<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for qemu</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2019:1074-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2019-03-28T16:31:53Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2019-03-28T16:31:53Z</InitialReleaseDate>
    <CurrentReleaseDate>2019-03-28T16:31:53Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for qemu</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for qemu fixes the following issues:

Security vulnerabilities addressed:

- CVE-2019-6778: Fixed an out-of-bounds access in slirp (bsc#1123156)
- CVE-2018-16872: Fixed a host security vulnerability related to handling symlinks in usb-mtp (bsc#1119493)
- CVE-2018-19489: Fixed a Denial-of-Service in virtfs (bsc#1117275)
- CVE-2018-19364: Fixed an use-after-free vulnerability if virtfs interface is deliberately abused (bsc#1116717)
- CVE-2018-18954: Fixed an out-of-bounds access performing PowerNV memory operations (bsc#1114957)
- CVE-2017-13673: Fixed a reachable assert failure during during display update (bsc#1056386)
- CVE-2017-13672: Fixed an out-of-bounds read access during display update (bsc#1056334)
- CVE-2018-7858: Fixed an out-of-bounds access in cirrus when updating vga display allowing for Denial-of-Service (bsc#1084604)

Other bug fixes and changes:

- Fix pwrite64/pread64/write to return 0 over -1 for a zero length NULL buffer in qemu (bsc#1121600)
- Fix bad guest time after migration (bsc#1113231)

This update was imported from the SUSE:SLE-12-SP3:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00042.html</URL>
      <Description>E-Mail link for openSUSE-SU-2019:1074-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.3">
      <Branch Type="Product Name" Name="openSUSE Leap 42.3">
        <FullProductName ProductID="openSUSE Leap 42.3">openSUSE Leap 42.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="qemu-2.9.1-56.1">
      <FullProductName ProductID="qemu-2.9.1-56.1">qemu-2.9.1-56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-arm-2.9.1-56.1">
      <FullProductName ProductID="qemu-arm-2.9.1-56.1">qemu-arm-2.9.1-56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-curl-2.9.1-56.1">
      <FullProductName ProductID="qemu-block-curl-2.9.1-56.1">qemu-block-curl-2.9.1-56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-dmg-2.9.1-56.1">
      <FullProductName ProductID="qemu-block-dmg-2.9.1-56.1">qemu-block-dmg-2.9.1-56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-iscsi-2.9.1-56.1">
      <FullProductName ProductID="qemu-block-iscsi-2.9.1-56.1">qemu-block-iscsi-2.9.1-56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-rbd-2.9.1-56.1">
      <FullProductName ProductID="qemu-block-rbd-2.9.1-56.1">qemu-block-rbd-2.9.1-56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-ssh-2.9.1-56.1">
      <FullProductName ProductID="qemu-block-ssh-2.9.1-56.1">qemu-block-ssh-2.9.1-56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-extra-2.9.1-56.1">
      <FullProductName ProductID="qemu-extra-2.9.1-56.1">qemu-extra-2.9.1-56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-guest-agent-2.9.1-56.1">
      <FullProductName ProductID="qemu-guest-agent-2.9.1-56.1">qemu-guest-agent-2.9.1-56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-ipxe-1.0.0+-56.1">
      <FullProductName ProductID="qemu-ipxe-1.0.0+-56.1">qemu-ipxe-1.0.0+-56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-ksm-2.9.1-56.1">
      <FullProductName ProductID="qemu-ksm-2.9.1-56.1">qemu-ksm-2.9.1-56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-kvm-2.9.1-56.1">
      <FullProductName ProductID="qemu-kvm-2.9.1-56.1">qemu-kvm-2.9.1-56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-lang-2.9.1-56.1">
      <FullProductName ProductID="qemu-lang-2.9.1-56.1">qemu-lang-2.9.1-56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-linux-user-2.9.1-56.1">
      <FullProductName ProductID="qemu-linux-user-2.9.1-56.1">qemu-linux-user-2.9.1-56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-ppc-2.9.1-56.1">
      <FullProductName ProductID="qemu-ppc-2.9.1-56.1">qemu-ppc-2.9.1-56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-s390-2.9.1-56.1">
      <FullProductName ProductID="qemu-s390-2.9.1-56.1">qemu-s390-2.9.1-56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-seabios-1.10.2-56.1">
      <FullProductName ProductID="qemu-seabios-1.10.2-56.1">qemu-seabios-1.10.2-56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-sgabios-8-56.1">
      <FullProductName ProductID="qemu-sgabios-8-56.1">qemu-sgabios-8-56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-testsuite-2.9.1-56.2">
      <FullProductName ProductID="qemu-testsuite-2.9.1-56.2">qemu-testsuite-2.9.1-56.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-tools-2.9.1-56.1">
      <FullProductName ProductID="qemu-tools-2.9.1-56.1">qemu-tools-2.9.1-56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-vgabios-1.10.2-56.1">
      <FullProductName ProductID="qemu-vgabios-1.10.2-56.1">qemu-vgabios-1.10.2-56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-x86-2.9.1-56.1">
      <FullProductName ProductID="qemu-x86-2.9.1-56.1">qemu-x86-2.9.1-56.1</FullProductName>
    </Branch>
    <Relationship ProductReference="qemu-2.9.1-56.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:qemu-2.9.1-56.1">qemu-2.9.1-56.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-arm-2.9.1-56.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:qemu-arm-2.9.1-56.1">qemu-arm-2.9.1-56.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-curl-2.9.1-56.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:qemu-block-curl-2.9.1-56.1">qemu-block-curl-2.9.1-56.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-dmg-2.9.1-56.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:qemu-block-dmg-2.9.1-56.1">qemu-block-dmg-2.9.1-56.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-iscsi-2.9.1-56.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:qemu-block-iscsi-2.9.1-56.1">qemu-block-iscsi-2.9.1-56.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-rbd-2.9.1-56.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:qemu-block-rbd-2.9.1-56.1">qemu-block-rbd-2.9.1-56.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-ssh-2.9.1-56.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:qemu-block-ssh-2.9.1-56.1">qemu-block-ssh-2.9.1-56.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-extra-2.9.1-56.