Security update for qemu

This update for qemu to version 2.11.2 fixes the following issues:

Security issue fixed:

- CVE-2018-11806: Fix heap buffer overflow issue that can happen while reassembling fragmented datagrams (bsc#1096223).
- CVE-2018-3639: Mitigation functionality for Speculative Store Bypass issue in x86 (bsc#1087082).
- CVE-2018-7550: Fix out of bounds read and write memory access, potentially leading to code execution (bsc#1083291)

Bug fixes:

- bsc#1091695: SEV guest will not lauchh with qemu-system-x86_64 version 2.11.1.
- bsc#1094898: qemu-guest-agent service doesn't work in version Leap 15.0.
- bsc#1094725: `virsh blockresize` does not work with Xen qdisks.
- bsc#1094913: QEMU crashes when starting a guest with more than 7.999TB.

This update was imported from the SUSE:SLE-15:Update update project.

Fixed bugs
bnc#1091695
SEV guest will not lauchh with qemu-system-x86_64 version 2.11.1
bnc#1094898
qemu-guest-agent service doesn't work in version Leap 15.0
bnc#1096223
VUL-0: CVE-2018-11806: kvm,qemu: slirp: heap buffer overflow while reassembling fragmented datagrams
bnc#1094725
L3: `virsh blockresize` does not work with Xen qdisks
bnc#1094913
SLES 15 - QEMU crashes when starting a guest with more than 7.999TB
bnc#1083291
VUL-0: CVE-2018-7550 qemu, kvm: i386: multiboot OOB access while loading kernel image
bnc#1087082
VUL-0: CVE-2018-3639: V4 - Speculative Store Bypass aka "Memory Disambiguation"
Selected Binaries
openSUSE Build Service is sponsored by