<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for qemu</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2018:3709-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2018-11-09T20:00:32Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2018-11-09T20:00:32Z</InitialReleaseDate>
    <CurrentReleaseDate>2018-11-09T20:00:32Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for qemu</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for qemu fixes the following issues:

These security issues were fixed:

- CVE-2018-12617: qmp_guest_file_read had an integer overflow that could have
  been exploited by sending a crafted QMP command (including guest-file-read with
  a large count value) to the agent via the listening socket causing DoS
  (bsc#1098735).
- CVE-2018-11806: Prevent heap-based buffer overflow via incoming fragmented
  datagrams (bsc#1096223).

With this release the mitigations for Spectre v4 are moved the the patches from
upstream (CVE-2018-3639, bsc#1092885).

This feature was added:

- Add support for block resize support for disks through the monitor (bsc#1094725).

This update was imported from the SUSE:SLE-12-SP3:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00013.html</URL>
      <Description>E-Mail link for openSUSE-SU-2018:3709-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.3">
      <Branch Type="Product Name" Name="openSUSE Leap 42.3">
        <FullProductName ProductID="openSUSE Leap 42.3">openSUSE Leap 42.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="qemu-2.9.1-47.1">
      <FullProductName ProductID="qemu-2.9.1-47.1">qemu-2.9.1-47.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-arm-2.9.1-47.1">
      <FullProductName ProductID="qemu-arm-2.9.1-47.1">qemu-arm-2.9.1-47.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-curl-2.9.1-47.1">
      <FullProductName ProductID="qemu-block-curl-2.9.1-47.1">qemu-block-curl-2.9.1-47.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-dmg-2.9.1-47.1">
      <FullProductName ProductID="qemu-block-dmg-2.9.1-47.1">qemu-block-dmg-2.9.1-47.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-iscsi-2.9.1-47.1">
      <FullProductName ProductID="qemu-block-iscsi-2.9.1-47.1">qemu-block-iscsi-2.9.1-47.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-rbd-2.9.1-47.1">
      <FullProductName ProductID="qemu-block-rbd-2.9.1-47.1">qemu-block-rbd-2.9.1-47.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-ssh-2.9.1-47.1">
      <FullProductName ProductID="qemu-block-ssh-2.9.1-47.1">qemu-block-ssh-2.9.1-47.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-extra-2.9.1-47.1">
      <FullProductName ProductID="qemu-extra-2.9.1-47.1">qemu-extra-2.9.1-47.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-guest-agent-2.9.1-47.1">
      <FullProductName ProductID="qemu-guest-agent-2.9.1-47.1">qemu-guest-agent-2.9.1-47.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-ipxe-1.0.0-47.1">
      <FullProductName ProductID="qemu-ipxe-1.0.0-47.1">qemu-ipxe-1.0.0-47.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-ksm-2.9.1-47.1">
      <FullProductName ProductID="qemu-ksm-2.9.1-47.1">qemu-ksm-2.9.1-47.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-kvm-2.9.1-47.1">
      <FullProductName ProductID="qemu-kvm-2.9.1-47.1">qemu-kvm-2.9.1-47.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-lang-2.9.1-47.1">
      <FullProductName ProductID="qemu-lang-2.9.1-47.1">qemu-lang-2.9.1-47.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-linux-user-2.9.1-47.1">
      <FullProductName ProductID="qemu-linux-user-2.9.1-47.1">qemu-linux-user-2.9.1-47.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-ppc-2.9.1-47.1">
      <FullProductName ProductID="qemu-ppc-2.9.1-47.1">qemu-ppc-2.9.1-47.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-s390-2.9.1-47.1">
      <FullProductName ProductID="qemu-s390-2.9.1-47.1">qemu-s390-2.9.1-47.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-seabios-1.10.2-47.1">
      <FullProductName ProductID="qemu-seabios-1.10.2-47.1">qemu-seabios-1.10.2-47.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-sgabios-8-47.1">
      <FullProductName ProductID="qemu-sgabios-8-47.1">qemu-sgabios-8-47.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-testsuite-2.9.1-47.2">
      <FullProductName ProductID="qemu-testsuite-2.9.1-47.2">qemu-testsuite-2.9.1-47.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-tools-2.9.1-47.1">
      <FullProductName ProductID="qemu-tools-2.9.1-47.1">qemu-tools-2.9.1-47.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-vgabios-1.10.2-47.1">
      <FullProductName ProductID="qemu-vgabios-1.10.2-47.1">qemu-vgabios-1.10.2-47.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-x86-2.9.1-47.1">
      <FullProductName ProductID="qemu-x86-2.9.1-47.1">qemu-x86-2.9.1-47.1</FullProductName>
    </Branch>
