Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2015-3209 (GCVE-0-2015-3209)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:39:31.977Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-2630-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2630-1" }, { "name": "SUSE-SU-2015:1152", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00027.html" }, { "name": "RHSA-2015:1087", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1087.html" }, { "name": "SUSE-SU-2015:1519", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00015.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kb.juniper.net/JSA10783" }, { "name": "FEDORA-2015-10001", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160669.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10698" }, { "name": "DSA-3286", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3286" }, { "name": "FEDORA-2015-9978", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160677.html" }, { "name": "SUSE-SU-2015:1156", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00029.html" }, { "name": "RHSA-2015:1088", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1088.html" }, { "name": "RHSA-2015:1089", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1089.html" }, { "name": "SUSE-SU-2015:1643", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00027.html" }, { "name": "GLSA-201510-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201510-02" }, { "name": "SUSE-SU-2015:1206", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00014.html" }, { "name": "DSA-3284", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3284" }, { "name": "75123", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/75123" }, { "name": "SUSE-SU-2015:1157", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html" }, { "name": "1032545", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1032545" }, { "name": "SUSE-SU-2015:1045", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://xenbits.xen.org/xsa/advisory-135.html" }, { "name": "SUSE-SU-2015:1426", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00020.html" }, { "name": "GLSA-201604-03", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201604-03" }, { "name": "RHSA-2015:1189", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1189.html" }, { "name": "SUSE-SU-2015:1042", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html" }, { "name": "FEDORA-2015-9965", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160685.html" }, { "name": "DSA-3285", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3285" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1180-security-advisory-13" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-06-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-26T13:58:46", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "USN-2630-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2630-1" }, { "name": "SUSE-SU-2015:1152", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00027.html" }, { "name": "RHSA-2015:1087", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1087.html" }, { "name": "SUSE-SU-2015:1519", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00015.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kb.juniper.net/JSA10783" }, { "name": "FEDORA-2015-10001", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160669.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10698" }, { "name": "DSA-3286", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2015/dsa-3286" }, { "name": "FEDORA-2015-9978", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160677.html" }, { "name": "SUSE-SU-2015:1156", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00029.html" }, { "name": "RHSA-2015:1088", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1088.html" }, { "name": "RHSA-2015:1089", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1089.html" }, { "name": "SUSE-SU-2015:1643", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00027.html" }, { "name": "GLSA-201510-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201510-02" }, { "name": "SUSE-SU-2015:1206", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00014.html" }, { "name": "DSA-3284", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2015/dsa-3284" }, { "name": "75123", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/75123" }, { "name": "SUSE-SU-2015:1157", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html" }, { "name": "1032545", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1032545" }, { "name": "SUSE-SU-2015:1045", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://xenbits.xen.org/xsa/advisory-135.html" }, { "name": "SUSE-SU-2015:1426", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00020.html" }, { "name": "GLSA-201604-03", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201604-03" }, { "name": "RHSA-2015:1189", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1189.html" }, { "name": "SUSE-SU-2015:1042", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html" }, { "name": "FEDORA-2015-9965", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160685.html" }, { "name": "DSA-3285", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2015/dsa-3285" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1180-security-advisory-13" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2015-3209", "datePublished": "2015-06-15T15:00:00", "dateReserved": "2015-04-10T00:00:00", "dateUpdated": "2024-08-06T05:39:31.977Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2015-3209\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2015-06-15T15:59:00.070\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.\"},{\"lang\":\"es\",\"value\":\"Desbordamiento de buffer basado en memoria din\u00e1mica en el controlador PCNET en QEMU permite a atacantes remotos ejecutar c\u00f3digo arbitrario mediante el env\u00edo de un paquete con el juego TXSTATUS_STARTPACKET y posteriormente un paquete manipulado con el juego TXSTATUS_DEVICEOWNS.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.3.1\",\"matchCriteriaId\":\"19E6775C-BA58-4D7E-96AB-9283C99D9641\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:juniper:junos_space:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"15.1\",\"matchCriteriaId\":\"6133CA80-A291-487F-AE06-85D4AA154727\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*\",\"matchCriteriaId\":\"8D305F7A-D159-4716-AB26-5E38BB5CD991\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*\",\"matchCriteriaId\":\"815D70A8-47D3-459C-A32C-9FEACA0659D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49A63F39-30BE-443F-AF10-6245587D3359\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F38D3B7E-8429-473F-BB31-FC3583EE5A5B\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16F59A04-14CF-49E2-9973-645477EA09DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"319EC0C6-94C5-494A-9C5D-DC5124DFC8E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54D669D4-6D7E-449D-80C1-28FA44F06FFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BBCD86A-E6C7-4444-9D74-F861084090F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16E6D998-B41D-4B49-9E00-8336D2E40A4A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13E02156-E748-4820-B76F-7074793837E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0AC5CD5-6E58-433C-9EB3-6DFE5656463E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5ED5807-55B7-47C5-97A6-03233F4FBC3A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B152EDF3-3140-4343-802F-F4F1C329F5C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D86166F9-BBF0-4650-8CCD-0F9C97104D21\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF47C9F0-D8DA-4B55-89EB-9B2C9383ADB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56BDB5A0-0839-4A20-A003-B8CD56F48171\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"253C303A-E577-4488-93E6-68A8DD942C38\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5900A25-FDD7-4900-BF7C-F3ECCB714D2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*\",\"matchCriteriaId\":\"3ED68ADD-BBDA-4485-BC76-58F011D72311\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2DF4815-B8CB-4AD3-B91D-2E09A8E318E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*\",\"matchCriteriaId\":\"35BBD83D-BDC7-4678-BE94-639F59281139\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:*:*:*\",\"matchCriteriaId\":\"67960FB9-13D1-4DEE-8158-31BF31BCBE6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*\",\"matchCriteriaId\":\"CB6476C7-03F2-4939-AB85-69AA524516D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*\",\"matchCriteriaId\":\"E534C201-BCC5-473C-AAA7-AAB97CEB5437\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"15FC9014-BD85-4382-9D04-C0703E901D7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F7F8866-DEAD-44D1-AB10-21EE611AA026\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"1831D45A-EE6E-4220-8F8C-248B69520948\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:4.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDDF9823-D999-41A4-BB7B-A63C00ACE11B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:4.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51F7426A-46F7-4BE0-806F-F4598C8B0426\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:4.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7F71EBA-27AC-464B-8708-4E8971BC75A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:4.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8705CF80-DEFC-4425-8E23-D98FFD678157\"}]}]}],\"references\":[{\"url\":\"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10698\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160669.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160677.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160685.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00027.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00029.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00014.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00020.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00015.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00027.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-1087.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-1088.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-1089.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-1189.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2015/dsa-3284\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2015/dsa-3285\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2015/dsa-3286\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/75123\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1032545\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2630-1\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://xenbits.xen.org/xsa/advisory-135.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://kb.juniper.net/JSA10783\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201510-02\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201604-03\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.arista.com/en/support/advisories-notices/security-advisories/1180-security-advisory-13\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10698\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160669.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160677.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160685.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00027.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00029.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00014.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00020.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00015.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00027.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-1087.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-1088.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-1089.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-1189.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2015/dsa-3284\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2015/dsa-3285\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2015/dsa-3286\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/75123\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1032545\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2630-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://xenbits.xen.org/xsa/advisory-135.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://kb.juniper.net/JSA10783\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201510-02\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201604-03\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.arista.com/en/support/advisories-notices/security-advisories/1180-security-advisory-13\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
