<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for qemu</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2019:2955-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2019-11-12T18:14:55Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2019-11-12T18:14:55Z</InitialReleaseDate>
    <CurrentReleaseDate>2019-11-12T18:14:55Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for qemu</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for qemu fixes the following issues:

qemu was updated to v3.1.1.1, a stable, bug-fix-only release, which
includes 2 fixes we already carry, as well as one additional use-
after-free fix in slirp. (CVE-2018-20126 bsc#1119991,
CVE-2019-14378 bsc#1143794, and CVE-2019-15890 bsc#1149811
respectively)

Security issues fixed:

- CVE-2019-12068: Fixed potential DOS in lsi scsi controller emulation (bsc#1146873)
- CVE-2019-11135: Expose taa-no 'feature', indicating CPU does not have the TSX Async Abort vulnerability. (bsc#1152506)
- CVE-2018-12207: Expose pschange-mc-no 'feature', indicating CPU does not have the page size change machine check vulnerability (bsc#1117665)

Other issues fixed:

- Change how this bug gets fixed (bsc#1144087)
- Disable file locking in the Xen PV disk backend to avoid locking
  issues with PV domUs during migration. The issues triggered by
  the locking can not be properly handled in libxl. The locking
  introduced in qemu-2.10 was removed again in qemu-4.0.
  (bsc#1079730, bsc#1098403, bsc#1111025, bsc#1145427, bsc#1145774)
- Feature support for vfio-ccw dasd ipl (bsc#1145379 jira-SLE-6132)
- Additional hardware instruction support for s390, also update
  qemu linux headers to 5.2-rc1 (bsc#1145436 jira-SLE-6237)

</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2019-2955,SUSE-SLE-Module-Basesystem-15-SP1-2019-2955,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2955,SUSE-SLE-Module-Server-Applications-15-SP1-2019-2955</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20192955-1/</URL>
      <Description>Link for SUSE-SU-2019:2955-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20192955-1.html</URL>
      <Description>E-Mail link for SUSE-SU-2019:2955-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1079730</URL>
      <Description>SUSE Bug 1079730</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1098403</URL>
      <Description>SUSE Bug 1098403</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1111025</URL>
      <Description>SUSE Bug 1111025</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1117665</URL>
      <Description>SUSE Bug 1117665</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1119991</URL>
      <Description>SUSE Bug 1119991</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1143794</URL>
      <Description>SUSE Bug 1143794</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1144087</URL>
      <Description>SUSE Bug 1144087</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1145379</URL>
      <Description>SUSE Bug 1145379</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1145427</URL>
      <Description>SUSE Bug 1145427</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1145436</URL>
      <Description>SUSE Bug 1145436</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1145774</URL>
      <Description>SUSE Bug 1145774</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1146873</URL>
      <Description>SUSE Bug 1146873</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1149811</URL>
      <Description>SUSE Bug 1149811</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1152506</URL>
      <Description>SUSE Bug 1152506</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12207/</URL>
      <Description>SUSE CVE CVE-2018-12207 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-20126/</URL>
      <Description>SUSE CVE CVE-2018-20126 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-11135/</URL>
      <Description>SUSE CVE CVE-2019-11135 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-12068/</URL>
      <Description>SUSE CVE CVE-2019-12068 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-14378/</URL>
      <Description>SUSE CVE CVE-2019-14378 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-15890/</URL>
      <Description>SUSE CVE CVE-2019-15890 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/SLE-6132</URL>
      <Description>SUSE Bug SLE-6132</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/SLE-6237</URL>
      <Description>SUSE Bug SLE-6237</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for Basesystem 15 SP1">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Basesystem 15 SP1">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15 SP1" CPE="cpe:/o:suse:sle-module-basesystem:15:sp1">SUSE Linux Enterprise Module for Basesystem 15 SP1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for Server Applications 15 SP1">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Server Applications 15 SP1">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP1" CPE="cpe:/o:suse:sle-module-server-applications:15:sp1">SUSE Linux Enterprise Module for Server Applications 15 SP1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="qemu-3.1.1.1-9.6.2">
      <FullProductName ProductID="qemu-3.1.1.1-9.6.2">qemu-3.1.1.1-9.6.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-arm-3.1.1.1-9.6.2">
      <FullProductName ProductID="qemu-arm-3.1.1.1-9.6.2">qemu-arm-3.1.1.1-9.6.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-audio-alsa-3.1.1.1-9.6.2">
      <FullProductName ProductID="qemu-audio-alsa-3.1.1.1-9.6.2">qemu-audio-alsa-3.1.1.1-9.6.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-audio-oss-3.1.1.1-9.6.2">
      <FullProductName ProductID="qemu-audio-oss-3.1.1.1-9.6.2">qemu-audio-oss-3.1.1.1-9.6.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-audio-pa-3.1.1.1-9.6.2">
      <FullProductName ProductID="qemu-audio-pa-3.1.1.1-9.6.2">qemu-audio-pa-3.1.1.1-9.6.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-curl-3.1.1.1-9.6.2">