    <Relationship ProductReference="qemu-2.9.1-47.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:qemu-2.9.1-47.1">qemu-2.9.1-47.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-arm-2.9.1-47.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:qemu-arm-2.9.1-47.1">qemu-arm-2.9.1-47.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-curl-2.9.1-47.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:qemu-block-curl-2.9.1-47.1">qemu-block-curl-2.9.1-47.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-dmg-2.9.1-47.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:qemu-block-dmg-2.9.1-47.1">qemu-block-dmg-2.9.1-47.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-iscsi-2.9.1-47.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:qemu-block-iscsi-2.9.1-47.1">qemu-block-iscsi-2.9.1-47.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-rbd-2.9.1-47.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:qemu-block-rbd-2.9.1-47.1">qemu-block-rbd-2.9.1-47.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-ssh-2.9.1-47.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:qemu-block-ssh-2.9.1-47.1">qemu-block-ssh-2.9.1-47.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-extra-2.9.1-47.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:qemu-extra-2.9.1-47.1">qemu-extra-2.9.1-47.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-guest-agent-2.9.1-47.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:qemu-guest-agent-2.9.1-47.1">qemu-guest-agent-2.9.1-47.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-ipxe-1.0.0-47.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:qemu-ipxe-1.0.0-47.1">qemu-ipxe-1.0.0-47.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-ksm-2.9.1-47.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:qemu-ksm-2.9.1-47.1">qemu-ksm-2.9.1-47.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-kvm-2.9.1-47.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:qemu-kvm-2.9.1-47.1">qemu-kvm-2.9.1-47.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-lang-2.9.1-47.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:qemu-lang-2.9.1-47.1">qemu-lang-2.9.1-47.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-linux-user-2.9.1-47.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:qemu-linux-user-2.9.1-47.1">qemu-linux-user-2.9.1-47.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-ppc-2.9.1-47.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:qemu-ppc-2.9.1-47.1">qemu-ppc-2.9.1-47.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-s390-2.9.1-47.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:qemu-s390-2.9.1-47.1">qemu-s390-2.9.1-47.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-seabios-1.10.2-47.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:qemu-seabios-1.10.2-47.1">qemu-seabios-1.10.2-47.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-sgabios-8-47.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:qemu-sgabios-8-47.1">qemu-sgabios-8-47.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-testsuite-2.9.1-47.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:qemu-testsuite-2.9.1-47.2">qemu-testsuite-2.9.1-47.2 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-tools-2.9.1-47.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:qemu-tools-2.9.1-47.1">qemu-tools-2.9.1-47.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-vgabios-1.10.2-47.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:qemu-vgabios-1.10.2-47.1">qemu-vgabios-1.10.2-47.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-x86-2.9.1-47.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:qemu-x86-2.9.1-47.1">qemu-x86-2.9.1-47.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">m_cat in slirp/mbuf.c in Qemu has a heap-based buffer overflow via incoming fragmented datagrams.</Note>
    </Notes>
    <CVE>CVE-2018-11806</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:qemu-2.9.1-47.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-arm-2.9.1-47.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-block-curl-2.9.1-47.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-block-dmg-2.9.1-47.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-block-iscsi-2.9.1-47.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-block-rbd-2.9.1-47.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-block-ssh-2.9.1-47.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-extra-2.9.1-47.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-guest-agent-2.9.1-47.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-ipxe-1.0.0-47.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-ksm-2.9.1-47.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-kvm-2.9.1-47.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-lang-2.9.1-47.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-linux-user-2.9.1-47.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-ppc-2.9.1-47.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-s390-2.9.1-47.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-seabios-1.10.2-47.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-sgabios-8-47.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-testsuite-2.9.1-47.2</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-tools-2.9.1-47.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-vgabios-1.10.2-47.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-x86-2.9.1-47.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00013.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-11806.html</URL>
        <Description>CVE-2018-11806</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1096223</URL>
        <Description>SUSE Bug 1096223</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1096224</URL>
        <Description>SUSE Bug 1096224</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">qmp_guest_file_read in qga/commands-posix.c and qga/commands-win32.c in qemu-ga (aka QEMU Guest Agent) in QEMU 2.12.50 has an integer overflow causing a g_malloc0() call to trigger a segmentation fault when trying to allocate a large memory chunk. The vulnerability can be exploited by sending a crafted QMP command (including guest-file-read with a large count value) to the agent via the listening socket.</Note>