suse-su-2015:1152-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for kvm", "title": "Title of the patch" }, { "category": "description", "text": "\nkvm has been updated to fix issues in the embedded qemu:\n\n * \n\n CVE-2014-0223: An integer overflow flaw was found in the QEMU block\n driver for QCOW version 1 disk images. A user able to alter the QEMU\n disk image files loaded by a guest could have used this flaw to\n corrupt QEMU process memory on the host, which could potentially have\n resulted in arbitrary code execution on the host with the privileges\n of the QEMU process.\n\n * \n\n CVE-2014-3461: A user able to alter the savevm data (either on the\n disk or over the wire during migration) could have used this flaw to\n to corrupt QEMU process memory on the (destination) host, which could\n have potentially resulted in arbitrary code execution on the host\n with the privileges of the QEMU process.\n\n * \n\n CVE-2014-0222: An integer overflow flaw was found in the QEMU block\n driver for QCOW version 1 disk images. A user able to alter the QEMU\n disk image files loaded by a guest could have used this flaw to\n corrupt QEMU process memory on the host, which could have potentially\n resulted in arbitrary code execution on the host with the privileges\n of the QEMU process.\n\nNon-security bugs fixed:\n\n * Fix exceeding IRQ routes that could have caused freezes of guests.\n (bnc#876842)\n * Fix CPUID emulation bugs that may have broken Windows guests with\n newer -cpu types (bnc#886535)\n\nSecurity Issues:\n\n * CVE-2014-0222\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0222\u003e\n * CVE-2014-0223\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0223\u003e\n * CVE-2014-3461\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3461\u003e\n\n", "title": "Description of the patch" }, { "category": "details", "text": "sledsp3-kvm,slessp3-kvm", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_1152-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2015:1152-1", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20151152-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2015:1152-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-June/001465.html" }, { "category": "self", "summary": "SUSE Bug 812836", "url": "https://bugzilla.suse.com/812836" }, { "category": "self", "summary": "SUSE Bug 812983", "url": "https://bugzilla.suse.com/812983" }, { "category": "self", "summary": "SUSE Bug 817593", "url": "https://bugzilla.suse.com/817593" }, { "category": "self", "summary": "SUSE Bug 821819", "url": "https://bugzilla.suse.com/821819" }, { "category": "self", "summary": "SUSE Bug 824340", "url": "https://bugzilla.suse.com/824340" }, { "category": "self", "summary": "SUSE Bug 829800", "url": "https://bugzilla.suse.com/829800" }, { "category": "self", "summary": "SUSE Bug 841080", "url": "https://bugzilla.suse.com/841080" }, { "category": "self", "summary": "SUSE Bug 842006", "url": "https://bugzilla.suse.com/842006" }, { "category": "self", "summary": "SUSE Bug 842088", "url": "https://bugzilla.suse.com/842088" }, { "category": "self", "summary": "SUSE Bug 858858", "url": "https://bugzilla.suse.com/858858" }, { "category": "self", "summary": "SUSE Bug 864391", "url": "https://bugzilla.suse.com/864391" }, { "category": "self", "summary": "SUSE Bug 864649", "url": "https://bugzilla.suse.com/864649" }, { "category": "self", "summary": "SUSE Bug 864650", "url": "https://bugzilla.suse.com/864650" }, { "category": "self", "summary": "SUSE Bug 864653", "url": "https://bugzilla.suse.com/864653" }, { "category": "self", "summary": "SUSE Bug 864655", "url": "https://bugzilla.suse.com/864655" }, { "category": "self", "summary": "SUSE Bug 864665", "url": "https://bugzilla.suse.com/864665" }, { "category": "self", "summary": "SUSE Bug 864671", "url": "https://bugzilla.suse.com/864671" }, { "category": "self", "summary": "SUSE Bug 864673", "url": "https://bugzilla.suse.com/864673" }, { "category": "self", "summary": "SUSE Bug 864678", "url": "https://bugzilla.suse.com/864678" }, { "category": "self", "summary": "SUSE Bug 864682", "url": "https://bugzilla.suse.com/864682" }, { "category": "self", "summary": "SUSE Bug 864769", "url": "https://bugzilla.suse.com/864769" }, { "category": "self", "summary": "SUSE Bug 864796", "url": "https://bugzilla.suse.com/864796" }, { "category": "self", "summary": "SUSE Bug 864801", "url": "https://bugzilla.suse.com/864801" }, { "category": "self", "summary": "SUSE Bug 864802", "url": "https://bugzilla.suse.com/864802" }, { "category": "self", "summary": "SUSE Bug 864804", "url": "https://bugzilla.suse.com/864804" }, { "category": "self", "summary": "SUSE Bug 864805", "url": "https://bugzilla.suse.com/864805" }, { "category": "self", "summary": "SUSE Bug 864811", "url": "https://bugzilla.suse.com/864811" }, { "category": "self", "summary": "SUSE Bug 864812", "url": "https://bugzilla.suse.com/864812" }, { "category": "self", "summary": "SUSE Bug 864814", "url": "https://bugzilla.suse.com/864814" }, { "category": "self", "summary": "SUSE Bug 870439", "url": "https://bugzilla.suse.com/870439" }, { "category": "self", "summary": "SUSE Bug 873235", "url": "https://bugzilla.suse.com/873235" }, { "category": "self", "summary": "SUSE Bug 874749", "url": "https://bugzilla.suse.com/874749" }, { "category": "self", "summary": "SUSE Bug 874788", "url": "https://bugzilla.suse.com/874788" }, { "category": "self", "summary": "SUSE Bug 876842", "url": "https://bugzilla.suse.com/876842" }, { "category": "self", "summary": "SUSE Bug 877642", "url": "https://bugzilla.suse.com/877642" }, { "category": "self", "summary": "SUSE Bug 877645", "url": "https://bugzilla.suse.com/877645" }, { "category": "self", "summary": "SUSE Bug 878541", "url": "https://bugzilla.suse.com/878541" }, { "category": "self", "summary": "SUSE Bug 886535", "url": "https://bugzilla.suse.com/886535" }, { "category": "self", "summary": "SUSE Bug 920571", "url": "https://bugzilla.suse.com/920571" }, { "category": "self", "summary": "SUSE Bug 924018", "url": "https://bugzilla.suse.com/924018" }, { "category": "self", "summary": "SUSE Bug 929339", "url": "https://bugzilla.suse.com/929339" }, { "category": "self", "summary": "SUSE Bug 932267", "url": "https://bugzilla.suse.com/932267" }, { "category": "self", "summary": "SUSE Bug 932770", "url": "https://bugzilla.suse.com/932770" }, { "category": "self", "summary": "SUSE CVE CVE-2013-2016 page", "url": "https://www.suse.com/security/cve/CVE-2013-2016/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4344 page", "url": "https://www.suse.com/security/cve/CVE-2013-4344/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4541 page", "url": "https://www.suse.com/security/cve/CVE-2013-4541/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0142 page", "url": "https://www.suse.com/security/cve/CVE-2014-0142/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0143 page", "url": "https://www.suse.com/security/cve/CVE-2014-0143/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0144 page", "url": "https://www.suse.com/security/cve/CVE-2014-0144/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0145 page", "url": "https://www.suse.com/security/cve/CVE-2014-0145/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0146 page", "url": "https://www.suse.com/security/cve/CVE-2014-0146/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0147 page", "url": "https://www.suse.com/security/cve/CVE-2014-0147/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0150 page", "url": "https://www.suse.com/security/cve/CVE-2014-0150/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0222 page", "url": "https://www.suse.com/security/cve/CVE-2014-0222/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0223 page", "url": "https://www.suse.com/security/cve/CVE-2014-0223/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-2894 page", "url": "https://www.suse.com/security/cve/CVE-2014-2894/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3461 page", "url": "https://www.suse.com/security/cve/CVE-2014-3461/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1779 page", "url": "https://www.suse.com/security/cve/CVE-2015-1779/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3209 page", "url": "https://www.suse.com/security/cve/CVE-2015-3209/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3456 page", "url": "https://www.suse.com/security/cve/CVE-2015-3456/" } ], "title": "Security update for kvm", "tracking": { "current_release_date": "2014-09-19T14:41:45Z", "generator": { "date": "2014-09-19T14:41:45Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2015:1152-1", "initial_release_date": "2014-09-19T14:41:45Z", "revision_history": [ { "date": "2014-09-19T14:41:45Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kvm-1.4.2-0.17.1.i586", "product": { "name": "kvm-1.4.2-0.17.1.i586", "product_id": "kvm-1.4.2-0.17.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "kvm-1.4.2-0.17.1.s390x", "product": { "name": "kvm-1.4.2-0.17.1.s390x", "product_id": "kvm-1.4.2-0.17.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kvm-1.4.2-0.17.1.x86_64", "product": { "name": "kvm-1.4.2-0.17.1.x86_64", "product_id": "kvm-1.4.2-0.17.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 11 SP3", "product": { "name": "SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sled:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3", "product": { "name": "SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product": { "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:11:sp3:teradata" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:11:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-0.17.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586" }, "product_reference": "kvm-1.4.2-0.17.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-0.17.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64" }, "product_reference": "kvm-1.4.2-0.17.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-0.17.1.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586" }, "product_reference": "kvm-1.4.2-0.17.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-0.17.1.s390x as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x" }, "product_reference": "kvm-1.4.2-0.17.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-0.17.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64" }, "product_reference": "kvm-1.4.2-0.17.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-0.17.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586" }, "product_reference": "kvm-1.4.2-0.17.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-0.17.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x" }, "product_reference": "kvm-1.4.2-0.17.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-0.17.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64" }, "product_reference": "kvm-1.4.2-0.17.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-0.17.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586" }, "product_reference": "kvm-1.4.2-0.17.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-0.17.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x" }, "product_reference": "kvm-1.4.2-0.17.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-0.17.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" }, "product_reference": "kvm-1.4.2-0.17.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-2016", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-2016" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way qemu v1.3.0 and later (virtio-rng) validates addresses when guest accesses the config space of a virtio device. If the virtio device has zero/small sized config space, such as virtio-rng, a privileged guest user could use this flaw to access the matching host\u0027s qemu address space and thus increase their privileges on the host.