-20.03-LTS-SP1:qemu-debuginfo-4.1.0-50.oe1.x86_64",
					"openEuler-20.03-LTS-SP1:qemu-block-iscsi-4.1.0-50.oe1.x86_64",
					"openEuler-20.03-LTS-SP1:qemu-seabios-4.1.0-50.oe1.x86_64",
					"openEuler-20.03-LTS-SP1:qemu-4.1.0-50.oe1.x86_64",
					"openEuler-20.03-LTS-SP1:qemu-block-rbd-4.1.0-50.oe1.x86_64",
					"openEuler-20.03-LTS-SP1:qemu-block-ssh-4.1.0-50.oe1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-20.03-LTS-SP1:qemu-debugsource-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-block-rbd-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-guest-agent-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-debuginfo-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-block-ssh-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-img-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-block-iscsi-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-help-4.1.0-50.oe1.noarch",
						"openEuler-20.03-LTS-SP1:qemu-4.1.0-50.oe1.src",
						"openEuler-20.03-LTS-SP1:qemu-guest-agent-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-debugsource-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-img-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-debuginfo-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-block-iscsi-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-seabios-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-block-rbd-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-block-ssh-4.1.0-50.oe1.x86_64"
					],
					"details":"qemu security update",
					"category":"vendor_fix",
					"url":"https://openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2021-1241"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":6.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-20.03-LTS-SP1:qemu-debugsource-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-block-rbd-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-guest-agent-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-debuginfo-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-block-ssh-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-img-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-block-iscsi-4.1.0-50.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:qemu-help-4.1.0-50.oe1.noarch",
						"openEuler-20.03-LTS-SP1:qemu-4.1.0-50.oe1.src",
						"openEuler-20.03-LTS-SP1:qemu-guest-agent-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-debugsource-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-img-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-debuginfo-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-block-iscsi-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-seabios-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-block-rbd-4.1.0-50.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:qemu-block-ssh-4.1.0-50.oe1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2019-12067"
		}
	]
}