Описание
Security update for qemu
This update for qemu to version 2.11.2 fixes the following issues:
Security issue fixed:
- CVE-2018-11806: Fix heap buffer overflow issue that can happen while reassembling fragmented datagrams (bsc#1096223).
- CVE-2018-3639: Mitigation functionality for Speculative Store Bypass issue in x86 (bsc#1087082).
- CVE-2018-7550: Fix out of bounds read and write memory access, potentially leading to code execution (bsc#1083291)
Bug fixes:
- bsc#1091695: SEV guest will not lauchh with qemu-system-x86_64 version 2.11.1.
- bsc#1094898: qemu-guest-agent service doesn't work in version Leap 15.0.
- bsc#1094725:
virsh blockresize
does not work with Xen qdisks. - bsc#1094913: QEMU crashes when starting a guest with more than 7.999TB.
Список пакетов
SUSE Linux Enterprise Module for Basesystem 15
SUSE Linux Enterprise Module for Server Applications 15
Ссылки
- Link for SUSE-SU-2018:2340-1
- E-Mail link for SUSE-SU-2018:2340-1
- SUSE Security Ratings
- SUSE Bug 1083291
- SUSE Bug 1087082
- SUSE Bug 1091695
- SUSE Bug 1094725
- SUSE Bug 1094898
- SUSE Bug 1094913
- SUSE Bug 1096223
- SUSE CVE CVE-2018-11806 page
- SUSE CVE CVE-2018-3639 page
- SUSE CVE CVE-2018-7550 page
Описание
m_cat in slirp/mbuf.c in Qemu has a heap-based buffer overflow via incoming fragmented datagrams.
Затронутые продукты
Ссылки
- CVE-2018-11806
- SUSE Bug 1096223
- SUSE Bug 1096224
- SUSE Bug 1178658
Описание
Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.
Затронутые продукты
Ссылки
- CVE-2018-3639
- SUSE Bug 1074701
- SUSE Bug 1085235
- SUSE Bug 1085308
- SUSE Bug 1087078
- SUSE Bug 1087082
- SUSE Bug 1092631
- SUSE Bug 1092885
- SUSE Bug 1094912
- SUSE Bug 1098813
- SUSE Bug 1100394
- SUSE Bug 1102640
- SUSE Bug 1105412
- SUSE Bug 1111963
- SUSE Bug 1172781
- SUSE Bug 1172782
- SUSE Bug 1172783
- SUSE Bug 1173489
- SUSE Bug 1178658
- SUSE Bug 1201877
Описание
The load_multiboot function in hw/i386/multiboot.c in Quick Emulator (aka QEMU) allows local guest OS users to execute arbitrary code on the QEMU host via a mh_load_end_addr value greater than mh_bss_end_addr, which triggers an out-of-bounds read or write memory access.
Затронутые продукты
Ссылки
- CVE-2018-7550
- SUSE Bug 1083291
- SUSE Bug 1083292