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-2016", "url": "https://www.suse.com/security/cve/CVE-2013-2016" }, { "category": "external", "summary": "SUSE Bug 817593 for CVE-2013-2016", "url": "https://bugzilla.suse.com/817593" }, { "category": "external", "summary": "SUSE Bug 871442 for CVE-2013-2016", "url": "https://bugzilla.suse.com/871442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "important" } ], "title": "CVE-2013-2016" }, { "cve": "CVE-2013-4344", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4344" } ], "notes": [ { "category": "general", "text": "Buffer overflow in the SCSI implementation in QEMU, as used in Xen, when a SCSI controller has more than 256 attached devices, allows local users to gain privileges via a small transfer buffer in a REPORT LUNS command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4344", "url": "https://www.suse.com/security/cve/CVE-2013-4344" }, { "category": "external", "summary": "SUSE Bug 842006 for CVE-2013-4344", "url": "https://bugzilla.suse.com/842006" }, { "category": "external", "summary": "SUSE Bug 871442 for CVE-2013-4344", "url": "https://bugzilla.suse.com/871442" }, { "category": "external", "summary": "SUSE Bug 880751 for CVE-2013-4344", "url": "https://bugzilla.suse.com/880751" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2013-4344" }, { "cve": "CVE-2013-4541", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4541" } ], "notes": [ { "category": "general", "text": "The usb_device_post_load function in hw/usb/bus.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a crafted savevm image, related to a negative setup_len or setup_index value.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4541", "url": "https://www.suse.com/security/cve/CVE-2013-4541" }, { "category": "external", "summary": "SUSE Bug 864802 for CVE-2013-4541", "url": "https://bugzilla.suse.com/864802" }, { "category": "external", "summary": "SUSE Bug 871442 for CVE-2013-4541", "url": "https://bugzilla.suse.com/871442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2013-4541" }, { "cve": "CVE-2014-0142", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0142" } ], "notes": [ { "category": "general", "text": "QEMU, possibly before 2.0.0, allows local users to cause a denial of service (divide-by-zero error and crash) via a zero value in the (1) tracks field to the seek_to_sector function in block/parallels.c or (2) extent_size field in the bochs function in block/bochs.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0142", "url": "https://www.suse.com/security/cve/CVE-2014-0142" }, { "category": "external", "summary": "SUSE Bug 870439 for CVE-2014-0142", "url": "https://bugzilla.suse.com/870439" }, { "category": "external", "summary": "SUSE Bug 871442 for CVE-2014-0142", "url": "https://bugzilla.suse.com/871442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2014-0142" }, { "cve": "CVE-2014-0143", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0143" } ], "notes": [ { "category": "general", "text": "Multiple integer overflows in the block drivers in QEMU, possibly before 2.0.0, allow local users to cause a denial of service (crash) via a crafted catalog size in (1) the parallels_open function in block/parallels.c or (2) bochs_open function in bochs.c, a large L1 table in the (3) qcow2_snapshot_load_tmp in qcow2-snapshot.c or (4) qcow2_grow_l1_table function in qcow2-cluster.c, (5) a large request in the bdrv_check_byte_request function in block.c and other block drivers, (6) crafted cluster indexes in the get_refcount function in qcow2-refcount.c, or (7) a large number of blocks in the cloop_open function in cloop.c, which trigger buffer overflows, memory corruption, large memory allocations and out-of-bounds read and writes.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0143", "url": "https://www.suse.com/security/cve/CVE-2014-0143" }, { "category": "external", "summary": "SUSE Bug 870439 for CVE-2014-0143", "url": "https://bugzilla.suse.com/870439" }, { "category": "external", "summary": "SUSE Bug 871442 for CVE-2014-0143", "url": "https://bugzilla.suse.com/871442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2014-0143" }, { "cve": "CVE-2014-0144", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0144" } ], "notes": [ { "category": "general", "text": "QEMU before 2.0.0 block drivers for CLOOP, QCOW2 version 2 and various other image formats are vulnerable to potential memory corruptions, integer/buffer overflows or crash caused by missing input validations which could allow a remote user to execute arbitrary code on the host with the privileges of the QEMU process.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0144", "url": "https://www.suse.com/security/cve/CVE-2014-0144" }, { "category": "external", "summary": "SUSE Bug 870439 for CVE-2014-0144", "url": "https://bugzilla.suse.com/870439" }, { "category": "external", "summary": "SUSE Bug 871442 for CVE-2014-0144", "url": "https://bugzilla.suse.com/871442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2014-0144" }, { "cve": "CVE-2014-0145", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0145" } ], "notes": [ { "category": "general", "text": "Multiple buffer overflows in QEMU before 1.7.2 and 2.x before 2.0.0, allow local users to cause a denial of service (crash) or possibly execute arbitrary code via a large (1) L1 table in the qcow2_snapshot_load_tmp in the QCOW 2 block driver (block/qcow2-snapshot.c) or (2) uncompressed chunk, (3) chunk length, or (4) number of sectors in the DMG block driver (block/dmg.c).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0145", "url": "https://www.suse.com/security/cve/CVE-2014-0145" }, { "category": "external", "summary": "SUSE Bug 870439 for CVE-2014-0145", "url": "https://bugzilla.suse.com/870439" }, { "category": "external", "summary": "SUSE Bug 871442 for CVE-2014-0145", "url": "https://bugzilla.suse.com/871442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "important" } ], "title": "CVE-2014-0145" }, { "cve": "CVE-2014-0146", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0146" } ], "notes": [ { "category": "general", "text": "The qcow2_open function in the (block/qcow2.c) in QEMU before 1.7.2 and 2.x before 2.0.0 allows local users to cause a denial of service (NULL pointer dereference) via a crafted image which causes an error, related to the initialization of the snapshot_offset and nb_snapshots fields.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0146", "url": "https://www.suse.com/security/cve/CVE-2014-0146" }, { "category": "external", "summary": "SUSE Bug 870439 for CVE-2014-0146", "url": "https://bugzilla.suse.com/870439" }, { "category": "external", "summary": "SUSE Bug 871442 for CVE-2014-0146", "url": "https://bugzilla.suse.com/871442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2014-0146" }, { "cve": "CVE-2014-0147", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0147" } ], "notes": [ { "category": "general", "text": "Qemu before 1.6.2 block diver for the various disk image formats used by Bochs and for the QCOW version 2 format, are vulnerable to a possible crash caused by signed data types or a logic error while creating QCOW2 snapshots, which leads to incorrectly calling update_refcount() routine.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0147", "url": "https://www.suse.com/security/cve/CVE-2014-0147" }, { "category": "external", "summary": "SUSE Bug 870439 for CVE-2014-0147", "url": "https://bugzilla.suse.com/870439" }, { "category": "external", "summary": "SUSE Bug 871442 for CVE-2014-0147", "url": "https://bugzilla.suse.com/871442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2014-0147" }, { "cve": "CVE-2014-0150", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0150" } ], "notes": [ { "category": "general", "text": "Integer overflow in the virtio_net_handle_mac function in hw/net/virtio-net.c in QEMU 2.0 and earlier allows local guest users to execute arbitrary code via a MAC addresses table update request, which triggers a heap-based buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0150", "url": "https://www.suse.com/security/cve/CVE-2014-0150" }, { "category": "external", "summary": "SUSE Bug 873235 for CVE-2014-0150", "url": "https://bugzilla.suse.com/873235" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2014-0150" }, { "cve": "CVE-2014-0222", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0222" } ], "notes": [ { "category": "general", "text": "Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0222", "url": "https://www.suse.com/security/cve/CVE-2014-0222" }, { "category": "external", "summary": "SUSE Bug 1072223 for CVE-2014-0222", "url": "https://bugzilla.suse.com/1072223" }, { "category": "external", "summary": "SUSE Bug 877642 for CVE-2014-0222", "url": "https://bugzilla.suse.com/877642" }, { "category": "external", "summary": "SUSE Bug 950367 for CVE-2014-0222", "url": "https://bugzilla.suse.com/950367" }, { "category": "external", "summary": "SUSE Bug 964925 for CVE-2014-0222", "url": "https://bugzilla.suse.com/964925" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2014-0222" }, { "cve": "CVE-2014-0223", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0223" } ], "notes": [ { "category": "general", "text": "Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a large image size, which triggers a buffer overflow or out-of-bounds read.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0223", "url": "https://www.suse.com/security/cve/CVE-2014-0223" }, { "category": "external", "summary": "SUSE Bug 877645 for CVE-2014-0223", "url": "https://bugzilla.suse.com/877645" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2014-0223" }, { "cve": "CVE-2014-2894", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-2894" } ], "notes": [ { "category": "general", "text": "Off-by-one error in the cmd_smart function in the smart self test in hw/ide/core.c in QEMU before 2.0 allows local users to have unspecified impact via a SMART EXECUTE OFFLINE command that triggers a buffer underflow and memory corruption.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-2894", "url": "https://www.suse.com/security/cve/CVE-2014-2894" }, { "category": "external", "summary": "SUSE Bug 874749 for CVE-2014-2894", "url": "https://bugzilla.suse.com/874749" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2014-2894" }, { "cve": "CVE-2014-3461", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3461" } ], "notes": [ { "category": "general", "text": "hw/usb/bus.c in QEMU 1.6.2 allows remote attackers to execute arbitrary code via crafted savevm data, which triggers a heap-based buffer overflow, related to \"USB post load checks.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3461", "url": "https://www.suse.com/security/cve/CVE-2014-3461" }, { "category": "external", "summary": "SUSE Bug 878541 for CVE-2014-3461", "url": "https://bugzilla.suse.com/878541" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2014-3461" }, { "cve": "CVE-2015-1779", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1779" } ], "notes": [ { "category": "general", "text": "The VNC websocket frame decoder in QEMU allows remote attackers to cause a denial of service (memory and CPU consumption) via a large (1) websocket payload or (2) HTTP headers section.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1779", "url": "https://www.suse.com/security/cve/CVE-2015-1779" }, { "category": "external", "summary": "SUSE Bug 924018 for CVE-2015-1779", "url": "https://bugzilla.suse.com/924018" }, { "category": "external", "summary": "SUSE Bug 962632 for CVE-2015-1779", "url": "https://bugzilla.suse.com/962632" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2015-1779" }, { "cve": "CVE-2015-3209", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3209" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3209", "url": "https://www.suse.com/security/cve/CVE-2015-3209" }, { "category": "external", "summary": "SUSE Bug 932267 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932267" }, { "category": "external", "summary": "SUSE Bug 932770 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932770" }, { "category": "external", "summary": "SUSE Bug 932823 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932823" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "important" } ], "title": "CVE-2015-3209" }, { "cve": "CVE-2015-3456", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3456" } ], "notes": [ { "category": "general", "text": "The Floppy Disk Controller (FDC) in QEMU, as used in Xen 4.5.x and earlier and KVM, allows local guest users to cause a denial of service (out-of-bounds write and guest crash) or possibly execute arbitrary code via the (1) FD_CMD_READ_ID, (2) FD_CMD_DRIVE_SPECIFICATION_COMMAND, or other unspecified commands, aka VENOM.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3456", "url": "https://www.suse.com/security/cve/CVE-2015-3456" }, { "category": "external", "summary": "SUSE Bug 929339 for CVE-2015-3456", "url": "https://bugzilla.suse.com/929339" }, { "category": "external", "summary": "SUSE Bug 932770 for CVE-2015-3456", "url": "https://bugzilla.suse.com/932770" }, { "category": "external", "summary": "SUSE Bug 935900 for CVE-2015-3456", "url": "https://bugzilla.suse.com/935900" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2015-3456" } ] }
