<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for qemu</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2019:2059-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2019-09-03T04:19:16Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2019-09-03T04:19:16Z</InitialReleaseDate>
    <CurrentReleaseDate>2019-09-03T04:19:16Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for qemu</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for qemu fixes the following issues:

Security issues fixed:

- CVE-2019-14378: Security fix for heap overflow in ip_reass on big packet input (bsc#1143794).
- CVE-2019-12155: Security fix for null pointer dereference while releasing spice resources (bsc#1135902).
- CVE-2019-13164: Security fix for qemu-bridge-helper ACL can be bypassed when names are too long (bsc#1140402).

Bug fixes and enhancements:

- Add vcpu features needed for Cascadelake-Server, Icelake-Client and Icelake-Server, especially the foundational
  arch-capabilities to help with security and performance on Intel hosts (bsc#1134883) (fate#327764)
- Add support for one more security/performance related vcpu feature (bsc#1136778) (fate#327796)
- Disable file locking in the Xen PV disk backend to avoid locking issues with PV domUs during migration. The
  issues triggered by the locking can not be properly handled in libxl. The locking introduced in qemu-2.10 was
  removed again in qemu-4.0 (bsc#1079730, bsc#1098403, bsc#1111025).
- Ignore csske for expanding the cpu model (bsc#1136540)
- Fix vm migration is failing with input/output error when nfs server is disconnected (bsc#1119115)

