<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for qemu</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2019:2505-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2019-11-14T05:54:23Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2019-11-14T05:54:23Z</InitialReleaseDate>
    <CurrentReleaseDate>2019-11-14T05:54:23Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for qemu</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for qemu fixes the following issues:

- Patch queue updated from https://gitlab.suse.de/virtualization/qemu.git SLE15
- Fix use-after-free in slirp (CVE-2018-20126 bsc#1119991)
- Fix potential DOS in lsi scsi controller emulation (CVE-2019-12068 bsc#1146873)
- Expose taa-no 'feature', indicating CPU does not have the
  TSX Async Abort vulnerability. (CVE-2019-11135 bsc#1152506)
- Expose pschange-mc-no 'feature', indicating CPU does not have
  the page size change machine check vulnerability (CVE-2018-12207 bsc#1155812)

This update was imported from the SUSE:SLE-15:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2019-2505</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YGK33QVVCMOM3HRWRJ6FPIFV2JBB4XDB/#YGK33QVVCMOM3HRWRJ6FPIFV2JBB4XDB</URL>
      <Description>E-Mail link for openSUSE-SU-2019:2505-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1119991</URL>
      <Description>SUSE Bug 1119991</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1146873</URL>
      <Description>SUSE Bug 1146873</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1152506</URL>
      <Description>SUSE Bug 1152506</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1155812</URL>
      <Description>SUSE Bug 1155812</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12207/</URL>
      <Description>SUSE CVE CVE-2018-12207 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-20126/</URL>
      <Description>SUSE CVE CVE-2018-20126 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-11135/</URL>
      <Description>SUSE CVE CVE-2019-11135 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-12068/</URL>
      <Description>SUSE CVE CVE-2019-12068 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.0">
      <Branch Type="Product Name" Name="openSUSE Leap 15.0">
        <FullProductName ProductID="openSUSE Leap 15.0" CPE="cpe:/o:opensuse:leap:15.0">openSUSE Leap 15.0</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="qemu-2.11.2-lp150.7.28.1">
      <FullProductName ProductID="qemu-2.11.2-lp150.7.28.1">qemu-2.11.2-lp150.7.28.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-arm-2.11.2-lp150.7.28.1">
      <FullProductName ProductID="qemu-arm-2.11.2-lp150.7.28.1">qemu-arm-2.11.2-lp150.7.28.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-curl-2.11.2-lp150.7.28.1">
      <FullProductName ProductID="qemu-block-curl-2.11.2-lp150.7.28.1">qemu-block-curl-2.11.2-lp150.7.28.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-dmg-2.11.2-lp150.7.28.1">
      <FullProductName ProductID="qemu-block-dmg-2.11.2-lp150.7.28.1">qemu-block-dmg-2.11.2-lp150.7.28.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-gluster-2.11.2-lp150.7.28.1">
      <FullProductName ProductID="qemu-block-gluster-2.11.2-lp150.7.28.1">qemu-block-gluster-2.11.2-lp150.7.28.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-iscsi-2.11.2-lp150.7.28.1">
      <FullProductName ProductID="qemu-block-iscsi-2.11.2-lp150.7.28.1">qemu-block-iscsi-2.11.2-lp150.7.28.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-rbd-2.11.2-lp150.7.28.1">
      <FullProductName ProductID="qemu-block-rbd-2.11.2-lp150.7.28.1">qemu-block-rbd-2.11.2-lp150.7.28.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-ssh-2.11.2-lp150.7.28.1">
      <FullProductName ProductID="qemu-block-ssh-2.11.2-lp150.7.28.1">qemu-block-ssh-2.11.2-lp150.7.28.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-extra-2.11.2-lp150.7.28.1">
      <FullProductName ProductID="qemu-extra-2.11.2-lp150.7.28.1">qemu-extra-2.11.2-lp150.7.28.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-guest-agent-2.11.2-lp150.7.28.1">
      <FullProductName ProductID="qemu-guest-agent-2.11.2-lp150.7.28.1">qemu-guest-agent-2.11.2-lp150.7.28.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-ipxe-1.0.0+-lp150.7.28.1">
      <FullProductName ProductID="qemu-ipxe-1.0.0+-lp150.7.28.1">qemu-ipxe-1.0.0+-lp150.7.28.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-ksm-2.11.2-lp150.7.28.1">
      <FullProductName ProductID="qemu-ksm-2.11.2-lp150.7.28.1">qemu-ksm-2.11.2-lp150.7.28.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-kvm-2.11.2-lp150.7.28.1">
      <FullProductName ProductID="qemu-kvm-2.11.2-lp150.7.28.1">qemu-kvm-2.11.2-lp150.7.28.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-lang-2.11.2-lp150.7.28.1">
      <FullProductName ProductID="qemu-lang-2.11.2-lp150.7.28.1">qemu-lang-2.11.2-lp150.7.28.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-ppc-2.11.2-lp150.7.28.1">
      <FullProductName ProductID="qemu-ppc-2.11.2-lp150.7.28.1">qemu-ppc-2.11.2-lp150.7.28.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-s390-2.11.2-lp150.7.28.1">
      <FullProductName ProductID="qemu-s390-2.11.2-lp150.7.28.1">qemu-s390-2.11.2-lp150.7.28.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-seabios-1.11.0-lp150.7.28.1">
      <FullProductName ProductID="qemu-seabios-1.11.0-lp150.7.28.1">qemu-seabios-1.11.0-lp150.7.28.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-sgabios-8-lp150.7.28.1">
      <FullProductName ProductID="qemu-sgabios-8-lp150.7.28.1">qemu-sgabios-8-lp150.7.28.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-tools-2.11.2-lp150.7.28.1">
      <FullProductName ProductID="qemu-tools-2.11.2-lp150.7.28.1">qemu-tools-2.11.2-lp150.7.28.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-vgabios-1.11.0-lp150.7.28.1">
      <FullProductName ProductID="qemu-vgabios-1.11.0-lp150.7.28.1">qemu-vgabios-1.11.0-lp150.7.28.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-x86-2.11.2-lp150.7.28.1">
      <FullProductName ProductID="qemu-x86-2.11.2-lp150.7.28.1">qemu-x86-2.11.2-lp150.7.28.1</FullProductName>
    </Branch>