suse-su-2015:1157-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Xen", "title": "Title of the patch" }, { "category": "description", "text": "\nXen was updated to fix six security issues:\n\n * CVE-2015-4103: Potential unintended writes to host MSI message data\n field via qemu. (XSA-128, bsc#931625)\n * CVE-2015-4104: PCI MSI mask bits inadvertently exposed to guests.\n (XSA-129, bsc#931626)\n * CVE-2015-4105: Guest triggerable qemu MSI-X pass-through error\n messages. (XSA-130, bsc#931627)\n * CVE-2015-4106: Unmediated PCI register access in qemu. (XSA-131,\n bsc#931628)\n * CVE-2015-3209: Heap overflow in qemu pcnet controller allowing guest\n to host escape. (XSA-135, bsc#932770)\n * CVE-2015-4164: DoS through iret hypercall handler. (XSA-136,\n bsc#932996)\n\nSecurity Issues:\n\n * CVE-2015-4103\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4103\u003e\n * CVE-2015-4104\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4104\u003e\n * CVE-2015-4105\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4105\u003e\n * CVE-2015-4106\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4106\u003e\n * CVE-2015-4163\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4163\u003e\n * CVE-2015-4164\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4164\u003e\n * CVE-2015-3209\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3209\u003e\n\n", "title": "Description of the patch" }, { "category": "details", "text": "slessp2-xen-201506", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_1157-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2015:1157-1", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20151157-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2015:1157-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-June/001468.html" }, { "category": "self", "summary": "SUSE Bug 931625", "url": "https://bugzilla.suse.com/931625" }, { "category": "self", "summary": "SUSE Bug 931626", "url": "https://bugzilla.suse.com/931626" }, { "category": "self", "summary": "SUSE Bug 931627", "url": "https://bugzilla.suse.com/931627" }, { "category": "self", "summary": "SUSE Bug 931628", "url": "https://bugzilla.suse.com/931628" }, { "category": "self", "summary": "SUSE Bug 932770", "url": "https://bugzilla.suse.com/932770" }, { "category": "self", "summary": "SUSE Bug 932996", "url": "https://bugzilla.suse.com/932996" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3209 page", "url": "https://www.suse.com/security/cve/CVE-2015-3209/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4103 page", "url": "https://www.suse.com/security/cve/CVE-2015-4103/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4104 page", "url": "https://www.suse.com/security/cve/CVE-2015-4104/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4105 page", "url": "https://www.suse.com/security/cve/CVE-2015-4105/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4106 page", "url": "https://www.suse.com/security/cve/CVE-2015-4106/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4163 page", "url": "https://www.suse.com/security/cve/CVE-2015-4163/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4164 page", "url": "https://www.suse.com/security/cve/CVE-2015-4164/" } ], "title": "Security update for Xen", "tracking": { "current_release_date": "2015-06-05T12:47:22Z", "generator": { "date": "2015-06-05T12:47:22Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2015:1157-1", "initial_release_date": "2015-06-05T12:47:22Z", "revision_history": [ { "date": "2015-06-05T12:47:22Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-devel-4.1.6_08-0.13.1.i586", "product": { "name": "xen-devel-4.1.6_08-0.13.1.i586", "product_id": "xen-devel-4.1.6_08-0.13.1.i586" } }, { "category": "product_version", "name": "xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "product": { "name": "xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "product_id": "xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.i586" } }, { "category": "product_version", "name": "xen-kmp-pae-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "product": { "name": "xen-kmp-pae-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "product_id": "xen-kmp-pae-4.1.6_08_3.0.101_0.7.29-0.13.1.i586" } }, { "category": "product_version", "name": "xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "product": { "name": "xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "product_id": "xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.i586" } }, { "category": "product_version", "name": "xen-libs-4.1.6_08-0.13.1.i586", "product": { "name": "xen-libs-4.1.6_08-0.13.1.i586", "product_id": "xen-libs-4.1.6_08-0.13.1.i586" } }, { "category": "product_version", "name": "xen-tools-domU-4.1.6_08-0.13.1.i586", "product": { "name": "xen-tools-domU-4.1.6_08-0.13.1.i586", "product_id": "xen-tools-domU-4.1.6_08-0.13.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "xen-4.1.6_08-0.13.1.x86_64", "product": { "name": "xen-4.1.6_08-0.13.1.x86_64", "product_id": "xen-4.1.6_08-0.13.1.x86_64" } }, { "category": "product_version", "name": "xen-devel-4.1.6_08-0.13.1.x86_64", "product": { "name": "xen-devel-4.1.6_08-0.13.1.x86_64", "product_id": "xen-devel-4.1.6_08-0.13.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.1.6_08-0.13.1.x86_64", "product": { "name": "xen-doc-html-4.1.6_08-0.13.1.x86_64", "product_id": "xen-doc-html-4.1.6_08-0.13.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-pdf-4.1.6_08-0.13.1.x86_64", "product": { "name": "xen-doc-pdf-4.1.6_08-0.13.1.x86_64", "product_id": "xen-doc-pdf-4.1.6_08-0.13.1.x86_64" } }, { "category": "product_version", "name": "xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "product": { "name": "xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "product_id": "xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64" } }, { "category": "product_version", "name": "xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "product": { "name": "xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "product_id": "xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.1.6_08-0.13.1.x86_64", "product": { "name": "xen-libs-4.1.6_08-0.13.1.x86_64", "product_id": "xen-libs-4.1.6_08-0.13.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.1.6_08-0.13.1.x86_64", "product": { "name": "xen-libs-32bit-4.1.6_08-0.13.1.x86_64", "product_id": "xen-libs-32bit-4.1.6_08-0.13.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.1.6_08-0.13.1.x86_64", "product": { "name": "xen-tools-4.1.6_08-0.13.1.x86_64", "product_id": "xen-tools-4.1.6_08-0.13.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.1.6_08-0.13.1.x86_64", "product": { "name": "xen-tools-domU-4.1.6_08-0.13.1.x86_64", "product_id": "xen-tools-domU-4.1.6_08-0.13.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles_ltss:11:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-4.1.6_08-0.13.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-0.13.1.x86_64" }, "product_reference": "xen-4.1.6_08-0.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.1.6_08-0.13.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.i586" }, "product_reference": "xen-devel-4.1.6_08-0.13.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.1.6_08-0.13.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.x86_64" }, "product_reference": "xen-devel-4.1.6_08-0.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.1.6_08-0.13.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-0.13.1.x86_64" }, "product_reference": "xen-doc-html-4.1.6_08-0.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-pdf-4.1.6_08-0.13.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-0.13.1.x86_64" }, "product_reference": "xen-doc-pdf-4.1.6_08-0.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.i586" }, "product_reference": "xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64" }, "product_reference": "xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-pae-4.1.6_08_3.0.101_0.7.29-0.13.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.29-0.13.1.i586" }, "product_reference": "xen-kmp-pae-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.i586" }, "product_reference": "xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64" }, "product_reference": "xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.1.6_08-0.13.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.i586" }, "product_reference": "xen-libs-4.1.6_08-0.13.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.1.6_08-0.13.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.x86_64" }, "product_reference": "xen-libs-4.1.6_08-0.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.1.6_08-0.13.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-0.13.1.x86_64" }, "product_reference": "xen-libs-32bit-4.1.6_08-0.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.1.6_08-0.13.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-0.13.1.x86_64" }, "product_reference": "xen-tools-4.1.6_08-0.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.1.6_08-0.13.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.i586" }, "product_reference": "xen-tools-domU-4.1.6_08-0.13.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.1.6_08-0.13.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.x86_64" }, "product_reference": "xen-tools-domU-4.1.6_08-0.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-3209", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3209" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3209", "url": "https://www.suse.com/security/cve/CVE-2015-3209" }, { "category": "external", "summary": "SUSE Bug 932267 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932267" }, { "category": "external", "summary": "SUSE Bug 932770 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932770" }, { "category": "external", "summary": "SUSE Bug 932823 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932823" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-05T12:47:22Z", "details": "important" } ], "title": "CVE-2015-3209" }, { "cve": "CVE-2015-4103", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4103" } ], "notes": [ { "category": "general", "text": "Xen 3.3.x through 4.5.x does not properly restrict write access to the host MSI message data field, which allows local x86 HVM guest administrators to cause a denial of service (host interrupt handling confusion) via vectors related to qemu and accessing spanning multiple fields.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4103", "url": "https://www.suse.com/security/cve/CVE-2015-4103" }, { "category": "external", "summary": "SUSE Bug 931625 for CVE-2015-4103", "url": "https://bugzilla.suse.com/931625" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-05T12:47:22Z", "details": "moderate" } ], "title": "CVE-2015-4103" }, { "cve": "CVE-2015-4104", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4104" } ], "notes": [ { "category": "general", "text": "Xen 3.3.x through 4.5.x does not properly restrict access to PCI MSI mask bits, which allows local x86 HVM guest users to cause a denial of service (unexpected interrupt and host crash) via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4104", "url": "https://www.suse.com/security/cve/CVE-2015-4104" }, { "category": "external", "summary": "SUSE Bug 931626 for CVE-2015-4104", "url": "https://bugzilla.suse.com/931626" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-05T12:47:22Z", "details": "important" } ], "title": "CVE-2015-4104" }, { "cve": "CVE-2015-4105", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4105" } ], "notes": [ { "category": "general", "text": "Xen 3.3.x through 4.5.x enables logging for PCI MSI-X pass-through error messages, which allows local x86 HVM guests to cause a denial of service (host disk consumption) via certain invalid operations.