{
  "schema_version": "1.7.0",
  "id": "RHSA-2018:1656",
  "related": [],
  "upstream": [
    "CVE-2018-3639"
  ],
  "published": "2024-09-29T17:17:17Z",
  "modified": "2025-11-22T11:30:16Z",
  "summary": "Red Hat Security Advisory: qemu-kvm security update",
  "severity": [
    {
      "type": "CVSS_V3",
      "score": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
    }
  ],
  "affected": [
    {
      "package": {
        "name": "qemu-guest-agent",
        "ecosystem": "Red Hat:rhel_aus:6.4::server",
        "purl": "pkg:rpm/redhat/qemu-guest-agent"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "2:0.12.1.2-2.355.el6_4.11"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "name": "qemu-guest-agent-win32",
        "ecosystem": "Red Hat:rhel_aus:6.4::server",
        "purl": "pkg:rpm/redhat/qemu-guest-agent-win32"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "2:0.12.1.2-2.355.el6_4.11"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "name": "qemu-img",
        "ecosystem": "Red Hat:rhel_aus:6.4::server",
        "purl": "pkg:rpm/redhat/qemu-img"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "2:0.12.1.2-2.355.el6_4.11"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "name": "qemu-kvm",
        "ecosystem": "Red Hat:rhel_aus:6.4::server",
        "purl": "pkg:rpm/redhat/qemu-kvm"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "2:0.12.1.2-2.355.el6_4.11"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "name": "qemu-kvm-debuginfo",
        "ecosystem": "Red Hat:rhel_aus:6.4::server",
        "purl": "pkg:rpm/redhat/qemu-kvm-debuginfo"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "2:0.12.1.2-2.355.el6_4.11"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "name": "qemu-kvm-tools",
        "ecosystem": "Red Hat:rhel_aus:6.4::server",
        "purl": "pkg:rpm/redhat/qemu-kvm-tools"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "2:0.12.1.2-2.355.el6_4.11"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    }
  ],
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://access.redhat.com/errata/RHSA-2018:1656"
    },
    {
      "type": "ARTICLE",
      "url": "https://access.redhat.com/security/updates/classification/#important"
    },
    {
      "type": "ARTICLE",
      "url": "https://access.redhat.com/security/vulnerabilities/ssbd"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
    },
    {
      "type": "ADVISORY",
      "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1656.json"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2018-3639"
    },
    {
      "type": "ADVISORY",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
    },
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
    },
    {
      "type": "ARTICLE",
      "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
    },
    {
      "type": "ARTICLE",
      "url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
    },
    {
      "type": "ARTICLE",
      "url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
    },
    {
      "type": "ARTICLE",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
    }
  ]
}