<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for qemu</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2019:0254-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2019-03-23T11:07:37Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2019-03-23T11:07:37Z</InitialReleaseDate>
    <CurrentReleaseDate>2019-03-23T11:07:37Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for qemu</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for qemu fixes the following issues:

Security issues fixed:

- CVE-2019-6778: Fixed a heap buffer overflow issue in the SLiRP networking implementation (bsc#1123156).
- CVE-2018-16872: Fixed a host security vulnerability related to handling symlinks in usb-mtp (bsc#1119493).
- CVE-2018-19489: Fixed a denial of service vulnerability in virtfs (bsc#1117275).
- CVE-2018-19364: Fixed a use-after-free if the virtfs interface resulting in a denial of service (bsc#1116717).
- CVE-2018-18954: Fixed a denial of service vulnerability related to PowerPC PowerNV memory operations (bsc#1114957).

Non-security issues fixed:

- Improved disk performance for qemu on xen (bsc#1100408).
- Fixed xen offline migration (bsc#1079730, bsc#1101982, bsc#1063993).
- Fixed pwrite64/pread64/write to return 0 over -1 for a zero length NULL buffer in qemu (bsc#1121600).
- Use /bin/bash to echo value into sys fs for ksm control (bsc#1112646).
- Return specification exception for unimplemented diag 308 subcodes rather than a hardware error (bsc#1123179).

This update was imported from the SUSE:SLE-15:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2019-254</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00073.html</URL>
      <Description>E-Mail link for openSUSE-SU-2019:0254-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1063993</URL>
      <Description>SUSE Bug 1063993</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1079730</URL>
      <Description>SUSE Bug 1079730</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1100408</URL>
      <Description>SUSE Bug 1100408</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1101982</URL>
      <Description>SUSE Bug 1101982</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1112646</URL>
      <Description>SUSE Bug 1112646</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1114957</URL>
      <Description>SUSE Bug 1114957</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1116717</URL>
      <Description>SUSE Bug 1116717</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1117275</URL>
      <Description>SUSE Bug 1117275</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1119493</URL>
      <Description>SUSE Bug 1119493</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1121600</URL>
      <Description>SUSE Bug 1121600</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1123156</URL>
      <Description>SUSE Bug 1123156</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1123179</URL>
      <Description>SUSE Bug 1123179</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-16872/</URL>
      <Description>SUSE CVE CVE-2018-16872 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-18954/</URL>
      <Description>SUSE CVE CVE-2018-18954 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-19364/</URL>
      <Description>SUSE CVE CVE-2018-19364 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-19489/</URL>
      <Description>SUSE CVE CVE-2018-19489 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-6778/</URL>
      <Description>SUSE CVE CVE-2019-6778 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.0">
      <Branch Type="Product Name" Name="openSUSE Leap 15.0">
        <FullProductName ProductID="openSUSE Leap 15.0" CPE="cpe:/o:opensuse:leap:15.0">openSUSE Leap 15.0</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="qemu-2.11.2-lp150.7.18.1">
      <FullProductName ProductID="qemu-2.11.2-lp150.7.18.1">qemu-2.11.2-lp150.7.18.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-arm-2.11.2-lp150.7.18.1">
      <FullProductName ProductID="qemu-arm-2.11.2-lp150.7.18.1">qemu-arm-2.11.2-lp150.7.18.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-curl-2.11.2-lp150.7.18.1">
      <FullProductName ProductID="qemu-block-curl-2.11.2-lp150.7.18.1">qemu-block-curl-2.11.2-lp150.7.18.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-dmg-2.11.2-lp150.7.18.1">
      <FullProductName ProductID="qemu-block-dmg-2.11.2-lp150.7.18.1">qemu-block-dmg-2.11.2-lp150.7.18.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-gluster-2.11.2-lp150.7.18.1">
      <FullProductName ProductID="qemu-block-gluster-2.11.2-lp150.7.18.1">qemu-block-gluster-2.11.2-lp150.7.18.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-iscsi-2.11.2-lp150.7.18.1">
      <FullProductName ProductID="qemu-block-iscsi-2.11.2-lp150.7.18.1">qemu-block-iscsi-2.11.2-lp150.7.18.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-rbd-2.11.2-lp150.7.18.1">
      <FullProductName ProductID="qemu-block-rbd-2.11.2-lp150.7.18.1">qemu-block-rbd-2.11.2-lp150.7.18.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-ssh-2.11.2-lp150.7.18.1">
      <FullProductName ProductID="qemu-block-ssh-2.11.2-lp150.7.18.1">qemu-block-ssh-2.11.2-lp150.7.18.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-extra-2.11.2-lp150.7.18.1">
      <FullProductName ProductID="qemu-extra-2.11.2-lp150.7.18.1">qemu-extra-2.11.2-lp150.7.18.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-guest-agent-2.11.2-lp150.7.18.1">
      <FullProductName ProductID="qemu-guest-agent-2.11.2-lp150.7.18.1">qemu-guest-agent-2.11.2-lp150.7.18.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-ipxe-1.0.0+-lp150.7.18.1">