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4105", "url": "https://www.suse.com/security/cve/CVE-2015-4105" }, { "category": "external", "summary": "SUSE Bug 931627 for CVE-2015-4105", "url": "https://bugzilla.suse.com/931627" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-05T12:47:22Z", "details": "moderate" } ], "title": "CVE-2015-4105" }, { "cve": "CVE-2015-4106", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4106" } ], "notes": [ { "category": "general", "text": "QEMU does not properly restrict write access to the PCI config space for certain PCI pass-through devices, which might allow local x86 HVM guests to gain privileges, cause a denial of service (host crash), obtain sensitive information, or possibly have other unspecified impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4106", "url": "https://www.suse.com/security/cve/CVE-2015-4106" }, { "category": "external", "summary": "SUSE Bug 931628 for CVE-2015-4106", "url": "https://bugzilla.suse.com/931628" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-05T12:47:22Z", "details": "moderate" } ], "title": "CVE-2015-4106" }, { "cve": "CVE-2015-4163", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4163" } ], "notes": [ { "category": "general", "text": "GNTTABOP_swap_grant_ref in Xen 4.2 through 4.5 does not check the grant table operation version, which allows local guest domains to cause a denial of service (NULL pointer dereference) via a hypercall without a GNTTABOP_setup_table or GNTTABOP_set_version.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4163", "url": "https://www.suse.com/security/cve/CVE-2015-4163" }, { "category": "external", "summary": "SUSE Bug 932790 for CVE-2015-4163", "url": "https://bugzilla.suse.com/932790" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-05T12:47:22Z", "details": "moderate" } ], "title": "CVE-2015-4163" }, { "cve": "CVE-2015-4164", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4164" } ], "notes": [ { "category": "general", "text": "The compat_iret function in Xen 3.1 through 4.5 iterates the wrong way through a loop, which allows local 32-bit PV guest administrators to cause a denial of service (large loop and system hang) via a hypercall_iret call with EFLAGS.VM set.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4164", "url": "https://www.suse.com/security/cve/CVE-2015-4164" }, { "category": "external", "summary": "SUSE Bug 932996 for CVE-2015-4164", "url": "https://bugzilla.suse.com/932996" }, { "category": "external", "summary": "SUSE Bug 950367 for CVE-2015-4164", "url": "https://bugzilla.suse.com/950367" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-05T12:47:22Z", "details": "moderate" } ], "title": "CVE-2015-4164" } ] }
suse-su-2015:1042-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "Xen was updated to fix seven security issues and one non-security bug.\n\nThe following vulnerabilities were fixed:\n\n* CVE-2015-4103: Potential unintended writes to host MSI message data field via qemu (XSA-128) (bnc#931625)\n* CVE-2015-4104: PCI MSI mask bits inadvertently exposed to guests (XSA-129) (bnc#931626)\n* CVE-2015-4105: Guest triggerable qemu MSI-X pass-through error messages (XSA-130) (bnc#931627)\n* CVE-2015-4106: Unmediated PCI register access in qemu (XSA-131) (bnc#931628)\n* CVE-2015-4163: GNTTABOP_swap_grant_ref operation misbehavior (XSA-134) (bnc#932790)\n* CVE-2015-3209: heap overflow in qemu pcnet controller allowing guest to host escape (XSA-135) (bnc#932770)\n* CVE-2015-4164: DoS through iret hypercall handler (XSA-136) (bnc#932996)\n\nThe following non-security bug was fixed:\n\n* bnc#906689: let systemd schedule xencommons after network-online.target and remote-fs.target so that xendomains has access to remote shares\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-DESKTOP-12-2015-262,SUSE-SLE-SDK-12-2015-262,SUSE-SLE-SERVER-12-2015-262", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_1042-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2015:1042-1", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20151042-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2015:1042-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-June/001432.html" }, { "category": "self", "summary": "SUSE Bug 906689", "url": "https://bugzilla.suse.com/906689" }, { "category": "self", "summary": "SUSE Bug 931625", "url": "https://bugzilla.suse.com/931625" }, { "category": "self", "summary": "SUSE Bug 931626", "url": "https://bugzilla.suse.com/931626" }, { "category": "self", "summary": "SUSE Bug 931627", "url": "https://bugzilla.suse.com/931627" }, { "category": "self", "summary": "SUSE Bug 931628", "url": "https://bugzilla.suse.com/931628" }, { "category": "self", "summary": "SUSE Bug 932770", "url": "https://bugzilla.suse.com/932770" }, { "category": "self", "summary": "SUSE Bug 932790", "url": "https://bugzilla.suse.com/932790" }, { "category": "self", "summary": "SUSE Bug 932996", "url": "https://bugzilla.suse.com/932996" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3209 page", "url": "https://www.suse.com/security/cve/CVE-2015-3209/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4103 page", "url": "https://www.suse.com/security/cve/CVE-2015-4103/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4104 page", "url": "https://www.suse.com/security/cve/CVE-2015-4104/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4105 page", "url": "https://www.suse.com/security/cve/CVE-2015-4105/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4106 page", "url": "https://www.suse.com/security/cve/CVE-2015-4106/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4163 page", "url": "https://www.suse.com/security/cve/CVE-2015-4163/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4164 page", "url": "https://www.suse.com/security/cve/CVE-2015-4164/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2015-06-03T12:47:57Z", "generator": { "date": "2015-06-03T12:47:57Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2015:1042-1", "initial_release_date": "2015-06-03T12:47:57Z", "revision_history": [ { "date": "2015-06-03T12:47:57Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-4.4.2_06-21.1.x86_64", "product": { "name": "xen-4.4.2_06-21.1.x86_64", "product_id": "xen-4.4.2_06-21.1.x86_64" } }, { "category": "product_version", "name": "xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "product": { "name": "xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "product_id": "xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.4.2_06-21.1.x86_64", "product": { "name": "xen-libs-4.4.2_06-21.1.x86_64", "product_id": "xen-libs-4.4.2_06-21.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.4.2_06-21.1.x86_64", "product": { "name": "xen-libs-32bit-4.4.2_06-21.1.x86_64", "product_id": "xen-libs-32bit-4.4.2_06-21.1.x86_64" } }, { "category": "product_version", "name": "xen-devel-4.4.2_06-21.1.x86_64", "product": { "name": "xen-devel-4.4.2_06-21.1.x86_64", "product_id": "xen-devel-4.4.2_06-21.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.4.2_06-21.1.x86_64", "product": { "name": "xen-doc-html-4.4.2_06-21.1.x86_64", "product_id": "xen-doc-html-4.4.2_06-21.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.4.2_06-21.1.x86_64", "product": { "name": "xen-tools-4.4.2_06-21.1.x86_64", "product_id": "xen-tools-4.4.2_06-21.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.4.2_06-21.1.x86_64", "product": { "name": "xen-tools-domU-4.4.2_06-21.1.x86_64", "product_id": "xen-tools-domU-4.4.2_06-21.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12", "product": { "name": "SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12", "product_id": "SUSE Linux Enterprise Software Development Kit 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12", "product": { "name": "SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-4.4.2_06-21.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:xen-4.4.2_06-21.1.x86_64" }, "product_reference": "xen-4.4.2_06-21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64" }, "product_reference": "xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.4.2_06-21.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:xen-libs-4.4.2_06-21.1.x86_64" }, "product_reference": "xen-libs-4.4.2_06-21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.4.2_06-21.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:xen-libs-32bit-4.4.2_06-21.1.x86_64" }, "product_reference": "xen-libs-32bit-4.4.2_06-21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.4.2_06-21.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12", "product_id": "SUSE Linux Enterprise Software Development Kit 12:xen-devel-4.4.2_06-21.1.x86_64" }, "product_reference": "xen-devel-4.4.2_06-21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.4.2_06-21.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:xen-4.4.2_06-21.1.x86_64" }, "product_reference": "xen-4.4.2_06-21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.4.2_06-21.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:xen-doc-html-4.4.2_06-21.1.x86_64" }, "product_reference": "xen-doc-html-4.4.2_06-21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64" }, "product_reference": "xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.4.2_06-21.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:xen-libs-4.4.2_06-21.1.x86_64" }, "product_reference": "xen-libs-4.4.2_06-21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.4.2_06-21.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:xen-libs-32bit-4.4.2_06-21.1.x86_64" }, "product_reference": "xen-libs-32bit-4.4.2_06-21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.4.2_06-21.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:xen-tools-4.4.2_06-21.1.x86_64" }, "product_reference": "xen-tools-4.4.2_06-21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.4.2_06-21.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:xen-tools-domU-4.4.2_06-21.1.x86_64" }, "product_reference": "xen-tools-domU-4.4.2_06-21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.4.2_06-21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.2_06-21.1.x86_64" }, "product_reference": "xen-4.4.2_06-21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.4.2_06-21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.2_06-21.1.x86_64" }, "product_reference": "xen-doc-html-4.4.2_06-21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64" }, "product_reference": "xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.4.2_06-21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.2_06-21.1.x86_64" }, "product_reference": "xen-libs-4.4.2_06-21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.4.2_06-21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.2_06-21.1.x86_64" }, "product_reference": "xen-libs-32bit-4.4.2_06-21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.4.2_06-21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.2_06-21.1.x86_64" }, "product_reference": "xen-tools-4.4.2_06-21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.4.2_06-21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.2_06-21.1.x86_64" }, "product_reference": "xen-tools-domU-4.4.2_06-21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-3209", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3209" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:xen-devel-4.4.2_06-21.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3209", "url": "https://www.suse.com/security/cve/CVE-2015-3209" }, { "category": "external", "summary": "SUSE Bug 932267 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932267" }, { "category": "external", "summary": "SUSE Bug 932770 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932770" }, { "category": "external", "summary": "SUSE Bug 932823 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932823" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:xen-devel-4.4.2_06-21.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-03T12:47:57Z", "details": "important" } ], "title": "CVE-2015-3209" }, { "cve": "CVE-2015-4103", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4103" } ], "notes": [ { "category": "general", "text": "Xen 3.3.x through 4.5.x does not properly restrict write access to the host MSI message data field, which allows local x86 HVM guest administrators to cause a denial of service (host interrupt handling confusion) via vectors related to qemu and accessing spanning multiple fields.