Lucene search

K
suseSuseOPENSUSE-SU-2019:2041-1
HistorySep 01, 2019 - 12:00 a.m.

Security update for qemu (important)

2019-09-0100:00:00
lists.opensuse.org
197

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

6.5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

An update that solves four vulnerabilities and has 7 fixes
is now available.

Description:

This update for qemu fixes the following issues:

Security issues fixed:

  • CVE-2019-14378: Security fix for heap overflow in ip_reass on big packet
    input (bsc#1143794).
  • CVE-2019-12155: Security fix for null pointer dereference while
    releasing spice resources (bsc#1135902).
  • CVE-2019-13164: Security fix for qemu-bridge-helper ACL can be bypassed
    when names are too long (bsc#1140402).
  • CVE-2019-5008: Fix DoS (NULL pointer dereference) in sparc64 virtual
    machine possible through guest device driver (bsc#1133031).

Bug fixes and enhancements:

  • Upstream tweaked SnowRidge-Server vcpu model to now be simply Snowridge
    (jsc#SLE-4883)
  • Add SnowRidge-Server vcpu model (jsc#SLE-4883)
  • Add in documentation about md-clear feature (bsc#1138534)
  • Fix SEV issue where older machine type is not processed correctly
    (bsc#1144087)
  • Fix case of a bad pointer in Xen PV usb support code (bsc#1128106)
  • Further refine arch-capabilities handling to help with security and
    performance in Intel hosts (bsc#1134883, bsc#1135210) (fate#327764)
  • Add support for one more security/performance related vcpu feature
    (bsc#1136778) (fate#327796)
  • Ignore csske for expanding the cpu model (bsc#1136540)

This update was imported from the SUSE:SLE-15-SP1:Update update project.

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

  • openSUSE Leap 15.1:

    zypper in -t patch openSUSE-2019-2041=1

OSVersionArchitecturePackageVersionFilename
openSUSE Leap15.1x86_64< - openSUSE Leap 15.1 (x86_64):- openSUSE Leap 15.1 (x86_64):.x86_64.rpm
openSUSE Leap15.1noarch< - openSUSE Leap 15.1 (noarch):- openSUSE Leap 15.1 (noarch):.noarch.rpm

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

6.5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P