Описание
Security update for qemu
qemu was updated to fix several security issues and bugs.
The following vulnerabilities were fixed:
- CVE-2015-5154: Heap-based buffer overflow in the IDE subsystem in QEMU, when the container has a CDROM drive enabled, allows local guest users to execute arbitrary code on the host via unspecified ATAPI commands. (bsc#938344).
- CVE-2015-5278: QEMU was vulnerable to an infinite loop issue that could occur when receiving packets over the network. (bsc#945989)
- CVE-2015-5279: QEMU was vulnerable to a heap buffer overflow issue that could occur when receiving packets over the network. (bsc#945987)
- CVE-2015-6855: QEMU was vulnerable to a divide by zero issue that could occur while executing an IDE command WIN_READ_NATIVE_MAX to determine the maximum size of a drive. (bsc#945404)
- CVE-2014-7815: The set_pixel_format function in ui/vnc.c in QEMU allowed remote attackers to cause a denial of service (crash) via a small bytes_per_pixel value. (bsc#902737):
Also these non-security issues were fixed:
- bsc#937572: Fixed dictzip on big endian systems
- bsc#934517: Fix 'info tlb' causes guest to freeze
- bsc#934506: Fix vte monitor consol looks empy
- bsc#937125: Fix parsing of scsi-disk wwn uint64 property
- bsc#945778: Drop .probe hooks for DictZip and tar block drivers
- bsc#937572: Fold common-obj-y -> block-obj-y change into original patches
- bsc#928308,bsc#944017: Fix virtio-ccw index errors when initrd gets too large
- bsc#936537: Fix possible qemu-img error when converting to compressed qcow2 image
- bsc#939216: Fix reboot fail after install using uefi
- bsc#943446: qemu-img convert doesn't create MB aligned VHDs anymore
Список пакетов
SUSE Linux Enterprise Desktop 12
SUSE Linux Enterprise Server 12
SUSE Linux Enterprise Server for SAP Applications 12
Ссылки
- Link for SUSE-SU-2015:1782-1
- E-Mail link for SUSE-SU-2015:1782-1
- SUSE Security Ratings
- SUSE Bug 902737
- SUSE Bug 928308
- SUSE Bug 934506
- SUSE Bug 934517
- SUSE Bug 936537
- SUSE Bug 937125
- SUSE Bug 937572
- SUSE Bug 938344
- SUSE Bug 939216
- SUSE Bug 943446
- SUSE Bug 944017
- SUSE Bug 945404
- SUSE Bug 945778
- SUSE Bug 945987
- SUSE Bug 945989
- SUSE CVE CVE-2014-7815 page
- SUSE CVE CVE-2015-5154 page
Описание
The set_pixel_format function in ui/vnc.c in QEMU allows remote attackers to cause a denial of service (crash) via a small bytes_per_pixel value.
Затронутые продукты
Ссылки
- CVE-2014-7815
- SUSE Bug 902737
- SUSE Bug 962627
Описание
Heap-based buffer overflow in the IDE subsystem in QEMU, as used in Xen 4.5.x and earlier, when the container has a CDROM drive enabled, allows local guest users to execute arbitrary code on the host via unspecified ATAPI commands.
Затронутые продукты
Ссылки
- CVE-2015-5154
- SUSE Bug 938344
- SUSE Bug 950367
Описание
The ne2000_receive function in hw/net/ne2000.c in QEMU before 2.4.0.1 allows attackers to cause a denial of service (infinite loop and instance crash) or possibly execute arbitrary code via vectors related to receiving packets.
Затронутые продукты
Ссылки
- CVE-2015-5278
- SUSE Bug 945989
- SUSE Bug 964947
Описание
Heap-based buffer overflow in the ne2000_receive function in hw/net/ne2000.c in QEMU before 2.4.0.1 allows guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via vectors related to receiving packets.
Затронутые продукты
Ссылки
- CVE-2015-5279
- SUSE Bug 945987
Описание
hw/ide/core.c in QEMU does not properly restrict the commands accepted by an ATAPI device, which allows guest users to cause a denial of service or possibly have unspecified other impact via certain IDE commands, as demonstrated by a WIN_READ_NATIVE_MAX command to an empty drive, which triggers a divide-by-zero error and instance crash.
Затронутые продукты
Ссылки
- CVE-2015-6855
- SUSE Bug 945404
- SUSE Bug 965156