<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for qemu</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2018:3973-2</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2019-04-27T15:51:47Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2019-04-27T15:51:47Z</InitialReleaseDate>
    <CurrentReleaseDate>2019-04-27T15:51:47Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for qemu</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for qemu fixes the following issues:

Security issues fixed:

- CVE-2018-10839: Fixed NE2000 NIC emulation support that is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS (bsc#1110910).
- CVE-2018-15746: Fixed qemu-seccomp.c that might allow local OS guest users to cause a denial of service (guest crash) by leveraging mishandling of the seccomp policy for threads other than the main thread (bsc#1106222).
- CVE-2018-17958: Fixed a Buffer Overflow in rtl8139_do_receive in hw/net/rtl8139.c because an incorrect integer data type is used (bsc#1111006).
- CVE-2018-17962: Fixed a Buffer Overflow in pcnet_receive in hw/net/pcnet.c because an incorrect integer data type is used (bsc#1111010).
- CVE-2018-17963: Fixed qemu_deliver_packet_iov in net/net.c that accepts packet sizes greater than INT_MAX, which allows attackers to cause a denial of service or possibly have unspecified other impact. (bsc#1111013)
- CVE-2018-18849: Fixed an out of bounds memory access issue that was found in the LSI53C895A SCSI Host Bus Adapter emulation while writing a message in lsi_do_msgin. It could occur during migration if the 'msg_len' field has an invalid value. A user/process could use this flaw to crash the Qemu process resulting in DoS (bsc#1114422).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-SLE-SAP-12-SP1-2019-1077</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20183973-2/</URL>
      <Description>Link for SUSE-SU-2018:3973-2</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2019-April/005395.html</URL>
      <Description>E-Mail link for SUSE-SU-2018:3973-2</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1106222</URL>
      <Description>SUSE Bug 1106222</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1110910</URL>
      <Description>SUSE Bug 1110910</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1111006</URL>
      <Description>SUSE Bug 1111006</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1111010</URL>
      <Description>SUSE Bug 1111010</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1111013</URL>
      <Description>SUSE Bug 1111013</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1114422</URL>
      <Description>SUSE Bug 1114422</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-10839/</URL>
      <Description>SUSE CVE CVE-2018-10839 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-15746/</URL>
      <Description>SUSE CVE CVE-2018-15746 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-17958/</URL>
      <Description>SUSE CVE CVE-2018-17958 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-17962/</URL>
      <Description>SUSE CVE CVE-2018-17962 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-17963/</URL>
      <Description>SUSE CVE CVE-2018-17963 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-18849/</URL>
      <Description>SUSE CVE CVE-2018-18849 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP1" CPE="cpe:/o:suse:sles_sap:12:sp1">SUSE Linux Enterprise Server for SAP Applications 12 SP1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="qemu-2.3.1-33.17.1">
      <FullProductName ProductID="qemu-2.3.1-33.17.1">qemu-2.3.1-33.17.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-curl-2.3.1-33.17.1">
      <FullProductName ProductID="qemu-block-curl-2.3.1-33.17.1">qemu-block-curl-2.3.1-33.17.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-rbd-2.3.1-33.17.1">
      <FullProductName ProductID="qemu-block-rbd-2.3.1-33.17.1">qemu-block-rbd-2.3.1-33.17.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-guest-agent-2.3.1-33.17.1">
      <FullProductName ProductID="qemu-guest-agent-2.3.1-33.17.1">qemu-guest-agent-2.3.1-33.17.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-ipxe-1.0.0-33.17.1">
      <FullProductName ProductID="qemu-ipxe-1.0.0-33.17.1">qemu-ipxe-1.0.0-33.17.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-kvm-2.3.1-33.17.1">
      <FullProductName ProductID="qemu-kvm-2.3.1-33.17.1">qemu-kvm-2.3.1-33.17.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-lang-2.3.1-33.17.1">
      <FullProductName ProductID="qemu-lang-2.3.1-33.17.1">qemu-lang-2.3.1-33.17.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-seabios-1.8.1-33.17.1">
      <FullProductName ProductID="qemu-seabios-1.8.1-33.17.1">qemu-seabios-1.8.1-33.17.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-sgabios-8-33.17.1">
      <FullProductName ProductID="qemu-sgabios-8-33.17.1">qemu-sgabios-8-33.17.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-tools-2.3.1-33.17.1">
      <FullProductName ProductID="qemu-tools-2.3.1-33.17.1">qemu-tools-2.3.1-33.17.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-vgabios-1.8.1-33.17.1">
      <FullProductName ProductID="qemu-vgabios-1.8.1-33.17.1">qemu-vgabios-1.8.1-33.17.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-x86-2.3.1-33.17.1">
      <FullProductName ProductID="qemu-x86-2.3.1-33.17.1">qemu-x86-2.3.1-33.17.1</FullProductName>
    </Branch>
    <Relationship ProductReference="qemu-2.3.1-33.17.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-33.17.1">qemu-2.3.1-33.17.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-curl-2.3.1-33.17.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-33.17.1">qemu-block-curl-2.3.1-33.17.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-rbd-2.3.1-33.17.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-33.17.1">qemu-block-rbd-2.3.1-33.17.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-guest-agent-2.3.1-33.17.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-33.17.1">qemu-guest-agent-2.3.1-33.17.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-ipxe-1.0.0-33.17.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-33.17.1">qemu-ipxe-1.0.0-33.17.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-kvm-2.3.1-33.17.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-33.17.1">qemu-kvm-2.3.1-33.17.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-lang-2.3.1-33.17.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-33.17.1">qemu-lang-2.3.1-33.17.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-seabios-1.8.1-33.17.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-33.17.1">qemu-seabios-1.8.1-33.17.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-sgabios-8-33.17.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-33.17.1">qemu-sgabios-8-33.17.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-tools-2.3.1-33.17.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-33.17.1">qemu-tools-2.3.1-33.17.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-vgabios-1.8.1-33.17.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-33.17.1">qemu-vgabios-1.8.1-33.17.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-x86-2.3.1-33.17.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-33.17.1">qemu-x86-2.3.1-33.17.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP1</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Qemu emulator &lt;= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS.</Note>
    </Notes>