      <FullProductName ProductID="qemu-block-curl-3.1.1.1-9.6.2">qemu-block-curl-3.1.1.1-9.6.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-dmg-3.1.1.1-9.6.2">
      <FullProductName ProductID="qemu-block-dmg-3.1.1.1-9.6.2">qemu-block-dmg-3.1.1.1-9.6.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-iscsi-3.1.1.1-9.6.2">
      <FullProductName ProductID="qemu-block-iscsi-3.1.1.1-9.6.2">qemu-block-iscsi-3.1.1.1-9.6.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-rbd-3.1.1.1-9.6.2">
      <FullProductName ProductID="qemu-block-rbd-3.1.1.1-9.6.2">qemu-block-rbd-3.1.1.1-9.6.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-ssh-3.1.1.1-9.6.2">
      <FullProductName ProductID="qemu-block-ssh-3.1.1.1-9.6.2">qemu-block-ssh-3.1.1.1-9.6.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-extra-3.1.1.1-9.6.2">
      <FullProductName ProductID="qemu-extra-3.1.1.1-9.6.2">qemu-extra-3.1.1.1-9.6.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-guest-agent-3.1.1.1-9.6.2">
      <FullProductName ProductID="qemu-guest-agent-3.1.1.1-9.6.2">qemu-guest-agent-3.1.1.1-9.6.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-ipxe-1.0.0+-9.6.2">
      <FullProductName ProductID="qemu-ipxe-1.0.0+-9.6.2">qemu-ipxe-1.0.0+-9.6.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-kvm-3.1.1.1-9.6.2">
      <FullProductName ProductID="qemu-kvm-3.1.1.1-9.6.2">qemu-kvm-3.1.1.1-9.6.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-lang-3.1.1.1-9.6.2">
      <FullProductName ProductID="qemu-lang-3.1.1.1-9.6.2">qemu-lang-3.1.1.1-9.6.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-linux-user-3.1.1.1-9.6.2">
      <FullProductName ProductID="qemu-linux-user-3.1.1.1-9.6.2">qemu-linux-user-3.1.1.1-9.6.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-ppc-3.1.1.1-9.6.2">
      <FullProductName ProductID="qemu-ppc-3.1.1.1-9.6.2">qemu-ppc-3.1.1.1-9.6.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-s390-3.1.1.1-9.6.2">
      <FullProductName ProductID="qemu-s390-3.1.1.1-9.6.2">qemu-s390-3.1.1.1-9.6.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-seabios-1.12.0-9.6.2">
      <FullProductName ProductID="qemu-seabios-1.12.0-9.6.2">qemu-seabios-1.12.0-9.6.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-sgabios-8-9.6.2">
      <FullProductName ProductID="qemu-sgabios-8-9.6.2">qemu-sgabios-8-9.6.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-tools-3.1.1.1-9.6.2">
      <FullProductName ProductID="qemu-tools-3.1.1.1-9.6.2">qemu-tools-3.1.1.1-9.6.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-ui-curses-3.1.1.1-9.6.2">
      <FullProductName ProductID="qemu-ui-curses-3.1.1.1-9.6.2">qemu-ui-curses-3.1.1.1-9.6.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-ui-gtk-3.1.1.1-9.6.2">
      <FullProductName ProductID="qemu-ui-gtk-3.1.1.1-9.6.2">qemu-ui-gtk-3.1.1.1-9.6.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-vgabios-1.12.0-9.6.2">
      <FullProductName ProductID="qemu-vgabios-1.12.0-9.6.2">qemu-vgabios-1.12.0-9.6.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-x86-3.1.1.1-9.6.2">
      <FullProductName ProductID="qemu-x86-3.1.1.1-9.6.2">qemu-x86-3.1.1.1-9.6.2</FullProductName>
    </Branch>
    <Relationship ProductReference="qemu-tools-3.1.1.1-9.6.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Basesystem 15 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2">qemu-tools-3.1.1.1-9.6.2 as a component of SUSE Linux Enterprise Module for Basesystem 15 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-3.1.1.1-9.6.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Server Applications 15 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2">qemu-3.1.1.1-9.6.2 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-arm-3.1.1.1-9.6.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Server Applications 15 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-arm-3.1.1.1-9.6.2">qemu-arm-3.1.1.1-9.6.2 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-audio-alsa-3.1.1.1-9.6.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Server Applications 15 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-alsa-3.1.1.1-9.6.2">qemu-audio-alsa-3.1.1.1-9.6.2 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-audio-oss-3.1.1.1-9.6.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Server Applications 15 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-oss-3.1.1.1-9.6.2">qemu-audio-oss-3.1.1.1-9.6.2 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-audio-pa-3.1.1.1-9.6.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Server Applications 15 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-pa-3.1.1.1-9.6.2">qemu-audio-pa-3.1.1.1-9.6.2 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-curl-3.1.1.1-9.6.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Server Applications 15 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2">qemu-block-curl-3.1.1.1-9.6.2 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-iscsi-3.1.1.1-9.6.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Server Applications 15 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2">qemu-block-iscsi-3.1.1.1-9.6.2 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-rbd-3.1.1.1-9.6.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Server Applications 15 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2">qemu-block-rbd-3.1.1.1-9.6.2 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-ssh-3.1.1.1-9.6.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Server Applications 15 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2">qemu-block-ssh-3.1.1.1-9.6.2 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-guest-agent-3.1.1.1-9.6.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Server Applications 15 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2">qemu-guest-agent-3.1.1.1-9.6.2 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-ipxe-1.0.0+-9.6.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Server Applications 15 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ipxe-1.0.0+-9.6.2">qemu-ipxe-1.0.0+-9.6.2 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-kvm-3.1.1.1-9.6.