<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for qemu</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2018:2402-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2018-08-17T06:57:34Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2018-08-17T06:57:34Z</InitialReleaseDate>
    <CurrentReleaseDate>2018-08-17T06:57:34Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for qemu</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for qemu to version 2.11.2 fixes the following issues:

Security issue fixed:

- CVE-2018-11806: Fix heap buffer overflow issue that can happen while reassembling fragmented datagrams (bsc#1096223).
- CVE-2018-3639: Mitigation functionality for Speculative Store Bypass issue in x86 (bsc#1087082).
- CVE-2018-7550: Fix out of bounds read and write memory access, potentially leading to code execution (bsc#1083291)

Bug fixes:

- bsc#1091695: SEV guest will not lauchh with  qemu-system-x86_64 version 2.11.1.
- bsc#1094898: qemu-guest-agent service doesn't work in version Leap 15.0.
- bsc#1094725: `virsh blockresize` does not work with Xen qdisks.
- bsc#1094913: QEMU crashes when starting a guest with more than 7.999TB.

This update was imported from the SUSE:SLE-15:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>http://lists.opensuse.org/opensuse-security-announce/2018-08/msg00060.html</URL>
      <Description>E-Mail link for openSUSE-SU-2018:2402-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.0">
      <Branch Type="Product Name" Name="openSUSE Leap 15.0">
        <FullProductName ProductID="openSUSE Leap 15.0">openSUSE Leap 15.0</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="qemu-2.11.2-lp150.7.6.1">
      <FullProductName ProductID="qemu-2.11.2-lp150.7.6.1">qemu-2.11.2-lp150.7.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-arm-2.11.2-lp150.7.6.1">
      <FullProductName ProductID="qemu-arm-2.11.2-lp150.7.6.1">qemu-arm-2.11.2-lp150.7.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-curl-2.11.2-lp150.7.6.1">
      <FullProductName ProductID="qemu-block-curl-2.11.2-lp150.7.6.1">qemu-block-curl-2.11.2-lp150.7.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-dmg-2.11.2-lp150.7.6.1">
      <FullProductName ProductID="qemu-block-dmg-2.11.2-lp150.7.6.1">qemu-block-dmg-2.11.2-lp150.7.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-gluster-2.11.2-lp150.7.6.1">
      <FullProductName ProductID="qemu-block-gluster-2.11.2-lp150.7.6.1">qemu-block-gluster-2.11.2-lp150.7.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-iscsi-2.11.2-lp150.7.6.1">
      <FullProductName ProductID="qemu-block-iscsi-2.11.2-lp150.7.6.1">qemu-block-iscsi-2.11.2-lp150.7.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-rbd-2.11.2-lp150.7.6.1">
      <FullProductName ProductID="qemu-block-rbd-2.11.2-lp150.7.6.1">qemu-block-rbd-2.11.2-lp150.7.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-ssh-2.11.2-lp150.7.6.1">
      <FullProductName ProductID="qemu-block-ssh-2.11.2-lp150.7.6.1">qemu-block-ssh-2.11.2-lp150.7.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-extra-2.11.2-lp150.7.6.1">
      <FullProductName ProductID="qemu-extra-2.11.2-lp150.7.6.1">qemu-extra-2.11.2-lp150.7.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-guest-agent-2.11.2-lp150.7.6.1">
      <FullProductName ProductID="qemu-guest-agent-2.11.2-lp150.7.6.1">qemu-guest-agent-2.11.2-lp150.7.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-ipxe-1.0.0-lp150.7.6.1">
      <FullProductName ProductID="qemu-ipxe-1.0.0-lp150.7.6.1">qemu-ipxe-1.0.0-lp150.7.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-ksm-2.11.2-lp150.7.6.1">
      <FullProductName ProductID="qemu-ksm-2.11.2-lp150.7.6.1">qemu-ksm-2.11.2-lp150.7.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-kvm-2.11.2-lp150.7.6.1">
      <FullProductName ProductID="qemu-kvm-2.11.2-lp150.7.6.1">qemu-kvm-2.11.2-lp150.7.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-lang-2.11.2-lp150.7.6.1">
      <FullProductName ProductID="qemu-lang-2.11.2-lp150.7.6.1">qemu-lang-2.11.2-lp150.7.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-linux-user-2.11.2-lp150.7.6.1">
      <FullProductName ProductID="qemu-linux-user-2.11.2-lp150.7.6.1">qemu-linux-user-2.11.2-lp150.7.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-ppc-2.11.2-lp150.7.6.1">
      <FullProductName ProductID="qemu-ppc-2.11.2-lp150.7.6.1">qemu-ppc-2.11.2-lp150.7.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-s390-2.11.2-lp150.7.6.1">
      <FullProductName ProductID="qemu-s390-2.11.2-lp150.7.6.1">qemu-s390-2.11.2-lp150.7.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-seabios-1.11.0-lp150.7.6.1">
      <FullProductName ProductID="qemu-seabios-1.11.0-lp150.7.6.1">qemu-seabios-1.11.0-lp150.7.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-sgabios-8-lp150.7.6.1">
      <FullProductName ProductID="qemu-sgabios-8-lp150.7.6.1">qemu-sgabios-8-lp150.7.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-testsuite-2.11.2-lp150.7.6.1">
      <FullProductName ProductID="qemu-testsuite-2.11.2-lp150.7.6.1">qemu-testsuite-2.11.2-lp150.7.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-tools-2.11.2-lp150.7.6.1">
      <FullProductName ProductID="qemu-tools-2.11.2-lp150.7.6.1">qemu-tools-2.11.2-lp150.7.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-vgabios-1.11.0-lp150.7.6.1">
      <FullProductName ProductID="qemu-vgabios-1.11.0-lp150.7.6.1">qemu-vgabios-1.11.0-lp150.7.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-x86-2.11.2-lp150.7.6.1">
      <FullProductName ProductID="qemu-x86-2.11.2-lp150.7.6.1">qemu-x86-2.11.2-lp150.7.6.1</FullProductName>
    </Branch>