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:qemu-extra-2.9.1-56.1">qemu-extra-2.9.1-56.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-guest-agent-2.9.1-56.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:qemu-guest-agent-2.9.1-56.1">qemu-guest-agent-2.9.1-56.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-ipxe-1.0.0+-56.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:qemu-ipxe-1.0.0+-56.1">qemu-ipxe-1.0.0+-56.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-ksm-2.9.1-56.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:qemu-ksm-2.9.1-56.1">qemu-ksm-2.9.1-56.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-kvm-2.9.1-56.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:qemu-kvm-2.9.1-56.1">qemu-kvm-2.9.1-56.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-lang-2.9.1-56.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:qemu-lang-2.9.1-56.1">qemu-lang-2.9.1-56.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-linux-user-2.9.1-56.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:qemu-linux-user-2.9.1-56.1">qemu-linux-user-2.9.1-56.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-ppc-2.9.1-56.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:qemu-ppc-2.9.1-56.1">qemu-ppc-2.9.1-56.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-s390-2.9.1-56.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:qemu-s390-2.9.1-56.1">qemu-s390-2.9.1-56.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-seabios-1.10.2-56.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:qemu-seabios-1.10.2-56.1">qemu-seabios-1.10.2-56.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-sgabios-8-56.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:qemu-sgabios-8-56.1">qemu-sgabios-8-56.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-testsuite-2.9.1-56.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:qemu-testsuite-2.9.1-56.2">qemu-testsuite-2.9.1-56.2 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-tools-2.9.1-56.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:qemu-tools-2.9.1-56.1">qemu-tools-2.9.1-56.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-vgabios-1.10.2-56.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:qemu-vgabios-1.10.2-56.1">qemu-vgabios-1.10.2-56.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-x86-2.9.1-56.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:qemu-x86-2.9.1-56.1">qemu-x86-2.9.1-56.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">QEMU (aka Quick Emulator), when built with the VGA display emulator support, allows local guest OS privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) via vectors involving display update.</Note>
    </Notes>
    <CVE>CVE-2017-13672</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:qemu-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-arm-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-block-curl-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-block-dmg-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-block-iscsi-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-block-rbd-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-block-ssh-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-extra-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-guest-agent-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-ipxe-1.0.0+-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-ksm-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-kvm-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-lang-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-linux-user-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-ppc-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-s390-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-seabios-1.10.2-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-sgabios-8-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-testsuite-2.9.1-56.2</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-tools-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-vgabios-1.10.2-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-x86-2.9.1-56.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.3</BaseScore>
        <Vector>AV:A/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00042.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13672.html</URL>
        <Description>CVE-2017-13672</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1056334</URL>
        <Description>SUSE Bug 1056334</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1056336</URL>
        <Description>SUSE Bug 1056336</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1084604</URL>
        <Description>SUSE Bug 1084604</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The vga display update in mis-calculated the region for the dirty bitmap snapshot in case split screen mode is used causing a denial of service (assertion failure) in the cpu_physical_memory_snapshot_get_dirty function.</Note>
    </Notes>
    <CVE>CVE-2017-13673</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:qemu-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-arm-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-block-curl-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-block-dmg-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-block-iscsi-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-block-rbd-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-block-ssh-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-extra-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-guest-agent-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-ipxe-1.0.0+-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-ksm-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-kvm-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-lang-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-linux-user-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-ppc-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-s390-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-seabios-1.10.2-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-sgabios-8-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-testsuite-2.9.1-56.2</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-tools-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-vgabios-1.10.2-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-x86-2.9.1-56.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.3</BaseScore>