      <FullProductName ProductID="qemu-ipxe-1.0.0+-lp150.7.18.1">qemu-ipxe-1.0.0+-lp150.7.18.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-ksm-2.11.2-lp150.7.18.1">
      <FullProductName ProductID="qemu-ksm-2.11.2-lp150.7.18.1">qemu-ksm-2.11.2-lp150.7.18.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-kvm-2.11.2-lp150.7.18.1">
      <FullProductName ProductID="qemu-kvm-2.11.2-lp150.7.18.1">qemu-kvm-2.11.2-lp150.7.18.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-lang-2.11.2-lp150.7.18.1">
      <FullProductName ProductID="qemu-lang-2.11.2-lp150.7.18.1">qemu-lang-2.11.2-lp150.7.18.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-linux-user-2.11.2-lp150.7.18.1">
      <FullProductName ProductID="qemu-linux-user-2.11.2-lp150.7.18.1">qemu-linux-user-2.11.2-lp150.7.18.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-ppc-2.11.2-lp150.7.18.1">
      <FullProductName ProductID="qemu-ppc-2.11.2-lp150.7.18.1">qemu-ppc-2.11.2-lp150.7.18.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-s390-2.11.2-lp150.7.18.1">
      <FullProductName ProductID="qemu-s390-2.11.2-lp150.7.18.1">qemu-s390-2.11.2-lp150.7.18.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-seabios-1.11.0-lp150.7.18.1">
      <FullProductName ProductID="qemu-seabios-1.11.0-lp150.7.18.1">qemu-seabios-1.11.0-lp150.7.18.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-sgabios-8-lp150.7.18.1">
      <FullProductName ProductID="qemu-sgabios-8-lp150.7.18.1">qemu-sgabios-8-lp150.7.18.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-testsuite-2.11.2-lp150.7.18.1">
      <FullProductName ProductID="qemu-testsuite-2.11.2-lp150.7.18.1">qemu-testsuite-2.11.2-lp150.7.18.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-tools-2.11.2-lp150.7.18.1">
      <FullProductName ProductID="qemu-tools-2.11.2-lp150.7.18.1">qemu-tools-2.11.2-lp150.7.18.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-vgabios-1.11.0-lp150.7.18.1">
      <FullProductName ProductID="qemu-vgabios-1.11.0-lp150.7.18.1">qemu-vgabios-1.11.0-lp150.7.18.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-x86-2.11.2-lp150.7.18.1">
      <FullProductName ProductID="qemu-x86-2.11.2-lp150.7.18.1">qemu-x86-2.11.2-lp150.7.18.1</FullProductName>
    </Branch>
    <Relationship ProductReference="qemu-2.11.2-lp150.7.18.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-2.11.2-lp150.7.18.1">qemu-2.11.2-lp150.7.18.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-arm-2.11.2-lp150.7.18.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-arm-2.11.2-lp150.7.18.1">qemu-arm-2.11.2-lp150.7.18.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-curl-2.11.2-lp150.7.18.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-block-curl-2.11.2-lp150.7.18.1">qemu-block-curl-2.11.2-lp150.7.18.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-dmg-2.11.2-lp150.7.18.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-block-dmg-2.11.2-lp150.7.18.1">qemu-block-dmg-2.11.2-lp150.7.18.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-gluster-2.11.2-lp150.7.18.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-block-gluster-2.11.2-lp150.7.18.1">qemu-block-gluster-2.11.2-lp150.7.18.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-iscsi-2.11.2-lp150.7.18.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-block-iscsi-2.11.2-lp150.7.18.1">qemu-block-iscsi-2.11.2-lp150.7.18.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-rbd-2.11.2-lp150.7.18.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-block-rbd-2.11.2-lp150.7.18.1">qemu-block-rbd-2.11.2-lp150.7.18.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-ssh-2.11.2-lp150.7.18.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-block-ssh-2.11.2-lp150.7.18.1">qemu-block-ssh-2.11.2-lp150.7.18.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-extra-2.11.2-lp150.7.18.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-extra-2.11.2-lp150.7.18.1">qemu-extra-2.11.2-lp150.7.18.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-guest-agent-2.11.2-lp150.7.18.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-guest-agent-2.11.2-lp150.7.18.1">qemu-guest-agent-2.11.2-lp150.7.18.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-ipxe-1.0.0+-lp150.7.18.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-ipxe-1.0.0+-lp150.7.18.1">qemu-ipxe-1.0.0+-lp150.7.18.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-ksm-2.11.2-lp150.7.18.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-ksm-2.11.2-lp150.7.18.1">qemu-ksm-2.11.2-lp150.7.18.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-kvm-2.11.2-lp150.7.18.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-kvm-2.11.2-lp150.7.18.1">qemu-kvm-2.11.2-lp150.7.18.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-lang-2.11.2-lp150.7.18.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-lang-2.11.2-lp150.7.18.1">qemu-lang-2.11.2-lp150.7.18.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-linux-user-2.11.2-lp150.7.18.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-linux-user-2.11.2-lp150.7.18.1">qemu-linux-user-2.11.2-lp150.7.18.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-ppc-2.11.2-lp150.7.18.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-ppc-2.11.2-lp150.7.18.1">qemu-ppc-2.11.2-lp150.7.18.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-s390-2.11.2-lp150.7.18.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-s390-2.11.2-lp150.7.18.1">qemu-s390-2.11.2-lp150.7.18.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-seabios-1.11.0-lp150.7.18.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-seabios-1.11.0-lp150.7.18.1">qemu-seabios-1.11.0-lp150.7.18.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-sgabios-8-lp150.7.18.