Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2019:1239-1

Опубликовано: 14 мая 2019
Источник: suse-cvrf

Описание

Security update for qemu

This update for qemu fixes the following issues:

Security issues fixed:

  • CVE-2019-9824: Fixed an information leak in slirp (bsc#1129622)
  • CVE-2019-8934: Added method to specify whether or not to expose certain ppc64 host information, which can be considered a security issue (bsc#1126455)
  • CVE-2019-3812: Fixed OOB memory access and information leak in virtual monitor interface (bsc#1125721)
  • CVE-2018-20815: Fix DOS possibility in device tree processing (bsc#1130675)
  • Adjust fix for CVE-2019-8934 (bsc#1126455) to match the latest upstream adjustments for the same. Basically now the security fix is to provide a dummy host-model and host-serial value, which overrides getting that value from the host
  • CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2019-11091: Added x86 cpu feature 'md-clear' (bsc#1111331)

Other bugs fixed:

  • Use a new approach to handling the file input to -smbios option, which accepts either legacy or per-spec formats regardless of the machine type.

Список пакетов

SUSE Linux Enterprise Module for Basesystem 15
qemu-tools-2.11.2-9.25.1
SUSE Linux Enterprise Module for Server Applications 15
qemu-2.11.2-9.25.1
qemu-arm-2.11.2-9.25.1
qemu-block-curl-2.11.2-9.25.1
qemu-block-iscsi-2.11.2-9.25.1
qemu-block-rbd-2.11.2-9.25.1
qemu-block-ssh-2.11.2-9.25.1
qemu-guest-agent-2.11.2-9.25.1
qemu-ipxe-1.0.0+-9.25.1
qemu-kvm-2.11.2-9.25.1
qemu-lang-2.11.2-9.25.1
qemu-ppc-2.11.2-9.25.1
qemu-s390-2.11.2-9.25.1
qemu-seabios-1.11.0-9.25.1
qemu-sgabios-8-9.25.1
qemu-vgabios-1.11.0-9.25.1
qemu-x86-2.11.2-9.25.1

Описание

Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf


Затронутые продукты
SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.25.1
SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.25.1
SUSE Linux Enterprise Module for Server Applications 15:qemu-arm-2.11.2-9.25.1
SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.25.1

Ссылки

Описание

Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf


Затронутые продукты
SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.25.1
SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.25.1
SUSE Linux Enterprise Module for Server Applications 15:qemu-arm-2.11.2-9.25.1
SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.25.1

Ссылки

Описание

Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf


Затронутые продукты
SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.25.1
SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.25.1
SUSE Linux Enterprise Module for Server Applications 15:qemu-arm-2.11.2-9.25.1
SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.25.1

Ссылки

Описание

In QEMU 3.1.0, load_device_tree in device_tree.c calls the deprecated load_image function, which has a buffer overflow risk.


Затронутые продукты
SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.25.1
SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.25.1
SUSE Linux Enterprise Module for Server Applications 15:qemu-arm-2.11.2-9.25.1
SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.25.1

Ссылки

Описание

Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf


Затронутые продукты
SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.25.1
SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.25.1
SUSE Linux Enterprise Module for Server Applications 15:qemu-arm-2.11.2-9.25.1
SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.25.1

Ссылки

Описание

QEMU, through version 2.10 and through version 3.1.0, is vulnerable to an out-of-bounds read of up to 128 bytes in the hw/i2c/i2c-ddc.c:i2c_ddc() function. A local attacker with permission to execute i2c commands could exploit this to read stack memory of the qemu process on the host.


Затронутые продукты
SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.25.1
SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.25.1
SUSE Linux Enterprise Module for Server Applications 15:qemu-arm-2.11.2-9.25.1
SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.25.1

Ссылки

Описание

hw/ppc/spapr.c in QEMU through 3.1.0 allows Information Exposure because the hypervisor shares the /proc/device-tree/system-id and /proc/device-tree/model system attributes with a guest.


Затронутые продукты
SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.25.1
SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.25.1
SUSE Linux Enterprise Module for Server Applications 15:qemu-arm-2.11.2-9.25.1
SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.25.1

Ссылки

Описание

tcp_emu in slirp/tcp_subr.c (aka slirp/src/tcp_subr.c) in QEMU 3.0.0 uses uninitialized data in an snprintf call, leading to Information disclosure.


Затронутые продукты
SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.25.1
SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.25.1
SUSE Linux Enterprise Module for Server Applications 15:qemu-arm-2.11.2-9.25.1
SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.25.1

Ссылки
Уязвимость SUSE-SU-2019:1239-1