        <Vector>AV:A/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00042.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13673.html</URL>
        <Description>CVE-2017-13673</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1056386</URL>
        <Description>SUSE Bug 1056386</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1056387</URL>
        <Description>SUSE Bug 1056387</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1084604</URL>
        <Description>SUSE Bug 1084604</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in qemu Media Transfer Protocol (MTP). The code opening files in usb_mtp_get_object and usb_mtp_get_partial_object and directories in usb_mtp_object_readdir doesn't consider that the underlying filesystem may have changed since the time lstat(2) was called in usb_mtp_object_alloc, a classical TOCTTOU problem. An attacker with write access to the host filesystem shared with a guest can use this property to navigate the host filesystem in the context of the QEMU process and read any file the QEMU process has access to. Access to the filesystem may be local or via a network share protocol such as CIFS.</Note>
    </Notes>
    <CVE>CVE-2018-16872</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:qemu-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-arm-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-block-curl-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-block-dmg-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-block-iscsi-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-block-rbd-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-block-ssh-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-extra-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-guest-agent-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-ipxe-1.0.0+-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-ksm-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-kvm-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-lang-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-linux-user-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-ppc-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-s390-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-seabios-1.10.2-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-sgabios-8-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-testsuite-2.9.1-56.2</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-tools-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-vgabios-1.10.2-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-x86-2.9.1-56.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00042.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-16872.html</URL>
        <Description>CVE-2018-16872</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1119493</URL>
        <Description>SUSE Bug 1119493</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1119494</URL>
        <Description>SUSE Bug 1119494</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The pnv_lpc_do_eccb function in hw/ppc/pnv_lpc.c in Qemu before 3.1 allows out-of-bounds write or read access to PowerNV memory.</Note>
    </Notes>
    <CVE>CVE-2018-18954</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:qemu-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-arm-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-block-curl-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-block-dmg-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-block-iscsi-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-block-rbd-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-block-ssh-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-extra-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-guest-agent-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-ipxe-1.0.0+-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-ksm-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-kvm-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-lang-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-linux-user-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-ppc-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-s390-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-seabios-1.10.2-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-sgabios-8-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-testsuite-2.9.1-56.2</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-tools-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-vgabios-1.10.2-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-x86-2.9.1-56.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00042.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-18954.html</URL>
        <Description>CVE-2018-18954</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1114957</URL>
        <Description>SUSE Bug 1114957</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">hw/9pfs/cofile.c and hw/9pfs/9p.c in QEMU can modify an fid path while it is being accessed by a second thread, leading to (for example) a use-after-free outcome.</Note>
    </Notes>
    <CVE>CVE-2018-19364</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:qemu-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-arm-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-block-curl-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-block-dmg-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-block-iscsi-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-block-rbd-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-block-ssh-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-extra-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-guest-agent-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-ipxe-1.0.0+-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-ksm-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-kvm-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-lang-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-linux-user-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-ppc-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-s390-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-seabios-1.10.2-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-sgabios-8-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-testsuite-2.9.1-56.2</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-tools-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-vgabios-1.10.2-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-x86-2.9.1-56.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00042.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-19364.html</URL>
