Lucene search

K
suseSuseOPENSUSE-SU-2019:2505-1
HistoryNov 14, 2019 - 12:00 a.m.

Security update for qemu (important)

2019-11-1400:00:00
lists.opensuse.org
103

6.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H

4.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:N/I:N/A:C

An update that fixes four vulnerabilities is now available.

Description:

This update for qemu fixes the following issues:

  • Patch queue updated from https://gitlab.suse.de/virtualization/qemu.git
    SLE15
  • Fix use-after-free in slirp (CVE-2018-20126 bsc#1119991)
  • Fix potential DOS in lsi scsi controller emulation (CVE-2019-12068
    bsc#1146873)
  • Expose taa-no โ€œfeatureโ€, indicating CPU does not have the TSX Async
    Abort vulnerability. (CVE-2019-11135 bsc#1152506)
  • Expose pschange-mc-no โ€œfeatureโ€, indicating CPU does not have the page
    size change machine check vulnerability (CVE-2018-12207 bsc#1155812)

This update was imported from the SUSE:SLE-15:Update update project.

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or โ€œzypper patchโ€.

Alternatively you can run the command listed for your product:

  • openSUSE Leap 15.0:

    zypper in -t patch openSUSE-2019-2505=1

OSVersionArchitecturePackageVersionFilename
openSUSE Leap15.0x86_64<ย - openSUSE Leap 15.0 (x86_64):- openSUSE Leap 15.0 (x86_64):.x86_64.rpm
openSUSE Leap15.0noarch<ย - openSUSE Leap 15.0 (noarch):- openSUSE Leap 15.0 (noarch):.noarch.rpm

6.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H

4.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:N/I:N/A:C