File _patchinfo of Package patchinfo.11142
<patchinfo incident="11142">
<issue tracker="bnc" id="1130675">VUL-0: CVE-2018-20815: qemu: device_tree: heap buffer overflow while loading device tree blob</issue>
<issue tracker="bnc" id="1111331">VUL-0: EMBARGOED: CPU issues Q2 2019 aka "Group 4"</issue>
<issue tracker="bnc" id="1126455">VUL-0: CVE-2019-8934: kvm,qemu: ppc64: sPAPR emulator leaks the host hardware identity</issue>
<issue tracker="bnc" id="1125721">VUL-0: CVE-2019-3812: qemu: Out-of-bounds read in hw/i2c/i2c-ddc.c allows for memory disclosure</issue>
<issue tracker="bnc" id="1129622">VUL-1: CVE-2019-9824: kvm,qemu: information leakage in tcp_emu() due to uninitialized stack variables</issue>
<issue tracker="cve" id="2018-12126"/>
<issue tracker="cve" id="2018-12127"/>
<issue tracker="cve" id="2018-20815"/>
<issue tracker="cve" id="2019-11091"/>
<issue tracker="cve" id="2019-8934"/>
<issue tracker="cve" id="2019-9824"/>
<issue tracker="cve" id="2019-3812"/>
<issue tracker="cve" id="2018-12130"/>
<category>security</category>
<rating>important</rating>
<packager>bfrogers</packager>
<description>This update for qemu fixes the following issues:
Security issues fixed:
- CVE-2019-9824: Fixed an information leak in slirp (bsc#1129622)
- CVE-2019-8934: Added method to specify whether or not to expose certain ppc64 host
information, which can be considered a security issue (bsc#1126455)
- CVE-2019-3812: Fixed OOB memory access and information leak in virtual monitor interface (bsc#1125721)
- CVE-2018-20815: Fix DOS possibility in device tree processing (bsc#1130675)
- Adjust fix for CVE-2019-8934 (bsc#1126455) to match the latest
upstream adjustments for the same. Basically now the security fix
is to provide a dummy host-model and host-serial value, which
overrides getting that value from the host
- CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2019-11091: Added x86 cpu feature "md-clear" (bsc#1111331)
Other bugs fixed:
- Use a new approach to handling the file input to -smbios option,
which accepts either legacy or per-spec formats regardless of the
machine type.
</description>
<summary>Security update for qemu</summary>
</patchinfo>