This update was imported from the SUSE:SLE-15:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2019-2059</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00008.html</URL>
      <Description>E-Mail link for openSUSE-SU-2019:2059-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1079730</URL>
      <Description>SUSE Bug 1079730</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1098403</URL>
      <Description>SUSE Bug 1098403</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1111025</URL>
      <Description>SUSE Bug 1111025</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1119115</URL>
      <Description>SUSE Bug 1119115</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1134883</URL>
      <Description>SUSE Bug 1134883</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1135902</URL>
      <Description>SUSE Bug 1135902</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1136540</URL>
      <Description>SUSE Bug 1136540</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1136778</URL>
      <Description>SUSE Bug 1136778</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1140402</URL>
      <Description>SUSE Bug 1140402</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1143794</URL>
      <Description>SUSE Bug 1143794</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-12155/</URL>
      <Description>SUSE CVE CVE-2019-12155 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-13164/</URL>
      <Description>SUSE CVE CVE-2019-13164 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-14378/</URL>
      <Description>SUSE CVE CVE-2019-14378 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.0">
      <Branch Type="Product Name" Name="openSUSE Leap 15.0">
        <FullProductName ProductID="openSUSE Leap 15.0" CPE="cpe:/o:opensuse:leap:15.0">openSUSE Leap 15.0</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="qemu-2.11.2-lp150.7.25.1">
      <FullProductName ProductID="qemu-2.11.2-lp150.7.25.1">qemu-2.11.2-lp150.7.25.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-arm-2.11.2-lp150.7.25.1">
      <FullProductName ProductID="qemu-arm-2.11.2-lp150.7.25.1">qemu-arm-2.11.2-lp150.7.25.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-curl-2.11.2-lp150.7.25.1">
      <FullProductName ProductID="qemu-block-curl-2.11.2-lp150.7.25.1">qemu-block-curl-2.11.2-lp150.7.25.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-dmg-2.11.2-lp150.7.25.1">
      <FullProductName ProductID="qemu-block-dmg-2.11.2-lp150.7.25.1">qemu-block-dmg-2.11.2-lp150.7.25.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-gluster-2.11.2-lp150.7.25.1">
      <FullProductName ProductID="qemu-block-gluster-2.11.2-lp150.7.25.1">qemu-block-gluster-2.11.2-lp150.7.25.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-iscsi-2.11.2-lp150.7.25.1">
      <FullProductName ProductID="qemu-block-iscsi-2.11.2-lp150.7.25.1">qemu-block-iscsi-2.11.2-lp150.7.25.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-rbd-2.11.2-lp150.7.25.1">
      <FullProductName ProductID="qemu-block-rbd-2.11.2-lp150.7.25.1">qemu-block-rbd-2.11.2-lp150.7.25.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-ssh-2.11.2-lp150.7.25.1">
      <FullProductName ProductID="qemu-block-ssh-2.11.2-lp150.7.25.1">qemu-block-ssh-2.11.2-lp150.7.25.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-extra-2.11.2-lp150.7.25.1">
      <FullProductName ProductID="qemu-extra-2.11.2-lp150.7.25.1">qemu-extra-2.11.2-lp150.7.25.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-guest-agent-2.11.2-lp150.7.25.1">
      <FullProductName ProductID="qemu-guest-agent-2.11.2-lp150.7.25.1">qemu-guest-agent-2.11.2-lp150.7.25.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-ipxe-1.0.0+-lp150.7.25.1">
      <FullProductName ProductID="qemu-ipxe-1.0.0+-lp150.7.25.1">qemu-ipxe-1.0.0+-lp150.7.25.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-ksm-2.11.2-lp150.7.25.1">
      <FullProductName ProductID="qemu-ksm-2.11.2-lp150.7.25.1">qemu-ksm-2.11.2-lp150.7.25.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-kvm-2.11.2-lp150.7.25.1">
      <FullProductName ProductID="qemu-kvm-2.11.2-lp150.7.25.1">qemu-kvm-2.11.2-lp150.7.25.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-lang-2.11.2-lp150.7.25.1">
      <FullProductName ProductID="qemu-lang-2.11.2-lp150.7.25.1">qemu-lang-2.11.2-lp150.7.25.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-ppc-2.11.2-lp150.7.25.1">
      <FullProductName ProductID="qemu-ppc-2.11.2-lp150.7.25.1">qemu-ppc-2.11.2-lp150.7.25.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-s390-2.11.2-lp150.7.25.1">
      <FullProductName ProductID="qemu-s390-2.11.2-lp150.7.25.1">qemu-s390-2.11.2-lp150.7.25.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-seabios-1.11.0-lp150.7.25.1">
      <FullProductName ProductID="qemu-seabios-1.11.0-lp150.7.25.1">qemu-seabios-1.11.0-lp150.7.25.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-sgabios-8-lp150.7.25.1">
      <FullProductName ProductID="qemu-sgabios-8-lp150.7.25.1">qemu-sgabios-8-lp150.7.25.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-tools-2.11.2-lp150.7.25.1">
      <FullProductName ProductID="qemu-tools-2.11.2-lp150.7.25.1">qemu-tools-2.11.2-lp150.7.25.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-vgabios-1.11.0-lp150.7.25.1">
      <FullProductName ProductID="qemu-vgabios-1.11.0-lp150.7.25.1">qemu-vgabios-1.11.0-lp150.7.25.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-x86-2.11.2-lp150.7.25.1">
      <FullProductName ProductID="qemu-x86-2.11.2-lp150.7.25.1">qemu-x86-2.11.2-lp150.7.25.1</FullProductName>
    </Branch>
    <Relationship ProductReference="qemu-2.11.2-lp150.7.25.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-2.11.2-lp150.7.25.1">qemu-2.11.2-lp150.7.25.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-arm-2.11.2-lp150.7.25.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-arm-2.11.2-lp150.7.25.1">qemu-arm-2.11.2-lp150.7.25.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-curl-2.11.2-lp150.7.25.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-block-curl-2.11.2-lp150.7.25.1">qemu-block-curl-2.11.2-lp150.7.25.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-dmg-2.11.2-lp150.7.25.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-block-dmg-2.11.2-lp150.7.25.1">qemu-block-dmg-2.11.2-lp150.7.25.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-gluster-2.11.2-lp150.7.25.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-block-gluster-2.11.2-lp150.7.25.1">qemu-block-gluster-2.11.2-lp150.7.25.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-iscsi-2.11.2-lp150.7.25.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-block-iscsi-2.11.2-lp150.7.25.1">qemu-block-iscsi-2.11.2-lp150.7.25.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-rbd-2.11.2-lp150.7.25.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-block-rbd-2.11.2-lp150.7.25.1">qemu-block-rbd-2.11.2-lp150.7.25.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-ssh-2.11.2-lp150.7.25.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-block-ssh-2.11.2-lp150.7.25.1">qemu-block-ssh-2.11.2-lp150.7.25.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-extra-2.11.2-lp150.7.25.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-extra-2.11.2-lp150.7.25.1">qemu-extra-2.11.2-lp150.7.25.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-guest-agent-2.11.2-lp150.7.25.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-guest-agent-2.11.2-lp150.7.25.1">qemu-guest-agent-2.11.2-lp150.7.25.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-ipxe-1.0.0+-lp150.7.25.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-ipxe-1.0.0+-lp150.7.25.1">qemu-ipxe-1.0.0+-lp150.7.25.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-ksm-2.11.2-lp150.7.25.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-ksm-2.11.2-lp150.7.25.1">qemu-ksm-2.11.2-lp150.7.25.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-kvm-2.11.2-lp150.7.25.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-kvm-2.11.2-lp150.7.25.1">qemu-kvm-2.11.2-lp150.7.25.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-lang-2.11.2-lp150.7.25.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-lang-2.11.2-lp150.7.25.1">qemu-lang-2.11.2-lp150.7.25.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-ppc-2.11.2-lp150.7.25.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-ppc-2.11.2-lp150.7.25.1">qemu-ppc-2.11.2-lp150.7.25.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-s390-2.11.2-lp150.7.25.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-s390-2.11.2-lp150.7.25.1">qemu-s390-2.11.2-lp150.7.25.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-seabios-1.11.0-lp150.7.25.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-seabios-1.11.0-lp150.7.25.1">qemu-seabios-1.11.0-lp150.7.25.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-sgabios-8-lp150.7.25.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-sgabios-8-lp150.7.25.1">qemu-sgabios-8-lp150.7.25.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-tools-2.11.2-lp150.7.25.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-tools-2.11.2-lp150.7.25.1">qemu-tools-2.11.2-lp150.7.25.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-vgabios-1.11.0-lp150.7.25.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-vgabios-1.11.0-lp150.7.25.1">qemu-vgabios-1.11.0-lp150.7.25.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-x86-2.11.2-lp150.7.25.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-x86-2.11.2-lp150.7.25.1">qemu-x86-2.11.2-lp150.7.25.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">interface_release_resource in hw/display/qxl.c in QEMU 3.1.x through 4.0.0 has a NULL pointer dereference.</Note>
    </Notes>
    <CVE>CVE-2019-12155</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:qemu-2.11.2-lp150.7.25.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-arm-2.11.2-lp150.7.25.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-curl-2.11.2-lp150.7.25.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-dmg-2.11.2-lp150.7.25.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-gluster-2.11.2-lp150.7.25.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-iscsi-2.11.2-lp150.7.25.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-rbd-2.11.2-lp150.7.25.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-ssh-2.11.2-lp150.7.25.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-extra-2.11.2-lp150.7.25.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-guest-agent-2.11.2-lp150.7.25.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-ipxe-1.0.0+-lp150.7.25.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-ksm-2.11.2-lp150.7.25.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-kvm-2.11.2-lp150.7.25.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-lang-2.11.2-lp150.7.25.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-ppc-2.11.2-lp150.7.25.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-s390-2.11.2-lp150.7.25.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-seabios-1.11.0-lp150.7.25.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-sgabios-8-lp150.7.25.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-tools-2.11.2-lp150.7.25.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-vgabios-1.11.0-lp150.7.25.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-x86-2.11.2-lp150.7.25.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00008.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-12155.html</URL>
        <Description>CVE-2019-12155</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1135902</URL>
        <Description>SUSE Bug 1135902</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1135905</URL>
        <Description>SUSE Bug 1135905</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">qemu-bridge-helper.c in QEMU 3.1 and 4.0.0 does not ensure that a network interface name (obtained from bridge.conf or a --br=bridge option) is limited to the IFNAMSIZ size, which can lead to an ACL bypass.</Note>
    </Notes>
    <CVE>CVE-2019-13164</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:qemu-2.11.2-lp150.7.25.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-arm-2.11.2-lp150.7.25.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-curl-2.11.2-lp150.7.25.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-dmg-2.11.2-lp150.7.25.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-gluster-2.11.2-lp150.7.25.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-iscsi-2.11.2-lp150.7.25.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-rbd-2.11.2-lp150.7.25.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-ssh-2.11.2-lp150.7.25.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-extra-2.11.2-lp150.7.25.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-guest-agent-2.11.2-lp150.7.25.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-ipxe-1.0.0+-lp150.7.25.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-ksm-2.11.2-lp150.7.25.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-kvm-2.11.2-lp150.7.25.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-lang-2.11.2-lp150.7.25.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-ppc-2.11.2-lp150.7.25.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-s390-2.11.2-lp150.7.25.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-seabios-1.11.0-lp150.7.25.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-sgabios-8-lp150.7.25.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-tools-2.11.2-lp150.7.25.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-vgabios-1.11.0-lp150.7.25.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-x86-2.11.2-lp150.7.25.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00008.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-13164.html</URL>
        <Description>CVE-2019-13164</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1140402</URL>
        <Description>SUSE Bug 1140402</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ip_reass in ip_input.c in libslirp 4.0.0 has a heap-based buffer overflow via a large packet because it mishandles a case involving the first fragment.</Note>
    </Notes>
    <CVE>CVE-2019-14378</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:qemu-2.11.2-lp150.7.25.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-arm-2.11.2-lp150.7.25.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-curl-2.11.2-lp150.7.25.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-dmg-2.11.2-lp150.7.25.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-gluster-2.11.2-lp150.7.25.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-iscsi-2.11.2-lp150.7.25.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-rbd-2.11.2-lp150.7.25.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-ssh-2.11.2-lp150.7.25.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-extra-2.11.2-lp150.7.25.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-guest-agent-2.11.2-lp150.7.25.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-ipxe-1.0.0+-lp150.7.25.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-ksm-2.11.2-lp150.7.25.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-kvm-2.11.2-lp150.7.25.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-lang-2.11.2-lp150.7.25.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-ppc-2.11.2-lp150.7.25.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-s390-2.11.2-lp150.7.25.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-seabios-1.11.0-lp150.7.25.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-sgabios-8-lp150.7.25.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-tools-2.11.2-lp150.7.25.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-vgabios-1.11.0-lp150.7.25.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-x86-2.11.2-lp150.7.25.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00008.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-14378.html</URL>
        <Description>CVE-2019-14378</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1143794</URL>
        <Description>SUSE Bug 1143794</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1143797</URL>
        <Description>SUSE Bug 1143797</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