    <Relationship ProductReference="qemu-2.11.2-lp150.7.28.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-2.11.2-lp150.7.28.1">qemu-2.11.2-lp150.7.28.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-arm-2.11.2-lp150.7.28.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-arm-2.11.2-lp150.7.28.1">qemu-arm-2.11.2-lp150.7.28.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-curl-2.11.2-lp150.7.28.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-block-curl-2.11.2-lp150.7.28.1">qemu-block-curl-2.11.2-lp150.7.28.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-dmg-2.11.2-lp150.7.28.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-block-dmg-2.11.2-lp150.7.28.1">qemu-block-dmg-2.11.2-lp150.7.28.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-gluster-2.11.2-lp150.7.28.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-block-gluster-2.11.2-lp150.7.28.1">qemu-block-gluster-2.11.2-lp150.7.28.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-iscsi-2.11.2-lp150.7.28.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-block-iscsi-2.11.2-lp150.7.28.1">qemu-block-iscsi-2.11.2-lp150.7.28.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-rbd-2.11.2-lp150.7.28.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-block-rbd-2.11.2-lp150.7.28.1">qemu-block-rbd-2.11.2-lp150.7.28.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-ssh-2.11.2-lp150.7.28.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-block-ssh-2.11.2-lp150.7.28.1">qemu-block-ssh-2.11.2-lp150.7.28.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-extra-2.11.2-lp150.7.28.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-extra-2.11.2-lp150.7.28.1">qemu-extra-2.11.2-lp150.7.28.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-guest-agent-2.11.2-lp150.7.28.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-guest-agent-2.11.2-lp150.7.28.1">qemu-guest-agent-2.11.2-lp150.7.28.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-ipxe-1.0.0+-lp150.7.28.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-ipxe-1.0.0+-lp150.7.28.1">qemu-ipxe-1.0.0+-lp150.7.28.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-ksm-2.11.2-lp150.7.28.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-ksm-2.11.2-lp150.7.28.1">qemu-ksm-2.11.2-lp150.7.28.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-kvm-2.11.2-lp150.7.28.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-kvm-2.11.2-lp150.7.28.1">qemu-kvm-2.11.2-lp150.7.28.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-lang-2.11.2-lp150.7.28.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-lang-2.11.2-lp150.7.28.1">qemu-lang-2.11.2-lp150.7.28.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-ppc-2.11.2-lp150.7.28.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-ppc-2.11.2-lp150.7.28.1">qemu-ppc-2.11.2-lp150.7.28.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-s390-2.11.2-lp150.7.28.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-s390-2.11.2-lp150.7.28.1">qemu-s390-2.11.2-lp150.7.28.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-seabios-1.11.0-lp150.7.28.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-seabios-1.11.0-lp150.7.28.1">qemu-seabios-1.11.0-lp150.7.28.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-sgabios-8-lp150.7.28.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-sgabios-8-lp150.7.28.1">qemu-sgabios-8-lp150.7.28.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-tools-2.11.2-lp150.7.28.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-tools-2.11.2-lp150.7.28.1">qemu-tools-2.11.2-lp150.7.28.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-vgabios-1.11.0-lp150.7.28.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-vgabios-1.11.0-lp150.7.28.1">qemu-vgabios-1.11.0-lp150.7.28.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-x86-2.11.2-lp150.7.28.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:qemu-x86-2.11.2-lp150.7.28.1">qemu-x86-2.11.2-lp150.7.28.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.</Note>
    </Notes>
    <CVE>CVE-2018-12207</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:qemu-2.11.2-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-arm-2.11.2-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-curl-2.11.2-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-dmg-2.11.2-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-gluster-2.11.2-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-iscsi-2.11.2-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-rbd-2.11.2-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-ssh-2.11.2-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-extra-2.11.2-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-guest-agent-2.11.2-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-ipxe-1.0.0+-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-ksm-2.11.2-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-kvm-2.11.2-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-lang-2.11.2-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-ppc-2.11.2-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-s390-2.11.2-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-seabios-1.11.0-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-sgabios-8-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-tools-2.11.2-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-vgabios-1.11.0-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-x86-2.11.2-lp150.7.28.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YGK33QVVCMOM3HRWRJ6FPIFV2JBB4XDB/#YGK33QVVCMOM3HRWRJ6FPIFV2JBB4XDB</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12207.html</URL>
        <Description>CVE-2018-12207</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117665</URL>
        <Description>SUSE Bug 1117665</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1139073</URL>
        <Description>SUSE Bug 1139073</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1152505</URL>
        <Description>SUSE Bug 1152505</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1155812</URL>
        <Description>SUSE Bug 1155812</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1155817</URL>
        <Description>SUSE Bug 1155817</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1155945</URL>
        <Description>SUSE Bug 1155945</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201877</URL>
        <Description>SUSE Bug 1201877</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">hw/rdma/vmw/pvrdma_cmd.c in QEMU allows create_cq and create_qp memory leaks because errors are mishandled.</Note>
    </Notes>
