Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2019:1269-1

Опубликовано: 16 мая 2019
Источник: suse-cvrf

Описание

Security update for qemu

This update for qemu fixes the following issues:

Following security issues were fixed:

  • CVE-2019-9824: Fixed an information leak in slirp (bsc#1129622)
  • CVE-2018-20815: Fix DOS possibility in device tree processing (bsc#1130675)
  • CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2019-11091: Added x86 cpu feature 'md-clear' (bsc#1111331)

Список пакетов

SUSE Linux Enterprise Server 12 SP1-LTSS
qemu-2.3.1-33.23.1
qemu-block-curl-2.3.1-33.23.1
qemu-block-rbd-2.3.1-33.23.1
qemu-guest-agent-2.3.1-33.23.1
qemu-ipxe-1.0.0-33.23.1
qemu-kvm-2.3.1-33.23.1
qemu-lang-2.3.1-33.23.1
qemu-ppc-2.3.1-33.23.1
qemu-s390-2.3.1-33.23.1
qemu-seabios-1.8.1-33.23.1
qemu-sgabios-8-33.23.1
qemu-tools-2.3.1-33.23.1
qemu-vgabios-1.8.1-33.23.1
qemu-x86-2.3.1-33.23.1
SUSE Linux Enterprise Server for SAP Applications 12 SP1
qemu-2.3.1-33.23.1
qemu-block-curl-2.3.1-33.23.1
qemu-block-rbd-2.3.1-33.23.1
qemu-guest-agent-2.3.1-33.23.1
qemu-ipxe-1.0.0-33.23.1
qemu-kvm-2.3.1-33.23.1
qemu-lang-2.3.1-33.23.1
qemu-seabios-1.8.1-33.23.1
qemu-sgabios-8-33.23.1
qemu-tools-2.3.1-33.23.1
qemu-vgabios-1.8.1-33.23.1
qemu-x86-2.3.1-33.23.1

Описание

Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf


Затронутые продукты
SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.23.1
SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.23.1
SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-rbd-2.3.1-33.23.1
SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.23.1

Ссылки

Описание

Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf


Затронутые продукты
SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.23.1
SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.23.1
SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-rbd-2.3.1-33.23.1
SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.23.1

Ссылки

Описание

Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf


Затронутые продукты
SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.23.1
SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.23.1
SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-rbd-2.3.1-33.23.1
SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.23.1

Ссылки

Описание

In QEMU 3.1.0, load_device_tree in device_tree.c calls the deprecated load_image function, which has a buffer overflow risk.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.23.1
SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.23.1
SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-rbd-2.3.1-33.23.1
SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.23.1

Ссылки

Описание

Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf


Затронутые продукты
SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.23.1
SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.23.1
SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-rbd-2.3.1-33.23.1
SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.23.1

Ссылки

Описание

tcp_emu in slirp/tcp_subr.c (aka slirp/src/tcp_subr.c) in QEMU 3.0.0 uses uninitialized data in an snprintf call, leading to Information disclosure.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.23.1
SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.23.1
SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-rbd-2.3.1-33.23.1
SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.23.1

Ссылки
Уязвимость SUSE-SU-2019:1269-1