    <Relationship ProductReference="qemu-2.11.2-lp150.7.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-2.11.2-lp150.7.6.1">qemu-2.11.2-lp150.7.6.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-arm-2.11.2-lp150.7.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-arm-2.11.2-lp150.7.6.1">qemu-arm-2.11.2-lp150.7.6.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-curl-2.11.2-lp150.7.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-block-curl-2.11.2-lp150.7.6.1">qemu-block-curl-2.11.2-lp150.7.6.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-dmg-2.11.2-lp150.7.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-block-dmg-2.11.2-lp150.7.6.1">qemu-block-dmg-2.11.2-lp150.7.6.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-gluster-2.11.2-lp150.7.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-block-gluster-2.11.2-lp150.7.6.1">qemu-block-gluster-2.11.2-lp150.7.6.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-iscsi-2.11.2-lp150.7.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-block-iscsi-2.11.2-lp150.7.6.1">qemu-block-iscsi-2.11.2-lp150.7.6.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-rbd-2.11.2-lp150.7.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-block-rbd-2.11.2-lp150.7.6.1">qemu-block-rbd-2.11.2-lp150.7.6.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-ssh-2.11.2-lp150.7.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-block-ssh-2.11.2-lp150.7.6.1">qemu-block-ssh-2.11.2-lp150.7.6.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-extra-2.11.2-lp150.7.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-extra-2.11.2-lp150.7.6.1">qemu-extra-2.11.2-lp150.7.6.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-guest-agent-2.11.2-lp150.7.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-guest-agent-2.11.2-lp150.7.6.1">qemu-guest-agent-2.11.2-lp150.7.6.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-ipxe-1.0.0-lp150.7.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-ipxe-1.0.0-lp150.7.6.1">qemu-ipxe-1.0.0-lp150.7.6.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-ksm-2.11.2-lp150.7.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-ksm-2.11.2-lp150.7.6.1">qemu-ksm-2.11.2-lp150.7.6.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-kvm-2.11.2-lp150.7.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-kvm-2.11.2-lp150.7.6.1">qemu-kvm-2.11.2-lp150.7.6.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-lang-2.11.2-lp150.7.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-lang-2.11.2-lp150.7.6.1">qemu-lang-2.11.2-lp150.7.6.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-linux-user-2.11.2-lp150.7.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-linux-user-2.11.2-lp150.7.6.1">qemu-linux-user-2.11.2-lp150.7.6.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-ppc-2.11.2-lp150.7.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-ppc-2.11.2-lp150.7.6.1">qemu-ppc-2.11.2-lp150.7.6.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-s390-2.11.2-lp150.7.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-s390-2.11.2-lp150.7.6.1">qemu-s390-2.11.2-lp150.7.6.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-seabios-1.11.0-lp150.7.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-seabios-1.11.0-lp150.7.6.1">qemu-seabios-1.11.0-lp150.7.6.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-sgabios-8-lp150.7.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-sgabios-8-lp150.7.6.1">qemu-sgabios-8-lp150.7.6.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-testsuite-2.11.2-lp150.7.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-testsuite-2.11.2-lp150.7.6.1">qemu-testsuite-2.11.2-lp150.7.6.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-tools-2.11.2-lp150.7.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-tools-2.11.2-lp150.7.6.1">qemu-tools-2.11.2-lp150.7.6.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-vgabios-1.11.0-lp150.7.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-vgabios-1.11.0-lp150.7.6.1">qemu-vgabios-1.11.0-lp150.7.6.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-x86-2.11.2-lp150.7.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-x86-2.11.2-lp150.7.6.1">qemu-x86-2.11.2-lp150.7.6.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">m_cat in slirp/mbuf.c in Qemu has a heap-based buffer overflow via incoming fragmented datagrams.</Note>
    </Notes>
    <CVE>CVE-2018-11806</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:qemu-2.11.2-lp150.7.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-arm-2.11.2-lp150.7.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-curl-2.11.2-lp150.7.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-dmg-2.11.2-lp150.7.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-gluster-2.11.2-lp150.7.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-iscsi-2.11.2-lp150.7.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-rbd-2.11.2-lp150.7.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-ssh-2.11.2-lp150.7.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-extra-2.11.2-lp150.7.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-guest-agent-2.11.2-lp150.7.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-ipxe-1.0.0-lp150.7.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-ksm-2.11.2-lp150.7.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-kvm-2.11.2-lp150.7.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-lang-2.11.2-lp150.7.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-linux-user-2.11.2-lp150.7.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-ppc-2.11.2-lp150.7.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-s390-2.11.2-lp150.7.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-seabios-1.11.0-lp150.7.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-sgabios-8-lp150.7.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-testsuite-2.11.2-lp150.7.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-tools-2.11.2-lp150.7.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-vgabios-1.11.0-lp150.7.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-x86-2.11.2-lp150.7.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-08/msg00060.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-11806.html</URL>
