You are here
Home > Preporuke > Sigurnosni nedostatak programskog paketa qemu

Sigurnosni nedostatak programskog paketa qemu

openSUSE Security Update: Security update for qemu
______________________________________________________________________________

Announcement ID: openSUSE-SU-2015:0893-1
Rating: important
References: #929339
Cross-References: CVE-2015-3456
Affected Products:
openSUSE 13.2
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:

Qemu was updated to v2.1.3: See http://wiki.qemu-project.org/ChangeLog/2.1
for more information.

This update includes a security fix:
* CVE-2015-3456: Fixed a buffer overflow in the floppy drive emulation,
which could be used to denial of service attacks or potential code
execution against the host.

Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– openSUSE 13.2:

zypper in -t patch openSUSE-2015-364=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– openSUSE 13.2 (i586 x86_64):

libcacard-debugsource-2.1.3-4.1
libcacard-devel-2.1.3-4.1
libcacard0-2.1.3-4.1
libcacard0-debuginfo-2.1.3-4.1
qemu-2.1.3-4.1
qemu-arm-2.1.3-4.1
qemu-arm-debuginfo-2.1.3-4.1
qemu-block-curl-2.1.3-4.1
qemu-block-curl-debuginfo-2.1.3-4.1
qemu-debugsource-2.1.3-4.1
qemu-extra-2.1.3-4.1
qemu-extra-debuginfo-2.1.3-4.1
qemu-guest-agent-2.1.3-4.1
qemu-guest-agent-debuginfo-2.1.3-4.1
qemu-ksm-2.1.3-4.1
qemu-kvm-2.1.3-4.1
qemu-lang-2.1.3-4.1
qemu-linux-user-2.1.3-4.1
qemu-linux-user-debuginfo-2.1.3-4.1
qemu-linux-user-debugsource-2.1.3-4.1
qemu-ppc-2.1.3-4.1
qemu-ppc-debuginfo-2.1.3-4.1
qemu-s390-2.1.3-4.1
qemu-s390-debuginfo-2.1.3-4.1
qemu-tools-2.1.3-4.1
qemu-tools-debuginfo-2.1.3-4.1
qemu-x86-2.1.3-4.1
qemu-x86-debuginfo-2.1.3-4.1

– openSUSE 13.2 (noarch):

qemu-ipxe-1.0.0-4.1
qemu-seabios-1.7.5-4.1
qemu-sgabios-8-4.1
qemu-vgabios-1.7.5-4.1

References:

https://www.suse.com/security/cve/CVE-2015-3456.html
https://bugzilla.suse.com/929339


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

openSUSE Security Update: Security update for qemu
______________________________________________________________________________

Announcement ID: openSUSE-SU-2015:0894-1
Rating: important
References: #929339
Cross-References: CVE-2015-3456
Affected Products:
openSUSE 13.1
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:

qemu was updated to fix a security issue:

* CVE-2015-3456: Fixed a buffer overflow in the floppy drive emulation,
which could be used to denial of service attacks or potential code
execution against the host.

Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– openSUSE 13.1:

zypper in -t patch openSUSE-2015-363=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– openSUSE 13.1 (i586 x86_64):

qemu-1.6.2-4.8.1
qemu-debuginfo-1.6.2-4.8.1
qemu-debugsource-1.6.2-4.8.1
qemu-guest-agent-1.6.2-4.8.1
qemu-guest-agent-debuginfo-1.6.2-4.8.1
qemu-lang-1.6.2-4.8.1
qemu-linux-user-1.6.2-4.8.1
qemu-linux-user-debuginfo-1.6.2-4.8.1
qemu-linux-user-debugsource-1.6.2-4.8.1
qemu-tools-1.6.2-4.8.1
qemu-tools-debuginfo-1.6.2-4.8.1

– openSUSE 13.1 (noarch):

qemu-ipxe-1.0.0-4.8.1
qemu-seabios-1.7.2.2-4.8.1
qemu-sgabios-8-4.8.1
qemu-vgabios-0.6c-4.8.1

References:

https://www.suse.com/security/cve/CVE-2015-3456.html
https://bugzilla.suse.com/929339


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE Security Update: Security update for qemu
______________________________________________________________________________

Announcement ID: SUSE-SU-2015:0896-1
Rating: important
References: #886378 #924018 #929339
Cross-References: CVE-2015-1779 CVE-2015-3456
Affected Products:
SUSE Linux Enterprise Server 12
SUSE Linux Enterprise Desktop 12
______________________________________________________________________________

An update that solves two vulnerabilities and has one
errata is now available.

