File _patchinfo of Package patchinfo.8001
<patchinfo incident="8001">
<issue tracker="bnc" id="1091695">SEV guest will not lauchh with qemu-system-x86_64 version 2.11.1</issue>
<issue tracker="bnc" id="1094898">qemu-guest-agent service doesn't work in version Leap 15.0</issue>
<issue tracker="bnc" id="1096223">VUL-0: CVE-2018-11806: kvm,qemu: slirp: heap buffer overflow while reassembling fragmented datagrams</issue>
<issue tracker="bnc" id="1094725">L3: `virsh blockresize` does not work with Xen qdisks</issue>
<issue tracker="bnc" id="1094913">SLES 15 - QEMU crashes when starting a guest with more than 7.999TB</issue>
<issue id="1083291" tracker="bnc">VUL-0: CVE-2018-7550 qemu, kvm: i386: multiboot OOB access while loading kernel image</issue>
<issue tracker="bnc" id="1087082">VUL-0: CVE-2018-3639: V4 - Speculative Store Bypass aka "Memory Disambiguation"</issue>
<issue tracker="cve" id="2018-7550"/>
<issue tracker="cve" id="2018-11806"/>
<issue tracker="cve" id="2018-3639"/>
<issue tracker="fate" id="325467"/>
<issue tracker="fate" id="322124"/>
<category>security</category>
<rating>moderate</rating>
<packager>bfrogers</packager>
<description>This update for qemu to version 2.11.2 fixes the following issues:
Security issue fixed:
- CVE-2018-11806: Fix heap buffer overflow issue that can happen while reassembling fragmented datagrams (bsc#1096223).
- CVE-2018-3639: Mitigation functionality for Speculative Store Bypass issue in x86 (bsc#1087082).
- CVE-2018-7550: Fix out of bounds read and write memory access, potentially leading to code execution (bsc#1083291)
Bug fixes:
- bsc#1091695: SEV guest will not lauchh with qemu-system-x86_64 version 2.11.1.
- bsc#1094898: qemu-guest-agent service doesn't work in version Leap 15.0.
- bsc#1094725: `virsh blockresize` does not work with Xen qdisks.
- bsc#1094913: QEMU crashes when starting a guest with more than 7.999TB.
</description>
<summary>Security update for qemu</summary>
</patchinfo>