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-sgabios-8-lp150.7.18.1">qemu-sgabios-8-lp150.7.18.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-testsuite-2.11.2-lp150.7.18.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-testsuite-2.11.2-lp150.7.18.1">qemu-testsuite-2.11.2-lp150.7.18.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-tools-2.11.2-lp150.7.18.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-tools-2.11.2-lp150.7.18.1">qemu-tools-2.11.2-lp150.7.18.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-vgabios-1.11.0-lp150.7.18.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-vgabios-1.11.0-lp150.7.18.1">qemu-vgabios-1.11.0-lp150.7.18.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-x86-2.11.2-lp150.7.18.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-x86-2.11.2-lp150.7.18.1">qemu-x86-2.11.2-lp150.7.18.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in qemu Media Transfer Protocol (MTP). The code opening files in usb_mtp_get_object and usb_mtp_get_partial_object and directories in usb_mtp_object_readdir doesn't consider that the underlying filesystem may have changed since the time lstat(2) was called in usb_mtp_object_alloc, a classical TOCTTOU problem. An attacker with write access to the host filesystem shared with a guest can use this property to navigate the host filesystem in the context of the QEMU process and read any file the QEMU process has access to. Access to the filesystem may be local or via a network share protocol such as CIFS.</Note>
    </Notes>
    <CVE>CVE-2018-16872</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:qemu-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-arm-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-curl-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-dmg-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-gluster-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-iscsi-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-rbd-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-ssh-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-extra-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-guest-agent-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-ipxe-1.0.0+-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-ksm-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-kvm-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-lang-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-linux-user-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-ppc-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-s390-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-seabios-1.11.0-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-sgabios-8-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-testsuite-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-tools-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-vgabios-1.11.0-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-x86-2.11.2-lp150.7.18.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00073.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-16872.html</URL>
        <Description>CVE-2018-16872</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1119493</URL>
        <Description>SUSE Bug 1119493</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1119494</URL>
        <Description>SUSE Bug 1119494</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The pnv_lpc_do_eccb function in hw/ppc/pnv_lpc.c in Qemu before 3.1 allows out-of-bounds write or read access to PowerNV memory.</Note>
    </Notes>
    <CVE>CVE-2018-18954</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:qemu-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-arm-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-curl-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-dmg-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-gluster-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-iscsi-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-rbd-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-ssh-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-extra-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-guest-agent-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-ipxe-1.0.0+-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-ksm-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-kvm-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-lang-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-linux-user-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-ppc-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-s390-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-seabios-1.11.0-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-sgabios-8-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-testsuite-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-tools-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-vgabios-1.11.0-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-x86-2.11.2-lp150.7.18.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00073.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-18954.html</URL>
        <Description>CVE-2018-18954</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1114957</URL>
        <Description>SUSE Bug 1114957</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">hw/9pfs/cofile.c and hw/9pfs/9p.c in QEMU can modify an fid path while it is being accessed by a second thread, leading to (for example) a use-after-free outcome.</Note>
    </Notes>