    <CVE>CVE-2018-20126</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:qemu-2.11.2-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-arm-2.11.2-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-curl-2.11.2-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-dmg-2.11.2-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-gluster-2.11.2-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-iscsi-2.11.2-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-rbd-2.11.2-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-ssh-2.11.2-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-extra-2.11.2-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-guest-agent-2.11.2-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-ipxe-1.0.0+-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-ksm-2.11.2-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-kvm-2.11.2-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-lang-2.11.2-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-ppc-2.11.2-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-s390-2.11.2-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-seabios-1.11.0-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-sgabios-8-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-tools-2.11.2-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-vgabios-1.11.0-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-x86-2.11.2-lp150.7.28.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YGK33QVVCMOM3HRWRJ6FPIFV2JBB4XDB/#YGK33QVVCMOM3HRWRJ6FPIFV2JBB4XDB</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-20126.html</URL>
        <Description>CVE-2018-20126</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1119991</URL>
        <Description>SUSE Bug 1119991</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.</Note>
    </Notes>
    <CVE>CVE-2019-11135</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:qemu-2.11.2-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-arm-2.11.2-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-curl-2.11.2-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-dmg-2.11.2-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-gluster-2.11.2-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-iscsi-2.11.2-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-rbd-2.11.2-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-ssh-2.11.2-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-extra-2.11.2-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-guest-agent-2.11.2-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-ipxe-1.0.0+-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-ksm-2.11.2-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-kvm-2.11.2-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-lang-2.11.2-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-ppc-2.11.2-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-s390-2.11.2-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-seabios-1.11.0-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-sgabios-8-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-tools-2.11.2-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-vgabios-1.11.0-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-x86-2.11.2-lp150.7.28.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YGK33QVVCMOM3HRWRJ6FPIFV2JBB4XDB/#YGK33QVVCMOM3HRWRJ6FPIFV2JBB4XDB</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-11135.html</URL>
        <Description>CVE-2019-11135</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1139073</URL>
        <Description>SUSE Bug 1139073</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1152497</URL>
        <Description>SUSE Bug 1152497</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1152505</URL>
        <Description>SUSE Bug 1152505</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1152506</URL>
        <Description>SUSE Bug 1152506</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1160120</URL>
        <Description>SUSE Bug 1160120</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201877</URL>
        <Description>SUSE Bug 1201877</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In QEMU 1:4.1-1, 1:2.1+dfsg-12+deb8u6, 1:2.8+dfsg-6+deb9u8, 1:3.1+dfsg-8~deb10u1, 1:3.1+dfsg-8+deb10u2, and 1:2.1+dfsg-12+deb8u12 (fixed), when executing script in lsi_execute_script(), the LSI scsi adapter emulator advances 's-&gt;dsp' index to read next opcode. This can lead to an infinite loop if the next opcode is empty. Move the existing loop exit after 10k iterations so that it covers no-op opcodes as well.</Note>
    </Notes>
    <CVE>CVE-2019-12068</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:qemu-2.11.2-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-arm-2.11.2-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-curl-2.11.2-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-dmg-2.11.2-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-gluster-2.11.2-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-iscsi-2.11.2-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-rbd-2.11.2-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-block-ssh-2.11.2-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-extra-2.11.2-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-guest-agent-2.11.2-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-ipxe-1.0.0+-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-ksm-2.11.2-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-kvm-2.11.2-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-lang-2.11.2-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-ppc-2.11.2-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-s390-2.11.2-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-seabios-1.11.0-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-sgabios-8-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-tools-2.11.2-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-vgabios-1.11.0-lp150.7.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:qemu-x86-2.11.2-lp150.7.28.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YGK33QVVCMOM3HRWRJ6FPIFV2JBB4XDB/#YGK33QVVCMOM3HRWRJ6FPIFV2JBB4XDB</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-12068.html</URL>
        <Description>CVE-2019-12068</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1146873</URL>
        <Description>SUSE Bug 1146873</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1146874</URL>
        <Description>SUSE Bug 1146874</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