        <Description>CVE-2018-11806</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1096223</URL>
        <Description>SUSE Bug 1096223</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1096224</URL>
        <Description>SUSE Bug 1096224</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.</Note>
    </Notes>
    <CVE>CVE-2018-3639</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:qemu-2.11.2-lp150.7.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-arm-2.11.2-lp150.7.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-curl-2.11.2-lp150.7.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-dmg-2.11.2-lp150.7.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-gluster-2.11.2-lp150.7.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-iscsi-2.11.2-lp150.7.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-rbd-2.11.2-lp150.7.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-ssh-2.11.2-lp150.7.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-extra-2.11.2-lp150.7.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-guest-agent-2.11.2-lp150.7.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-ipxe-1.0.0-lp150.7.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-ksm-2.11.2-lp150.7.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-kvm-2.11.2-lp150.7.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-lang-2.11.2-lp150.7.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-linux-user-2.11.2-lp150.7.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-ppc-2.11.2-lp150.7.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-s390-2.11.2-lp150.7.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-seabios-1.11.0-lp150.7.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-sgabios-8-lp150.7.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-testsuite-2.11.2-lp150.7.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-tools-2.11.2-lp150.7.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-vgabios-1.11.0-lp150.7.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-x86-2.11.2-lp150.7.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-08/msg00060.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3639.html</URL>
        <Description>CVE-2018-3639</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/0</URL>
        <Description>SUSE Bug 0</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1074701</URL>
        <Description>SUSE Bug 1074701</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1085235</URL>
        <Description>SUSE Bug 1085235</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1085308</URL>
        <Description>SUSE Bug 1085308</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087078</URL>
        <Description>SUSE Bug 1087078</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087082</URL>
        <Description>SUSE Bug 1087082</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1094912</URL>
        <Description>SUSE Bug 1094912</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1100394</URL>
        <Description>SUSE Bug 1100394</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1102640</URL>
        <Description>SUSE Bug 1102640</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1105412</URL>
        <Description>SUSE Bug 1105412</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1113769</URL>
        <Description>SUSE Bug 1113769</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The load_multiboot function in hw/i386/multiboot.c in Quick Emulator (aka QEMU) allows local guest OS users to execute arbitrary code on the QEMU host via a mh_load_end_addr value greater than mh_bss_end_addr, which triggers an out-of-bounds read or write memory access.</Note>
    </Notes>
    <CVE>CVE-2018-7550</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:qemu-2.11.2-lp150.7.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-arm-2.11.2-lp150.7.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-curl-2.11.2-lp150.7.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-dmg-2.11.2-lp150.7.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-gluster-2.11.2-lp150.7.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-iscsi-2.11.2-lp150.7.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-rbd-2.11.2-lp150.7.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-ssh-2.11.2-lp150.7.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-extra-2.11.2-lp150.7.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-guest-agent-2.11.2-lp150.7.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-ipxe-1.0.0-lp150.7.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-ksm-2.11.2-lp150.7.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-kvm-2.11.2-lp150.7.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-lang-2.11.2-lp150.7.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-linux-user-2.11.2-lp150.7.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-ppc-2.11.2-lp150.7.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-s390-2.11.2-lp150.7.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-seabios-1.11.0-lp150.7.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-sgabios-8-lp150.7.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-testsuite-2.11.2-lp150.7.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-tools-2.11.2-lp150.7.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-vgabios-1.11.0-lp150.7.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-x86-2.11.2-lp150.7.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-08/msg00060.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-7550.html</URL>
        <Description>CVE-2018-7550</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1083291</URL>
        <Description>SUSE Bug 1083291</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1083292</URL>
        <Description>SUSE Bug 1083292</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