Description:

qemu / kvm was updated to fix a security issue and some bugs.

Security issue fixed:

* CVE-2015-3456: Fixed a buffer overflow in the floppy drive emulation,
which could be used to denial of service attacks or potential code
execution against the host.

* CVE-2015-1779: Fixed insufficient resource limiting in the VNC
websockets decoder.

Bugs fixed:
– qemu truncates vhd images in virt-rescue (bsc#886378)

– Update kvm-supported.txt with the current rbd support status.

– enable rbd build on x86_64 (qemu-block-rbd package) (FATE#318349)

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server 12:

zypper in -t patch SUSE-SLE-SERVER-12-2015-200=1

– SUSE Linux Enterprise Desktop 12:

zypper in -t patch SUSE-SLE-DESKTOP-12-2015-200=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64):

qemu-2.0.2-46.1
qemu-block-curl-2.0.2-46.1
qemu-block-curl-debuginfo-2.0.2-46.1
qemu-debugsource-2.0.2-46.1
qemu-guest-agent-2.0.2-46.1
qemu-guest-agent-debuginfo-2.0.2-46.1
qemu-lang-2.0.2-46.1
qemu-tools-2.0.2-46.1
qemu-tools-debuginfo-2.0.2-46.1

– SUSE Linux Enterprise Server 12 (s390x x86_64):

qemu-kvm-2.0.2-46.1

– SUSE Linux Enterprise Server 12 (ppc64le):

qemu-ppc-2.0.2-46.1
qemu-ppc-debuginfo-2.0.2-46.1

– SUSE Linux Enterprise Server 12 (noarch):

qemu-ipxe-1.0.0-46.1
qemu-seabios-1.7.4-46.1
qemu-sgabios-8-46.1
qemu-vgabios-1.7.4-46.1

– SUSE Linux Enterprise Server 12 (x86_64):

qemu-block-rbd-2.0.2-46.1
qemu-block-rbd-debuginfo-2.0.2-46.1
qemu-x86-2.0.2-46.1
qemu-x86-debuginfo-2.0.2-46.1

– SUSE Linux Enterprise Server 12 (s390x):

qemu-s390-2.0.2-46.1
qemu-s390-debuginfo-2.0.2-46.1

– SUSE Linux Enterprise Desktop 12 (x86_64):

qemu-2.0.2-46.1
qemu-block-curl-2.0.2-46.1
qemu-block-curl-debuginfo-2.0.2-46.1
qemu-debugsource-2.0.2-46.1
qemu-kvm-2.0.2-46.1
qemu-tools-2.0.2-46.1
qemu-tools-debuginfo-2.0.2-46.1
qemu-x86-2.0.2-46.1
qemu-x86-debuginfo-2.0.2-46.1

– SUSE Linux Enterprise Desktop 12 (noarch):

qemu-ipxe-1.0.0-46.1
qemu-seabios-1.7.4-46.1
qemu-sgabios-8-46.1
qemu-vgabios-1.7.4-46.1

References:

https://www.suse.com/security/cve/CVE-2015-1779.html
https://www.suse.com/security/cve/CVE-2015-3456.html
https://bugzilla.suse.com/886378
https://bugzilla.suse.com/924018
https://bugzilla.suse.com/929339


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

Top
More in Preporuke
Sigurnosni propust programskog paketa xen

Otkriven je sigurnosni propust u programskom paketu xen za operacijski sustav Debian. Otkriveni propust potencijalnim napadačima omogućuje izvršavanje proizvoljnog programskog...

Close