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:xen-devel-4.4.2_06-21.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4103", "url": "https://www.suse.com/security/cve/CVE-2015-4103" }, { "category": "external", "summary": "SUSE Bug 931625 for CVE-2015-4103", "url": "https://bugzilla.suse.com/931625" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:xen-devel-4.4.2_06-21.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-03T12:47:57Z", "details": "moderate" } ], "title": "CVE-2015-4103" }, { "cve": "CVE-2015-4104", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4104" } ], "notes": [ { "category": "general", "text": "Xen 3.3.x through 4.5.x does not properly restrict access to PCI MSI mask bits, which allows local x86 HVM guest users to cause a denial of service (unexpected interrupt and host crash) via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:xen-devel-4.4.2_06-21.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4104", "url": "https://www.suse.com/security/cve/CVE-2015-4104" }, { "category": "external", "summary": "SUSE Bug 931626 for CVE-2015-4104", "url": "https://bugzilla.suse.com/931626" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:xen-devel-4.4.2_06-21.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-03T12:47:57Z", "details": "important" } ], "title": "CVE-2015-4104" }, { "cve": "CVE-2015-4105", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4105" } ], "notes": [ { "category": "general", "text": "Xen 3.3.x through 4.5.x enables logging for PCI MSI-X pass-through error messages, which allows local x86 HVM guests to cause a denial of service (host disk consumption) via certain invalid operations.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:xen-devel-4.4.2_06-21.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4105", "url": "https://www.suse.com/security/cve/CVE-2015-4105" }, { "category": "external", "summary": "SUSE Bug 931627 for CVE-2015-4105", "url": "https://bugzilla.suse.com/931627" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:xen-devel-4.4.2_06-21.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-03T12:47:57Z", "details": "moderate" } ], "title": "CVE-2015-4105" }, { "cve": "CVE-2015-4106", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4106" } ], "notes": [ { "category": "general", "text": "QEMU does not properly restrict write access to the PCI config space for certain PCI pass-through devices, which might allow local x86 HVM guests to gain privileges, cause a denial of service (host crash), obtain sensitive information, or possibly have other unspecified impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:xen-devel-4.4.2_06-21.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4106", "url": "https://www.suse.com/security/cve/CVE-2015-4106" }, { "category": "external", "summary": "SUSE Bug 931628 for CVE-2015-4106", "url": "https://bugzilla.suse.com/931628" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:xen-devel-4.4.2_06-21.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-03T12:47:57Z", "details": "moderate" } ], "title": "CVE-2015-4106" }, { "cve": "CVE-2015-4163", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4163" } ], "notes": [ { "category": "general", "text": "GNTTABOP_swap_grant_ref in Xen 4.2 through 4.5 does not check the grant table operation version, which allows local guest domains to cause a denial of service (NULL pointer dereference) via a hypercall without a GNTTABOP_setup_table or GNTTABOP_set_version.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:xen-devel-4.4.2_06-21.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4163", "url": "https://www.suse.com/security/cve/CVE-2015-4163" }, { "category": "external", "summary": "SUSE Bug 932790 for CVE-2015-4163", "url": "https://bugzilla.suse.com/932790" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:xen-devel-4.4.2_06-21.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-03T12:47:57Z", "details": "moderate" } ], "title": "CVE-2015-4163" }, { "cve": "CVE-2015-4164", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4164" } ], "notes": [ { "category": "general", "text": "The compat_iret function in Xen 3.1 through 4.5 iterates the wrong way through a loop, which allows local 32-bit PV guest administrators to cause a denial of service (large loop and system hang) via a hypercall_iret call with EFLAGS.VM set.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:xen-devel-4.4.2_06-21.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4164", "url": "https://www.suse.com/security/cve/CVE-2015-4164" }, { "category": "external", "summary": "SUSE Bug 932996 for CVE-2015-4164", "url": "https://bugzilla.suse.com/932996" }, { "category": "external", "summary": "SUSE Bug 950367 for CVE-2015-4164", "url": "https://bugzilla.suse.com/950367" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:xen-devel-4.4.2_06-21.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-03T12:47:57Z", "details": "moderate" } ], "title": "CVE-2015-4164" } ] }
suse-su-2015:1156-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Xen", "title": "Title of the patch" }, { "category": "description", "text": "\nXen was updated to fix six security issues:\n\n * CVE-2015-4103: Potential unintended writes to host MSI message data\n field via qemu. (XSA-128, bsc#931625)\n * CVE-2015-4104: PCI MSI mask bits inadvertently exposed to guests.\n (XSA-129, bsc#931626)\n * CVE-2015-4105: Guest triggerable qemu MSI-X pass-through error\n messages. (XSA-130, bsc#931627)\n * CVE-2015-4106: Unmediated PCI register access in qemu. (XSA-131,\n bsc#931628)\n * CVE-2015-3209: heap overflow in qemu pcnet controller allowing guest\n to host escape. (XSA-135, bsc#932770)\n * CVE-2015-4164: DoS through iret hypercall handler. (XSA-136,\n bsc#932996)\n\nSecurity Issues:\n\n * CVE-2015-4103\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4103\u003e\n * CVE-2015-4104\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4104\u003e\n * CVE-2015-4105\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4105\u003e\n * CVE-2015-4106\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4106\u003e\n * CVE-2015-4164\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4164\u003e\n * CVE-2015-3209\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3209\u003e\n\n", "title": "Description of the patch" }, { "category": "details", "text": "slessp1-xen-201506", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_1156-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2015:1156-1", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20151156-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2015:1156-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-June/001467.html" }, { "category": "self", "summary": "SUSE Bug 931625", "url": "https://bugzilla.suse.com/931625" }, { "category": "self", "summary": "SUSE Bug 931626", "url": "https://bugzilla.suse.com/931626" }, { "category": "self", "summary": "SUSE Bug 931627", "url": "https://bugzilla.suse.com/931627" }, { "category": "self", "summary": "SUSE Bug 931628", "url": "https://bugzilla.suse.com/931628" }, { "category": "self", "summary": "SUSE Bug 932770", "url": "https://bugzilla.suse.com/932770" }, { "category": "self", "summary": "SUSE Bug 932996", "url": "https://bugzilla.suse.com/932996" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3209 page", "url": "https://www.suse.com/security/cve/CVE-2015-3209/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4103 page", "url": "https://www.suse.com/security/cve/CVE-2015-4103/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4104 page", "url": "https://www.suse.com/security/cve/CVE-2015-4104/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4105 page", "url": "https://www.suse.com/security/cve/CVE-2015-4105/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4106 page", "url": "https://www.suse.com/security/cve/CVE-2015-4106/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4164 page", "url": "https://www.suse.com/security/cve/CVE-2015-4164/" } ], "title": "Security update for Xen", "tracking": { "current_release_date": "2015-06-05T12:39:39Z", "generator": { "date": "2015-06-05T12:39:39Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2015:1156-1", "initial_release_date": "2015-06-05T12:39:39Z", "revision_history": [ { "date": "2015-06-05T12:39:39Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-4.0.3_21548_18-0.23.1.i586", "product": { "name": "xen-4.0.3_21548_18-0.23.1.i586", "product_id": "xen-4.0.3_21548_18-0.23.1.i586" } }, { "category": "product_version", "name": "xen-doc-html-4.0.3_21548_18-0.23.1.i586", "product": { "name": "xen-doc-html-4.0.3_21548_18-0.23.1.i586", "product_id": "xen-doc-html-4.0.3_21548_18-0.23.1.i586" } }, { "category": "product_version", "name": "xen-doc-pdf-4.0.3_21548_18-0.23.1.i586", "product": { "name": "xen-doc-pdf-4.0.3_21548_18-0.23.1.i586", "product_id": "xen-doc-pdf-4.0.3_21548_18-0.23.1.i586" } }, { "category": "product_version", "name": "xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "product": { "name": "xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "product_id": "xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586" } }, { "category": "product_version", "name": "xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1.i586", "product": { "name": "xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1.i586", "product_id": "xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1.i586" } }, { "category": "product_version", "name": "xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "product": { "name": "xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "product_id": "xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586" } }, { "category": "product_version", "name": "xen-libs-4.0.3_21548_18-0.23.1.i586", "product": { "name": "xen-libs-4.0.3_21548_18-0.23.1.i586", "product_id": "xen-libs-4.0.3_21548_18-0.23.1.i586" } }, { "category": "product_version", "name": "xen-tools-4.0.3_21548_18-0.23.1.i586", "product": { "name": "xen-tools-4.0.3_21548_18-0.23.1.i586", "product_id": "xen-tools-4.0.3_21548_18-0.23.1.i586" } }, { "category": "product_version", "name": "xen-tools-domU-4.0.3_21548_18-0.23.1.i586", "product": { "name": "xen-tools-domU-4.0.3_21548_18-0.23.1.i586", "product_id": "xen-tools-domU-4.0.3_21548_18-0.23.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "xen-4.0.3_21548_18-0.23.1.x86_64", "product": { "name": "xen-4.0.3_21548_18-0.23.1.x86_64", "product_id": "xen-4.0.3_21548_18-0.23.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.0.3_21548_18-0.23.1.x86_64", "product": { "name": "xen-doc-html-4.0.3_21548_18-0.23.1.x86_64", "product_id": "xen-doc-html-4.0.3_21548_18-0.23.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-pdf-4.0.3_21548_18-0.23.1.x86_64", "product": { "name": "xen-doc-pdf-4.0.3_21548_18-0.23.1.x86_64", "product_id": "xen-doc-pdf-4.0.3_21548_18-0.23.1.x86_64" } }, { "category": "product_version", "name": "xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "product": { "name": "xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "product_id": "xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64" } }, { "category": "product_version", "name": "xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "product": { "name": "xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "product_id": "xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.0.3_21548_18-0.23.1.x86_64", "product": { "name": "xen-libs-4.0.3_21548_18-0.23.1.x86_64", "product_id": "xen-libs-4.0.3_21548_18-0.23.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.0.3_21548_18-0.23.1.x86_64", "product": { "name": "xen-tools-4.0.3_21548_18-0.23.1.x86_64", "product_id": "xen-tools-4.0.3_21548_18-0.23.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.0.3_21548_18-0.23.1.x86_64", "product": { "name": "xen-tools-domU-4.0.3_21548_18-0.23.1.x86_64", "product_id": "xen-tools-domU-4.0.3_21548_18-0.23.