[SUSE-SU-2018:1362-2] Security update for qemu

Severity Important
Affected Packages 13
CVEs 1

Security update for qemu

This update for qemu fixes several issues.

This security issue was fixed:

  • CVE-2018-3639: Spectre v4 vulnerability mitigation support for KVM guests (bsc#1092885).

    Systems with microprocessors utilizing speculative execution and speculative
    execution of memory reads before the addresses of all prior memory writes are
    known may allow unauthorized disclosure of information to an attacker with
    local user access via a side-channel analysis.

    This patch permits the new x86 cpu feature flag named 'ssbd' to be
    presented to the guest, given that the host has this feature, and
    KVM exposes it to the guest as well.

    For this feature to be enabled please use the qemu commandline
    -cpu $MODEL,+spec-ctrl,+ssbd
    so the guest OS can take advantage of the feature.

    spec-ctrl and ssbd support is also required in the host.

This feature was added:

  • Add support for block resize support for xen disks through the monitor

This non-security issue was fixed:

  • bsc#1079405: Add new look up path 'sys/class/tpm' for tpm cancel path based on Linux 4.0 change
ID
SUSE-SU-2018:1362-2
Severity
important
URL
https://www.suse.com/support/update/announcement/2018/suse-su-20181362-2/
Published
2018-10-18T12:45:32
(6 years ago)
Modified
2018-10-18T12:45:32
(6 years ago)
Rights
Copyright 2024 SUSE LLC. All rights reserved.
Other Advisories
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:rpm/suse/qemu?arch=x86_64&distro=sles-12&sp=2 suse qemu < 2.6.2-41.40.1 sles-12 x86_64
Affected pkg:rpm/suse/qemu-x86?arch=x86_64&distro=sles-12&sp=2 suse qemu-x86 < 2.6.2-41.40.1 sles-12 x86_64
Affected pkg:rpm/suse/qemu-vgabios?arch=noarch&distro=sles-12&sp=2 suse qemu-vgabios < 1.9.1-41.40.1 sles-12 noarch
Affected pkg:rpm/suse/qemu-tools?arch=x86_64&distro=sles-12&sp=2 suse qemu-tools < 2.6.2-41.40.1 sles-12 x86_64
Affected pkg:rpm/suse/qemu-sgabios?arch=noarch&distro=sles-12&sp=2 suse qemu-sgabios < 8-41.40.1 sles-12 noarch
Affected pkg:rpm/suse/qemu-seabios?arch=noarch&distro=sles-12&sp=2 suse qemu-seabios < 1.9.1-41.40.1 sles-12 noarch
Affected pkg:rpm/suse/qemu-lang?arch=x86_64&distro=sles-12&sp=2 suse qemu-lang < 2.6.2-41.40.1 sles-12 x86_64
Affected pkg:rpm/suse/qemu-kvm?arch=x86_64&distro=sles-12&sp=2 suse qemu-kvm < 2.6.2-41.40.1 sles-12 x86_64
Affected pkg:rpm/suse/qemu-ipxe?arch=noarch&distro=sles-12&sp=2 suse qemu-ipxe < 1.0.0-41.40.1 sles-12 noarch
Affected pkg:rpm/suse/qemu-guest-agent?arch=x86_64&distro=sles-12&sp=2 suse qemu-guest-agent < 2.6.2-41.40.1 sles-12 x86_64
Affected pkg:rpm/suse/qemu-block-ssh?arch=x86_64&distro=sles-12&sp=2 suse qemu-block-ssh < 2.6.2-41.40.1 sles-12 x86_64
Affected pkg:rpm/suse/qemu-block-rbd?arch=x86_64&distro=sles-12&sp=2 suse qemu-block-rbd < 2.6.2-41.40.1 sles-12 x86_64
Affected pkg:rpm/suse/qemu-block-curl?arch=x86_64&distro=sles-12&sp=2 suse qemu-block-curl < 2.6.2-41.40.1 sles-12 x86_64
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...