    <CVE>CVE-2018-19364</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:qemu-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-arm-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-curl-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-dmg-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-gluster-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-iscsi-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-rbd-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-ssh-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-extra-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-guest-agent-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-ipxe-1.0.0+-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-ksm-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-kvm-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-lang-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-linux-user-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-ppc-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-s390-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-seabios-1.11.0-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-sgabios-8-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-testsuite-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-tools-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-vgabios-1.11.0-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-x86-2.11.2-lp150.7.18.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00073.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-19364.html</URL>
        <Description>CVE-2018-19364</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116717</URL>
        <Description>SUSE Bug 1116717</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116726</URL>
        <Description>SUSE Bug 1116726</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">v9fs_wstat in hw/9pfs/9p.c in QEMU allows guest OS users to cause a denial of service (crash) because of a race condition during file renaming.</Note>
    </Notes>
    <CVE>CVE-2018-19489</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:qemu-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-arm-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-curl-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-dmg-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-gluster-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-iscsi-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-rbd-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-ssh-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-extra-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-guest-agent-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-ipxe-1.0.0+-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-ksm-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-kvm-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-lang-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-linux-user-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-ppc-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-s390-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-seabios-1.11.0-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-sgabios-8-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-testsuite-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-tools-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-vgabios-1.11.0-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-x86-2.11.2-lp150.7.18.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00073.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-19489.html</URL>
        <Description>CVE-2018-19489</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117275</URL>
        <Description>SUSE Bug 1117275</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117279</URL>
        <Description>SUSE Bug 1117279</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In QEMU 3.0.0, tcp_emu in slirp/tcp_subr.c has a heap-based buffer overflow.</Note>
    </Notes>
    <CVE>CVE-2019-6778</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:qemu-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-arm-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-curl-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-dmg-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-gluster-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-iscsi-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-rbd-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-ssh-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-extra-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-guest-agent-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-ipxe-1.0.0+-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-ksm-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-kvm-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-lang-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-linux-user-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-ppc-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-s390-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-seabios-1.11.0-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-sgabios-8-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-testsuite-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-tools-2.11.2-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-vgabios-1.11.0-lp150.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-x86-2.11.2-lp150.7.18.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00073.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-6778.html</URL>
        <Description>CVE-2019-6778</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123156</URL>
        <Description>SUSE Bug 1123156</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123157</URL>
        <Description>SUSE Bug 1123157</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