    </Notes>
    <CVE>CVE-2018-12617</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:qemu-2.9.1-47.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-arm-2.9.1-47.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-block-curl-2.9.1-47.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-block-dmg-2.9.1-47.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-block-iscsi-2.9.1-47.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-block-rbd-2.9.1-47.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-block-ssh-2.9.1-47.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-extra-2.9.1-47.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-guest-agent-2.9.1-47.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-ipxe-1.0.0-47.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-ksm-2.9.1-47.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-kvm-2.9.1-47.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-lang-2.9.1-47.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-linux-user-2.9.1-47.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-ppc-2.9.1-47.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-s390-2.9.1-47.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-seabios-1.10.2-47.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-sgabios-8-47.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-testsuite-2.9.1-47.2</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-tools-2.9.1-47.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-vgabios-1.10.2-47.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-x86-2.9.1-47.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00013.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12617.html</URL>
        <Description>CVE-2018-12617</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1098735</URL>
        <Description>SUSE Bug 1098735</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1098744</URL>
        <Description>SUSE Bug 1098744</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.</Note>
    </Notes>
    <CVE>CVE-2018-3639</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:qemu-2.9.1-47.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-arm-2.9.1-47.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-block-curl-2.9.1-47.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-block-dmg-2.9.1-47.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-block-iscsi-2.9.1-47.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-block-rbd-2.9.1-47.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-block-ssh-2.9.1-47.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-extra-2.9.1-47.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-guest-agent-2.9.1-47.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-ipxe-1.0.0-47.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-ksm-2.9.1-47.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-kvm-2.9.1-47.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-lang-2.9.1-47.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-linux-user-2.9.1-47.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-ppc-2.9.1-47.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-s390-2.9.1-47.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-seabios-1.10.2-47.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-sgabios-8-47.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-testsuite-2.9.1-47.2</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-tools-2.9.1-47.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-vgabios-1.10.2-47.1</ProductID>
        <ProductID>openSUSE Leap 42.3:qemu-x86-2.9.1-47.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00013.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3639.html</URL>
        <Description>CVE-2018-3639</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/0</URL>
        <Description>SUSE Bug 0</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1074701</URL>
        <Description>SUSE Bug 1074701</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1085235</URL>
        <Description>SUSE Bug 1085235</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1085308</URL>
        <Description>SUSE Bug 1085308</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087078</URL>
        <Description>SUSE Bug 1087078</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087082</URL>
        <Description>SUSE Bug 1087082</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1094912</URL>
        <Description>SUSE Bug 1094912</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1100394</URL>
        <Description>SUSE Bug 1100394</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1102640</URL>
        <Description>SUSE Bug 1102640</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1105412</URL>
        <Description>SUSE Bug 1105412</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172781</URL>
        <Description>SUSE Bug 1172781</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172782</URL>
        <Description>SUSE Bug 1172782</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172783</URL>
        <Description>SUSE Bug 1172783</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173489</URL>
        <Description>SUSE Bug 1173489</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1174161</URL>
        <Description>SUSE Bug 1174161</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