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Server Applications 15 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-kvm-3.1.1.1-9.6.2">qemu-kvm-3.1.1.1-9.6.2 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-lang-3.1.1.1-9.6.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Server Applications 15 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2">qemu-lang-3.1.1.1-9.6.2 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-ppc-3.1.1.1-9.6.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Server Applications 15 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ppc-3.1.1.1-9.6.2">qemu-ppc-3.1.1.1-9.6.2 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-s390-3.1.1.1-9.6.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Server Applications 15 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-s390-3.1.1.1-9.6.2">qemu-s390-3.1.1.1-9.6.2 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-seabios-1.12.0-9.6.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Server Applications 15 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-seabios-1.12.0-9.6.2">qemu-seabios-1.12.0-9.6.2 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-sgabios-8-9.6.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Server Applications 15 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-sgabios-8-9.6.2">qemu-sgabios-8-9.6.2 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-ui-curses-3.1.1.1-9.6.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Server Applications 15 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ui-curses-3.1.1.1-9.6.2">qemu-ui-curses-3.1.1.1-9.6.2 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-ui-gtk-3.1.1.1-9.6.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Server Applications 15 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ui-gtk-3.1.1.1-9.6.2">qemu-ui-gtk-3.1.1.1-9.6.2 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-vgabios-1.12.0-9.6.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Server Applications 15 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-vgabios-1.12.0-9.6.2">qemu-vgabios-1.12.0-9.6.2 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-x86-3.1.1.1-9.6.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Server Applications 15 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-x86-3.1.1.1-9.6.2">qemu-x86-3.1.1.1-9.6.2 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP1</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.</Note>
    </Notes>
    <CVE>CVE-2018-12207</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-arm-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-alsa-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-oss-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-pa-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ipxe-1.0.0+-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-kvm-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ppc-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-s390-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-seabios-1.12.0-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-sgabios-8-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ui-curses-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ui-gtk-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-vgabios-1.12.0-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-x86-3.1.1.1-9.6.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20192955-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12207.html</URL>
        <Description>CVE-2018-12207</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117665</URL>
        <Description>SUSE Bug 1117665</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1139073</URL>
        <Description>SUSE Bug 1139073</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1152505</URL>
        <Description>SUSE Bug 1152505</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1155812</URL>
        <Description>SUSE Bug 1155812</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1155817</URL>
        <Description>SUSE Bug 1155817</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1155945</URL>
        <Description>SUSE Bug 1155945</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201877</URL>
        <Description>SUSE Bug 1201877</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">hw/rdma/vmw/pvrdma_cmd.c in QEMU allows create_cq and create_qp memory leaks because errors are mishandled.</Note>
    </Notes>
    <CVE>CVE-2018-20126</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-arm-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-alsa-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-oss-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-pa-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ipxe-1.0.0+-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-kvm-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ppc-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-s390-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-seabios-1.12.0-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-sgabios-8-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ui-curses-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ui-gtk-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-vgabios-1.12.0-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-x86-3.1.1.1-9.6.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20192955-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-20126.html</URL>
        <Description>CVE-2018-20126</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1119991</URL>
        <Description>SUSE Bug 1119991</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.</Note>
    </Notes>