        <Description>CVE-2018-19364</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116717</URL>
        <Description>SUSE Bug 1116717</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116726</URL>
        <Description>SUSE Bug 1116726</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">v9fs_wstat in hw/9pfs/9p.c in QEMU allows guest OS users to cause a denial of service (crash) because of a race condition during file renaming.</Note>
    </Notes>
    <CVE>CVE-2018-19489</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:qemu-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-arm-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-block-curl-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-block-dmg-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-block-iscsi-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-block-rbd-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-block-ssh-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-extra-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-guest-agent-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-ipxe-1.0.0+-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-ksm-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-kvm-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-lang-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-linux-user-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-ppc-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-s390-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-seabios-1.10.2-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-sgabios-8-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-testsuite-2.9.1-56.2</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-tools-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-vgabios-1.10.2-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-x86-2.9.1-56.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00042.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-19489.html</URL>
        <Description>CVE-2018-19489</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117275</URL>
        <Description>SUSE Bug 1117275</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117279</URL>
        <Description>SUSE Bug 1117279</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Quick Emulator (aka QEMU), when built with the Cirrus CLGD 54xx VGA Emulator support, allows local guest OS privileged users to cause a denial of service (out-of-bounds access and QEMU process crash) by leveraging incorrect region calculation when updating VGA display.</Note>
    </Notes>
    <CVE>CVE-2018-7858</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:qemu-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-arm-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-block-curl-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-block-dmg-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-block-iscsi-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-block-rbd-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-block-ssh-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-extra-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-guest-agent-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-ipxe-1.0.0+-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-ksm-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-kvm-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-lang-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-linux-user-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-ppc-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-s390-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-seabios-1.10.2-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-sgabios-8-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-testsuite-2.9.1-56.2</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-tools-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-vgabios-1.10.2-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-x86-2.9.1-56.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00042.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-7858.html</URL>
        <Description>CVE-2018-7858</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1084604</URL>
        <Description>SUSE Bug 1084604</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In QEMU 3.0.0, tcp_emu in slirp/tcp_subr.c has a heap-based buffer overflow.</Note>
    </Notes>
    <CVE>CVE-2019-6778</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:qemu-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-arm-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-block-curl-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-block-dmg-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-block-iscsi-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-block-rbd-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-block-ssh-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-extra-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-guest-agent-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-ipxe-1.0.0+-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-ksm-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-kvm-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-lang-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-linux-user-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-ppc-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-s390-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-seabios-1.10.2-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-sgabios-8-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-testsuite-2.9.1-56.2</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-tools-2.9.1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-vgabios-1.10.2-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-x86-2.9.1-56.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00042.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-6778.html</URL>
        <Description>CVE-2019-6778</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123156</URL>
        <Description>SUSE Bug 1123156</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123157</URL>
        <Description>SUSE Bug 1123157</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