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 11 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles_ltss:11:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP1-TERADATA", "product": { "name": "SUSE Linux Enterprise Server 11 SP1-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP1-TERADATA", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:11:sp1:teradata" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-4.0.3_21548_18-0.23.1.i586 as component of SUSE Linux Enterprise Server 11 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-4.0.3_21548_18-0.23.1.i586" }, "product_reference": "xen-4.0.3_21548_18-0.23.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.0.3_21548_18-0.23.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-4.0.3_21548_18-0.23.1.x86_64" }, "product_reference": "xen-4.0.3_21548_18-0.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.0.3_21548_18-0.23.1.i586 as component of SUSE Linux Enterprise Server 11 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-html-4.0.3_21548_18-0.23.1.i586" }, "product_reference": "xen-doc-html-4.0.3_21548_18-0.23.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.0.3_21548_18-0.23.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-html-4.0.3_21548_18-0.23.1.x86_64" }, "product_reference": "xen-doc-html-4.0.3_21548_18-0.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-pdf-4.0.3_21548_18-0.23.1.i586 as component of SUSE Linux Enterprise Server 11 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-pdf-4.0.3_21548_18-0.23.1.i586" }, "product_reference": "xen-doc-pdf-4.0.3_21548_18-0.23.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-pdf-4.0.3_21548_18-0.23.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-pdf-4.0.3_21548_18-0.23.1.x86_64" }, "product_reference": "xen-doc-pdf-4.0.3_21548_18-0.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586 as component of SUSE Linux Enterprise Server 11 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586" }, "product_reference": "xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64" }, "product_reference": "xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1.i586 as component of SUSE Linux Enterprise Server 11 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1.i586" }, "product_reference": "xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586 as component of SUSE Linux Enterprise Server 11 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586" }, "product_reference": "xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64" }, "product_reference": "xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.0.3_21548_18-0.23.1.i586 as component of SUSE Linux Enterprise Server 11 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-libs-4.0.3_21548_18-0.23.1.i586" }, "product_reference": "xen-libs-4.0.3_21548_18-0.23.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.0.3_21548_18-0.23.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-libs-4.0.3_21548_18-0.23.1.x86_64" }, "product_reference": "xen-libs-4.0.3_21548_18-0.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.0.3_21548_18-0.23.1.i586 as component of SUSE Linux Enterprise Server 11 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-4.0.3_21548_18-0.23.1.i586" }, "product_reference": "xen-tools-4.0.3_21548_18-0.23.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.0.3_21548_18-0.23.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-4.0.3_21548_18-0.23.1.x86_64" }, "product_reference": "xen-tools-4.0.3_21548_18-0.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.0.3_21548_18-0.23.1.i586 as component of SUSE Linux Enterprise Server 11 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-domU-4.0.3_21548_18-0.23.1.i586" }, "product_reference": "xen-tools-domU-4.0.3_21548_18-0.23.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.0.3_21548_18-0.23.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-domU-4.0.3_21548_18-0.23.1.x86_64" }, "product_reference": "xen-tools-domU-4.0.3_21548_18-0.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.0.3_21548_18-0.23.1.i586 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-4.0.3_21548_18-0.23.1.i586" }, "product_reference": "xen-4.0.3_21548_18-0.23.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.0.3_21548_18-0.23.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-4.0.3_21548_18-0.23.1.x86_64" }, "product_reference": "xen-4.0.3_21548_18-0.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.0.3_21548_18-0.23.1.i586 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-html-4.0.3_21548_18-0.23.1.i586" }, "product_reference": "xen-doc-html-4.0.3_21548_18-0.23.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.0.3_21548_18-0.23.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-html-4.0.3_21548_18-0.23.1.x86_64" }, "product_reference": "xen-doc-html-4.0.3_21548_18-0.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-pdf-4.0.3_21548_18-0.23.1.i586 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-pdf-4.0.3_21548_18-0.23.1.i586" }, "product_reference": "xen-doc-pdf-4.0.3_21548_18-0.23.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-pdf-4.0.3_21548_18-0.23.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-pdf-4.0.3_21548_18-0.23.1.x86_64" }, "product_reference": "xen-doc-pdf-4.0.3_21548_18-0.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586" }, "product_reference": "xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64" }, "product_reference": "xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1.i586 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1.i586" }, "product_reference": "xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586" }, "product_reference": "xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64" }, "product_reference": "xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.0.3_21548_18-0.23.1.i586 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-libs-4.0.3_21548_18-0.23.1.i586" }, "product_reference": "xen-libs-4.0.3_21548_18-0.23.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.0.3_21548_18-0.23.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-libs-4.0.3_21548_18-0.23.1.x86_64" }, "product_reference": "xen-libs-4.0.3_21548_18-0.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.0.3_21548_18-0.23.1.i586 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-4.0.3_21548_18-0.23.1.i586" }, "product_reference": "xen-tools-4.0.3_21548_18-0.23.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.0.3_21548_18-0.23.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-4.0.3_21548_18-0.23.1.x86_64" }, "product_reference": "xen-tools-4.0.3_21548_18-0.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.0.3_21548_18-0.23.1.i586 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-domU-4.0.3_21548_18-0.23.1.i586" }, "product_reference": "xen-tools-domU-4.0.3_21548_18-0.23.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.0.3_21548_18-0.23.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-domU-4.0.3_21548_18-0.23.1.x86_64" }, "product_reference": "xen-tools-domU-4.0.3_21548_18-0.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-TERADATA" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-3209", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3209" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-html-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-html-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-pdf-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-pdf-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-libs-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-libs-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-domU-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-domU-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-html-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-html-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-pdf-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-pdf-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-libs-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-libs-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-domU-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-domU-4.0.3_21548_18-0.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3209", "url": "https://www.suse.com/security/cve/CVE-2015-3209" }, { "category": "external", "summary": "SUSE Bug 932267 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932267" }, { "category": "external", "summary": "SUSE Bug 932770 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932770" }, { "category": "external", "summary": "SUSE Bug 932823 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932823" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-html-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-html-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-pdf-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-pdf-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-libs-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-libs-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-domU-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-domU-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-html-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-html-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-pdf-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-pdf-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-libs-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-libs-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-domU-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-domU-4.0.3_21548_18-0.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-05T12:39:39Z", "details": "important" } ], "title": "CVE-2015-3209" }, { "cve": "CVE-2015-4103", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4103" } ], "notes": [ { "category": "general", "text": "Xen 3.3.x through 4.5.x does not properly restrict write access to the host MSI message data field, which allows local x86 HVM guest administrators to cause a denial of service (host interrupt handling confusion) via vectors related to qemu and accessing spanning multiple fields.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-html-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-html-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-pdf-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-pdf-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-libs-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-libs-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-domU-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-domU-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-html-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-html-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-pdf-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-pdf-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-libs-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-libs-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-domU-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-domU-4.0.3_21548_18-0.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4103", "url": "https://www.suse.com/security/cve/CVE-2015-4103" }, { "category": "external", "summary": "SUSE Bug 931625 for CVE-2015-4103", "url": "https://bugzilla.suse.com/931625" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-html-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-html-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-pdf-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-pdf-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-libs-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-libs-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-domU-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-domU-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-html-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-html-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-pdf-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-pdf-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-libs-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-libs-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-domU-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-domU-4.0.3_21548_18-0.