{"affected":[{"ecosystem_specific":{"binaries":[{"qemu":"2.9.1-6.19.11","qemu-block-curl":"2.9.1-6.19.11","qemu-ipxe":"1.0.0-6.19.11","qemu-kvm":"2.9.1-6.19.11","qemu-seabios":"1.10.2-6.19.11","qemu-sgabios":"8-6.19.11","qemu-tools":"2.9.1-6.19.11","qemu-vgabios":"1.10.2-6.19.11","qemu-x86":"2.9.1-6.19.11"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Desktop 12 SP3","name":"qemu","purl":"pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.9.1-6.19.11"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"qemu":"2.9.1-6.19.11","qemu-arm":"2.9.1-6.19.11","qemu-block-curl":"2.9.1-6.19.11","qemu-block-iscsi":"2.9.1-6.19.11","qemu-block-rbd":"2.9.1-6.19.11","qemu-block-ssh":"2.9.1-6.19.11","qemu-guest-agent":"2.9.1-6.19.11","qemu-ipxe":"1.0.0-6.19.11","qemu-kvm":"2.9.1-6.19.11","qemu-lang":"2.9.1-6.19.11","qemu-ppc":"2.9.1-6.19.11","qemu-s390":"2.9.1-6.19.11","qemu-seabios":"1.10.2-6.19.11","qemu-sgabios":"8-6.19.11","qemu-tools":"2.9.1-6.19.11","qemu-vgabios":"1.10.2-6.19.11","qemu-x86":"2.9.1-6.19.11"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP3","name":"qemu","purl":"pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.9.1-6.19.11"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"qemu":"2.9.1-6.19.11","qemu-arm":"2.9.1-6.19.11","qemu-block-curl":"2.9.1-6.19.11","qemu-block-iscsi":"2.9.1-6.19.11","qemu-block-rbd":"2.9.1-6.19.11","qemu-block-ssh":"2.9.1-6.19.11","qemu-guest-agent":"2.9.1-6.19.11","qemu-ipxe":"1.0.0-6.19.11","qemu-kvm":"2.9.1-6.19.11","qemu-lang":"2.9.1-6.19.11","qemu-ppc":"2.9.1-6.19.11","qemu-s390":"2.9.1-6.19.11","qemu-seabios":"1.10.2-6.19.11","qemu-sgabios":"8-6.19.11","qemu-tools":"2.9.1-6.19.11","qemu-vgabios":"1.10.2-6.19.11","qemu-x86":"2.9.1-6.19.11"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP3","name":"qemu","purl":"pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.9.1-6.19.11"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for qemu fixes the following issues:\n\nThese security issues were fixed:\n\n- CVE-2018-12617: qmp_guest_file_read had an integer overflow that could have\n  been exploited by sending a crafted QMP command (including guest-file-read with\n  a large count value) to the agent via the listening socket causing DoS\n  (bsc#1098735).\n- CVE-2018-11806: Prevent heap-based buffer overflow via incoming fragmented\n  datagrams (bsc#1096223).\n\nWith this release the mitigations for Spectre v4 are moved the the patches from\nupstream (CVE-2018-3639, bsc#1092885).\n\nThis feature was added:\n\n- Add support for block resize support for disks through the monitor (bsc#1094725).\n","id":"SUSE-SU-2018:3555-1","modified":"2018-10-29T16:28:31Z","published":"2018-10-29T16:28:31Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2018/suse-su-20183555-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1092885"},{"type":"REPORT","url":"https://bugzilla.suse.com/1094725"},{"type":"REPORT","url":"https://bugzilla.suse.com/1096223"},{"type":"REPORT","url":"https://bugzilla.suse.com/1098735"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-11806"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-12617"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-3639"}],"related":["CVE-2018-11806","CVE-2018-12617","CVE-2018-3639"],"summary":"Security update for qemu","upstream":["CVE-2018-11806","CVE-2018-12617","CVE-2018-3639"]}