SUSE Security Update: Security update for qemu
______________________________________________________________________________

Announcement ID:    SUSE-SU-2019:0471-1
Rating:             important
References:         #1116717 #1117275 #1119493 #1123156 
Cross-References:   CVE-2018-16872 CVE-2018-19364 CVE-2018-19489
                    CVE-2019-6778
Affected Products:
                    SUSE Linux Enterprise Server 12-SP1-LTSS
______________________________________________________________________________

   An update that fixes four vulnerabilities is now available.

Description:

   This update for qemu fixes the following issues:

   Security issue fixed:

   - CVE-2019-6778: Fixed a heap buffer overflow issue in the SLiRP
     networking implementation (bsc#1123156).
   - CVE-2018-16872: Fixed a host security vulnerability related to handling
     symlinks in usb-mtp (bsc#1119493).
   - CVE-2018-19489: Fixed a denial of service vulnerability in virtfs
     (bsc#1117275).
   - CVE-2018-19364: Fixed a use-after-free if the virtfs interface resulting
     in a denial of service (bsc#1116717).


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Server 12-SP1-LTSS:

      zypper in -t patch SUSE-SLE-SERVER-12-SP1-2019-471=1



Package List:

   - SUSE Linux Enterprise Server 12-SP1-LTSS (ppc64le s390x x86_64):

      qemu-2.3.1-33.20.1
      qemu-block-curl-2.3.1-33.20.1
      qemu-block-curl-debuginfo-2.3.1-33.20.1
      qemu-debugsource-2.3.1-33.20.1
      qemu-guest-agent-2.3.1-33.20.1
      qemu-guest-agent-debuginfo-2.3.1-33.20.1
      qemu-lang-2.3.1-33.20.1
      qemu-tools-2.3.1-33.20.1
      qemu-tools-debuginfo-2.3.1-33.20.1

   - SUSE Linux Enterprise Server 12-SP1-LTSS (s390x x86_64):

      qemu-kvm-2.3.1-33.20.1

   - SUSE Linux Enterprise Server 12-SP1-LTSS (ppc64le):

      qemu-ppc-2.3.1-33.20.1
      qemu-ppc-debuginfo-2.3.1-33.20.1

   - SUSE Linux Enterprise Server 12-SP1-LTSS (noarch):

      qemu-ipxe-1.0.0-33.20.1
      qemu-seabios-1.8.1-33.20.1
      qemu-sgabios-8-33.20.1
      qemu-vgabios-1.8.1-33.20.1

   - SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64):

      qemu-block-rbd-2.3.1-33.20.1
      qemu-block-rbd-debuginfo-2.3.1-33.20.1
      qemu-x86-2.3.1-33.20.1

   - SUSE Linux Enterprise Server 12-SP1-LTSS (s390x):

      qemu-s390-2.3.1-33.20.1
      qemu-s390-debuginfo-2.3.1-33.20.1


References:

   https://www.suse.com/security/cve/CVE-2018-16872.html
   https://www.suse.com/security/cve/CVE-2018-19364.html
   https://www.suse.com/security/cve/CVE-2018-19489.html
   https://www.suse.com/security/cve/CVE-2019-6778.html
   https://bugzilla.suse.com/1116717
   https://bugzilla.suse.com/1117275
   https://bugzilla.suse.com/1119493
   https://bugzilla.suse.com/1123156

_______________________________________________
sle-security-updates mailing list
sle-security-updates@lists.suse.com
http://lists.suse.com/mailman/listinfo/sle-security-updates

SUSE: 2019:0471-1 important: qemu

February 22, 2019
An update that fixes four vulnerabilities is now available

Summary

This update for qemu fixes the following issues: Security issue fixed: - CVE-2019-6778: Fixed a heap buffer overflow issue in the SLiRP networking implementation (bsc#1123156). - CVE-2018-16872: Fixed a host security vulnerability related to handling symlinks in usb-mtp (bsc#1119493). - CVE-2018-19489: Fixed a denial of service vulnerability in virtfs (bsc#1117275). - CVE-2018-19364: Fixed a use-after-free if the virtfs interface resulting in a denial of service (bsc#1116717). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 12-SP1-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-SP1-2019-471=1 Package List: - SUSE Linux Enterprise Server 12-SP1-LTSS (ppc64le s390x x86_64): qemu-2.3.1-33.20.1 qemu-block-curl-2.3.1-33.20.1 qemu-block-curl-debuginfo-2.3.1-33.20.1 qemu-debugsource-2.3.1-33.20.1 qemu-guest-agent-2.3.1-33.20.1 qemu-guest-agent-debuginfo-2.3.1-33.20.1 qemu-lang-2.3.1-33.20.1 qemu-tools-2.3.1-33.20.1 qemu-tools-debuginfo-2.3.1-33.20.1 - SUSE Linux Enterprise Server 12-SP1-LTSS (s390x x86_64): qemu-kvm-2.3.1-33.20.1 - SUSE Linux Enterprise Server 12-SP1-LTSS (ppc64le): qemu-ppc-2.3.1-33.20.1 qemu-ppc-debuginfo-2.3.1-33.20.1 - SUSE Linux Enterprise Server 12-SP1-LTSS (noarch): qemu-ipxe-1.0.0-33.20.1 qemu-seabios-1.8.1-33.20.1 qemu-sgabios-8-33.20.1 qemu-vgabios-1.8.1-33.20.1 - SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64): qemu-block-rbd-2.3.1-33.20.1 qemu-block-rbd-debuginfo-2.3.1-33.20.1 qemu-x86-2.3.1-33.20.1 - SUSE Linux Enterprise Server 12-SP1-LTSS (s390x): qemu-s390-2.3.1-33.20.1 qemu-s390-debuginfo-2.3.1-33.20.1

References

#1116717 #1117275 #1119493 #1123156

Cross- CVE-2018-16872 CVE-2018-19364 CVE-2018-19489

CVE-2019-6778

Affected Products:

SUSE Linux Enterprise Server 12-SP1-LTSS

https://www.suse.com/security/cve/CVE-2018-16872.html

https://www.suse.com/security/cve/CVE-2018-19364.html

https://www.suse.com/security/cve/CVE-2018-19489.html

https://www.suse.com/security/cve/CVE-2019-6778.html

https://bugzilla.suse.com/1116717

https://bugzilla.suse.com/1117275

https://bugzilla.suse.com/1119493

https://bugzilla.suse.com/1123156

Severity
Announcement ID: SUSE-SU-2019:0471-1
Rating: important

Related News