    <CVE>CVE-2018-10839</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-33.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-33.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-33.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-33.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-33.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-33.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-33.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-33.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-33.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-33.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-33.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-33.17.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20183973-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-10839.html</URL>
        <Description>CVE-2018-10839</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1110910</URL>
        <Description>SUSE Bug 1110910</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1110924</URL>
        <Description>SUSE Bug 1110924</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">qemu-seccomp.c in QEMU might allow local OS guest users to cause a denial of service (guest crash) by leveraging mishandling of the seccomp policy for threads other than the main thread.</Note>
    </Notes>
    <CVE>CVE-2018-15746</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-33.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-33.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-33.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-33.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-33.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-33.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-33.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-33.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-33.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-33.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-33.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-33.17.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20183973-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-15746.html</URL>
        <Description>CVE-2018-15746</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1106222</URL>
        <Description>SUSE Bug 1106222</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Qemu has a Buffer Overflow in rtl8139_do_receive in hw/net/rtl8139.c because an incorrect integer data type is used.</Note>
    </Notes>
    <CVE>CVE-2018-17958</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-33.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-33.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-33.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-33.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-33.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-33.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-33.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-33.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-33.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-33.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-33.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-33.17.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20183973-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-17958.html</URL>
        <Description>CVE-2018-17958</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111006</URL>
        <Description>SUSE Bug 1111006</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111007</URL>
        <Description>SUSE Bug 1111007</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Qemu has a Buffer Overflow in pcnet_receive in hw/net/pcnet.c because an incorrect integer data type is used.</Note>
    </Notes>
    <CVE>CVE-2018-17962</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-33.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-33.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-33.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-33.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-33.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-33.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-33.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-33.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-33.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-33.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-33.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-33.17.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20183973-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-17962.html</URL>
        <Description>CVE-2018-17962</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111010</URL>
        <Description>SUSE Bug 1111010</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111011</URL>
        <Description>SUSE Bug 1111011</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">qemu_deliver_packet_iov in net/net.c in Qemu accepts packet sizes greater than INT_MAX, which allows attackers to cause a denial of service or possibly have unspecified other impact.</Note>
    </Notes>
    <CVE>CVE-2018-17963</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-33.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-33.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-33.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-33.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-33.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-33.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-33.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-33.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-33.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-33.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-33.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-33.17.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20183973-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-17963.html</URL>
        <Description>CVE-2018-17963</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111013</URL>
        <Description>SUSE Bug 1111013</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111014</URL>
        <Description>SUSE Bug 1111014</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Qemu 3.0.0, lsi_do_msgin in hw/scsi/lsi53c895a.c allows out-of-bounds access by triggering an invalid msg_len value.</Note>
    </Notes>
    <CVE>CVE-2018-18849</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-33.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-33.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-33.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-33.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-33.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-33.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-33.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-33.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-33.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-33.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-33.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-33.17.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20183973-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-18849.html</URL>
        <Description>CVE-2018-18849</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1114422</URL>
        <Description>SUSE Bug 1114422</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1114423</URL>
        <Description>SUSE Bug 1114423</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
