Описание
Security update for qemu
This update for qemu fixes the following issues:
Security issues fixed:
- CVE-2019-9824: Fixed an information leak in slirp (bsc#1129622)
- CVE-2019-8934: Added method to specify whether or not to expose certain ppc64 host information, which can be considered a security issue (bsc#1126455)
- CVE-2019-3812: Fixed OOB memory access and information leak in virtual monitor interface (bsc#1125721)
- CVE-2018-20815: Fix DOS possibility in device tree processing (bsc#1130675)
- Adjust fix for CVE-2019-8934 (bsc#1126455) to match the latest upstream adjustments for the same. Basically now the security fix is to provide a dummy host-model and host-serial value, which overrides getting that value from the host
- CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2019-11091: Added x86 cpu feature 'md-clear' (bsc#1111331)
Other bugs fixed:
- Use a new approach to handling the file input to -smbios option, which accepts either legacy or per-spec formats regardless of the machine type.
This update was imported from the SUSE:SLE-15:Update update project.
Список пакетов
openSUSE Leap 15.0
Ссылки
- E-Mail link for openSUSE-SU-2019:1405-1
- SUSE Security Ratings
- SUSE Bug 1111331
- SUSE Bug 1125721
- SUSE Bug 1126455
- SUSE Bug 1129622
- SUSE Bug 1130675
- SUSE CVE CVE-2018-12126 page
- SUSE CVE CVE-2018-12127 page
- SUSE CVE CVE-2018-12130 page
- SUSE CVE CVE-2018-20815 page
- SUSE CVE CVE-2019-11091 page
- SUSE CVE CVE-2019-3812 page
- SUSE CVE CVE-2019-8934 page
- SUSE CVE CVE-2019-9824 page
Описание
Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf
Затронутые продукты
Ссылки
- CVE-2018-12126
- SUSE Bug 1103186
- SUSE Bug 1111331
- SUSE Bug 1132686
- SUSE Bug 1135409
- SUSE Bug 1135524
- SUSE Bug 1137916
- SUSE Bug 1138534
- SUSE Bug 1141977
- SUSE Bug 1149725
- SUSE Bug 1149726
- SUSE Bug 1149729
- SUSE Bug 1178658
- SUSE Bug 1201877
Описание
Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf
Затронутые продукты
Ссылки
- CVE-2018-12127
- SUSE Bug 1103186
- SUSE Bug 1111331
- SUSE Bug 1132686
- SUSE Bug 1135409
- SUSE Bug 1138534
- SUSE Bug 1141977
- SUSE Bug 1178658
- SUSE Bug 1201877
Описание
Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf
Затронутые продукты
Ссылки
- CVE-2018-12130
- SUSE Bug 1103186
- SUSE Bug 1111331
- SUSE Bug 1132686
- SUSE Bug 1135409
- SUSE Bug 1137916
- SUSE Bug 1138534
- SUSE Bug 1141977
- SUSE Bug 1178658
- SUSE Bug 1201877
Описание
In QEMU 3.1.0, load_device_tree in device_tree.c calls the deprecated load_image function, which has a buffer overflow risk.
Затронутые продукты
Ссылки
- CVE-2018-20815
- SUSE Bug 1118900
- SUSE Bug 1130675
- SUSE Bug 1130680
- SUSE Bug 1138043
- SUSE Bug 1178658
Описание
Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf
Затронутые продукты
Ссылки
- CVE-2019-11091
- SUSE Bug 1103186
- SUSE Bug 1111331
- SUSE Bug 1132686
- SUSE Bug 1133319
- SUSE Bug 1135394
- SUSE Bug 1138043
- SUSE Bug 1138534
- SUSE Bug 1141977
- SUSE Bug 1178658
- SUSE Bug 1201877
Описание
QEMU, through version 2.10 and through version 3.1.0, is vulnerable to an out-of-bounds read of up to 128 bytes in the hw/i2c/i2c-ddc.c:i2c_ddc() function. A local attacker with permission to execute i2c commands could exploit this to read stack memory of the qemu process on the host.
Затронутые продукты
Ссылки
- CVE-2019-3812
- SUSE Bug 1118900
- SUSE Bug 1125721
Описание
hw/ppc/spapr.c in QEMU through 3.1.0 allows Information Exposure because the hypervisor shares the /proc/device-tree/system-id and /proc/device-tree/model system attributes with a guest.
Затронутые продукты
Ссылки
- CVE-2019-8934
- SUSE Bug 1118900
- SUSE Bug 1126455
Описание
tcp_emu in slirp/tcp_subr.c (aka slirp/src/tcp_subr.c) in QEMU 3.0.0 uses uninitialized data in an snprintf call, leading to Information disclosure.
Затронутые продукты
Ссылки
- CVE-2019-9824
- SUSE Bug 1118900
- SUSE Bug 1129622
- SUSE Bug 1129623
- SUSE Bug 1178658