    <CVE>CVE-2019-11135</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-arm-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-alsa-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-oss-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-pa-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ipxe-1.0.0+-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-kvm-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ppc-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-s390-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-seabios-1.12.0-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-sgabios-8-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ui-curses-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ui-gtk-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-vgabios-1.12.0-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-x86-3.1.1.1-9.6.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20192955-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-11135.html</URL>
        <Description>CVE-2019-11135</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1139073</URL>
        <Description>SUSE Bug 1139073</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1152497</URL>
        <Description>SUSE Bug 1152497</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1152505</URL>
        <Description>SUSE Bug 1152505</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1152506</URL>
        <Description>SUSE Bug 1152506</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1160120</URL>
        <Description>SUSE Bug 1160120</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201877</URL>
        <Description>SUSE Bug 1201877</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In QEMU 1:4.1-1, 1:2.1+dfsg-12+deb8u6, 1:2.8+dfsg-6+deb9u8, 1:3.1+dfsg-8~deb10u1, 1:3.1+dfsg-8+deb10u2, and 1:2.1+dfsg-12+deb8u12 (fixed), when executing script in lsi_execute_script(), the LSI scsi adapter emulator advances 's-&gt;dsp' index to read next opcode. This can lead to an infinite loop if the next opcode is empty. Move the existing loop exit after 10k iterations so that it covers no-op opcodes as well.</Note>
    </Notes>
    <CVE>CVE-2019-12068</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-arm-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-alsa-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-oss-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-pa-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ipxe-1.0.0+-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-kvm-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ppc-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-s390-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-seabios-1.12.0-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-sgabios-8-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ui-curses-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ui-gtk-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-vgabios-1.12.0-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-x86-3.1.1.1-9.6.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20192955-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-12068.html</URL>
        <Description>CVE-2019-12068</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1146873</URL>
        <Description>SUSE Bug 1146873</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1146874</URL>
        <Description>SUSE Bug 1146874</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ip_reass in ip_input.c in libslirp 4.0.0 has a heap-based buffer overflow via a large packet because it mishandles a case involving the first fragment.</Note>
    </Notes>
    <CVE>CVE-2019-14378</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-arm-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-alsa-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-oss-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-pa-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ipxe-1.0.0+-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-kvm-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ppc-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-s390-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-seabios-1.12.0-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-sgabios-8-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ui-curses-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ui-gtk-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-vgabios-1.12.0-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-x86-3.1.1.1-9.6.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.5</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20192955-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-14378.html</URL>
        <Description>CVE-2019-14378</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1143794</URL>
        <Description>SUSE Bug 1143794</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1143797</URL>
        <Description>SUSE Bug 1143797</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libslirp 4.0.0, as used in QEMU 4.1.0, has a use-after-free in ip_reass in ip_input.c.</Note>
    </Notes>
    <CVE>CVE-2019-15890</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-arm-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-alsa-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-oss-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-pa-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ipxe-1.0.0+-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-kvm-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ppc-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-s390-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-seabios-1.12.0-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-sgabios-8-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ui-curses-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ui-gtk-3.1.1.1-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-vgabios-1.12.0-9.6.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-x86-3.1.1.1-9.6.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20192955-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-15890.html</URL>
        <Description>CVE-2019-15890</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1149811</URL>
        <Description>SUSE Bug 1149811</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1149813</URL>
        <Description>SUSE Bug 1149813</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
