SUSE Security Update: Security update for qemu
Announcement ID: SUSE-SU-2019:1238-1
Rating: important
References: #1111331 #1125721 #1126455 #1129622 #1129962 #1130675
Cross-References:CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2018-20815 CVE-2019-11091 CVE-2019-3812 CVE-2019-8934 CVE-2019-9824
Affected Products:
  • SUSE Linux Enterprise Server 12-SP4
  • SUSE Linux Enterprise Desktop 12-SP4

An update that fixes 8 vulnerabilities is now available.

Description:

This update for qemu fixes the following issues:

  • CVE-2019-9824: Fixed an information leak in slirp (bsc#1129622)
  • CVE-2019-8934: Added method to specify whether or not to expose certain ppc64 host information, which can be considered a security issue (bsc#1126455)
  • CVE-2019-3812: Fixed OOB memory access and information leak in virtual monitor interface (bsc#1125721)
  • CVE-2018-20815: Fix DOS possibility in device tree processing (bsc#1130675)
  • Adjust fix for CVE-2019-8934 (bsc#1126455) to match the latest upstream adjustments for the same. Basically now the security fix is to provide a dummy host-model and host-serial value, which overrides getting that value from the host
  • CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2019-11091: Added x86 cpu feature "md-clear" (bsc#1111331)

Other bugs fixed:
  • Use a new approach to handling the file input to -smbios option, which accepts either legacy or per-spec formats regardless of the machine type.
  • Drop the 'ampersand 0x25 shift altgr' line in pt-br keymap file (bsc#1129962)

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  • SUSE Linux Enterprise Server 12-SP4:
    zypper in -t patch SUSE-SLE-SERVER-12-SP4-2019-1238=1
  • SUSE Linux Enterprise Desktop 12-SP4:
    zypper in -t patch SUSE-SLE-DESKTOP-12-SP4-2019-1238=1

Package List:

  • SUSE Linux Enterprise Server 12-SP4 (aarch64 ppc64le s390x x86_64):
    • qemu-2.11.2-5.13.1
    • qemu-block-curl-2.11.2-5.13.1
    • qemu-block-curl-debuginfo-2.11.2-5.13.1
    • qemu-block-iscsi-2.11.2-5.13.1
    • qemu-block-iscsi-debuginfo-2.11.2-5.13.1
    • qemu-block-ssh-2.11.2-5.13.1
    • qemu-block-ssh-debuginfo-2.11.2-5.13.1
    • qemu-debugsource-2.11.2-5.13.1
    • qemu-guest-agent-2.11.2-5.13.1
    • qemu-guest-agent-debuginfo-2.11.2-5.13.1
    • qemu-lang-2.11.2-5.13.1
    • qemu-tools-2.11.2-5.13.1
    • qemu-tools-debuginfo-2.11.2-5.13.1
  • SUSE Linux Enterprise Server 12-SP4 (aarch64 x86_64):
    • qemu-block-rbd-2.11.2-5.13.1
    • qemu-block-rbd-debuginfo-2.11.2-5.13.1
  • SUSE Linux Enterprise Server 12-SP4 (s390x x86_64):
    • qemu-kvm-2.11.2-5.13.1
  • SUSE Linux Enterprise Server 12-SP4 (aarch64):
    • qemu-arm-2.11.2-5.13.1
    • qemu-arm-debuginfo-2.11.2-5.13.1
  • SUSE Linux Enterprise Server 12-SP4 (ppc64le):
    • qemu-ppc-2.11.2-5.13.1
    • qemu-ppc-debuginfo-2.11.2-5.13.1
  • SUSE Linux Enterprise Server 12-SP4 (x86_64):
    • qemu-x86-2.11.2-5.13.1
  • SUSE Linux Enterprise Server 12-SP4 (noarch):
    • qemu-ipxe-1.0.0+-5.13.1
    • qemu-seabios-1.11.0-5.13.1
    • qemu-sgabios-8-5.13.1
    • qemu-vgabios-1.11.0-5.13.1
  • SUSE Linux Enterprise Server 12-SP4 (s390x):
    • qemu-s390-2.11.2-5.13.1
    • qemu-s390-debuginfo-2.11.2-5.13.1
  • SUSE Linux Enterprise Desktop 12-SP4 (noarch):
    • qemu-ipxe-1.0.0+-5.13.1
    • qemu-seabios-1.11.0-5.13.1
    • qemu-sgabios-8-5.13.1
    • qemu-vgabios-1.11.0-5.13.1
  • SUSE Linux Enterprise Desktop 12-SP4 (x86_64):
    • qemu-2.11.2-5.13.1
    • qemu-block-curl-2.11.2-5.13.1
    • qemu-block-curl-debuginfo-2.11.2-5.13.1
    • qemu-debugsource-2.11.2-5.13.1
    • qemu-kvm-2.11.2-5.13.1
    • qemu-tools-2.11.2-5.13.1
    • qemu-tools-debuginfo-2.11.2-5.13.1
    • qemu-x86-2.11.2-5.13.1

References: