Описание
Security update for qemu
This update for qemu to version 2.11.2 fixes the following issues:
Security issue fixed:
- CVE-2018-11806: Fix heap buffer overflow issue that can happen while reassembling fragmented datagrams (bsc#1096223).
- CVE-2018-3639: Mitigation functionality for Speculative Store Bypass issue in x86 (bsc#1087082).
- CVE-2018-7550: Fix out of bounds read and write memory access, potentially leading to code execution (bsc#1083291)
Bug fixes:
- bsc#1091695: SEV guest will not lauchh with qemu-system-x86_64 version 2.11.1.
- bsc#1094898: qemu-guest-agent service doesn't work in version Leap 15.0.
- bsc#1094725:
virsh blockresize
does not work with Xen qdisks. - bsc#1094913: QEMU crashes when starting a guest with more than 7.999TB.
This update was imported from the SUSE:SLE-15:Update update project.
Список пакетов
openSUSE Leap 15.0
Ссылки
- E-Mail link for openSUSE-SU-2018:2402-1
- SUSE Security Ratings
Описание
m_cat in slirp/mbuf.c in Qemu has a heap-based buffer overflow via incoming fragmented datagrams.
Затронутые продукты
Ссылки
- CVE-2018-11806
- SUSE Bug 1096223
- SUSE Bug 1096224
Описание
Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.
Затронутые продукты
Ссылки
- CVE-2018-3639
- SUSE Bug 0
- SUSE Bug 1074701
- SUSE Bug 1085235
- SUSE Bug 1085308
- SUSE Bug 1087078
- SUSE Bug 1087082
- SUSE Bug 1094912
- SUSE Bug 1100394
- SUSE Bug 1102640
- SUSE Bug 1105412
- SUSE Bug 1113769
Описание
The load_multiboot function in hw/i386/multiboot.c in Quick Emulator (aka QEMU) allows local guest OS users to execute arbitrary code on the QEMU host via a mh_load_end_addr value greater than mh_bss_end_addr, which triggers an out-of-bounds read or write memory access.
Затронутые продукты
Ссылки
- CVE-2018-7550
- SUSE Bug 1083291
- SUSE Bug 1083292