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-05T12:39:39Z", "details": "moderate" } ], "title": "CVE-2015-4103" }, { "cve": "CVE-2015-4104", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4104" } ], "notes": [ { "category": "general", "text": "Xen 3.3.x through 4.5.x does not properly restrict access to PCI MSI mask bits, which allows local x86 HVM guest users to cause a denial of service (unexpected interrupt and host crash) via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-html-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-html-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-pdf-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-pdf-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-libs-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-libs-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-domU-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-domU-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-html-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-html-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-pdf-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-pdf-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-libs-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-libs-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-domU-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-domU-4.0.3_21548_18-0.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4104", "url": "https://www.suse.com/security/cve/CVE-2015-4104" }, { "category": "external", "summary": "SUSE Bug 931626 for CVE-2015-4104", "url": "https://bugzilla.suse.com/931626" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-html-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-html-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-pdf-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-pdf-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-libs-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-libs-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-domU-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-domU-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-html-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-html-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-pdf-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-pdf-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-libs-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-libs-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-domU-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-domU-4.0.3_21548_18-0.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-05T12:39:39Z", "details": "important" } ], "title": "CVE-2015-4104" }, { "cve": "CVE-2015-4105", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4105" } ], "notes": [ { "category": "general", "text": "Xen 3.3.x through 4.5.x enables logging for PCI MSI-X pass-through error messages, which allows local x86 HVM guests to cause a denial of service (host disk consumption) via certain invalid operations.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-html-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-html-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-pdf-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-pdf-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-libs-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-libs-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-domU-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-domU-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-html-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-html-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-pdf-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-pdf-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-libs-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-libs-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-domU-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-domU-4.0.3_21548_18-0.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4105", "url": "https://www.suse.com/security/cve/CVE-2015-4105" }, { "category": "external", "summary": "SUSE Bug 931627 for CVE-2015-4105", "url": "https://bugzilla.suse.com/931627" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-html-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-html-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-pdf-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-pdf-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-libs-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-libs-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-domU-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-domU-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-html-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-html-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-pdf-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-pdf-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-libs-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-libs-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-domU-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-domU-4.0.3_21548_18-0.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-05T12:39:39Z", "details": "moderate" } ], "title": "CVE-2015-4105" }, { "cve": "CVE-2015-4106", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4106" } ], "notes": [ { "category": "general", "text": "QEMU does not properly restrict write access to the PCI config space for certain PCI pass-through devices, which might allow local x86 HVM guests to gain privileges, cause a denial of service (host crash), obtain sensitive information, or possibly have other unspecified impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-html-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-html-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-pdf-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-pdf-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-libs-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-libs-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-domU-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-domU-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-html-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-html-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-pdf-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-pdf-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-libs-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-libs-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-domU-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-domU-4.0.3_21548_18-0.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4106", "url": "https://www.suse.com/security/cve/CVE-2015-4106" }, { "category": "external", "summary": "SUSE Bug 931628 for CVE-2015-4106", "url": "https://bugzilla.suse.com/931628" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-html-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-html-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-pdf-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-pdf-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-libs-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-libs-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-domU-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-domU-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-html-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-html-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-pdf-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-pdf-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-libs-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-libs-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-domU-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-domU-4.0.3_21548_18-0.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-05T12:39:39Z", "details": "moderate" } ], "title": "CVE-2015-4106" }, { "cve": "CVE-2015-4164", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4164" } ], "notes": [ { "category": "general", "text": "The compat_iret function in Xen 3.1 through 4.5 iterates the wrong way through a loop, which allows local 32-bit PV guest administrators to cause a denial of service (large loop and system hang) via a hypercall_iret call with EFLAGS.VM set.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-html-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-html-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-pdf-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-pdf-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-libs-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-libs-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-domU-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-domU-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-html-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-html-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-pdf-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-pdf-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-libs-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-libs-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-domU-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-domU-4.0.3_21548_18-0.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4164", "url": "https://www.suse.com/security/cve/CVE-2015-4164" }, { "category": "external", "summary": "SUSE Bug 932996 for CVE-2015-4164", "url": "https://bugzilla.suse.com/932996" }, { "category": "external", "summary": "SUSE Bug 950367 for CVE-2015-4164", "url": "https://bugzilla.suse.com/950367" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-html-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-html-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-pdf-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-pdf-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-libs-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-libs-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-domU-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-domU-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-html-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-html-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-pdf-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-pdf-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-libs-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-libs-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-domU-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-domU-4.0.3_21548_18-0.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-05T12:39:39Z", "details": "moderate" } ], "title": "CVE-2015-4164" } ] }
suse-su-2015:0929-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for kvm", "title": "Title of the patch" }, { "category": "description", "text": "\nThe kvm qemu vt100 emulation was affected by a problem where specific vt100 \nsequences could have been used by guest users to affect the host. \n(CVE-2012-3515 aka XSA-17).\n\nAlso a temp file race was fixed. (CVE-2012-2652)\n\nSecurity Issue reference:\n\n * CVE-2012-3515\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3515\u003e\n * CVE-2012-2652\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2652\u003e\n\n", "title": "Description of the patch" }, { "category": "details", "text": "slessp1-kvm", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_0929-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2015:0929-1", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20150929-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2015:0929-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-May/001402.html" }, { "category": "self", "summary": "SUSE Bug 598271", "url": "https://bugzilla.suse.com/598271" }, { "category": "self", "summary": "SUSE Bug 598298", "url": "https://bugzilla.suse.com/598298" }, { "category": "self", "summary": "SUSE Bug 599095", "url": "https://bugzilla.suse.com/599095" }, { "category": "self", "summary": "SUSE Bug 603161", "url": "https://bugzilla.suse.com/603161" }, { "category": "self", "summary": "SUSE Bug 603179", "url": "https://bugzilla.suse.com/603179" }, { "category": "self", "summary": "SUSE Bug 610682", "url": "https://bugzilla.suse.com/610682" }, { "category": "self", "summary": "SUSE Bug 619991", "url": "https://bugzilla.suse.com/619991" }, { "category": "self", "summary": "SUSE Bug 621793", "url": "https://bugzilla.suse.com/621793" }, { "category": "self", "summary": "SUSE Bug 626654", "url": "https://bugzilla.suse.com/626654" }, { "category": "self", "summary": "SUSE Bug 637297", "url": "https://bugzilla.suse.com/637297" }, { "category": "self", "summary": "SUSE Bug 689895", "url": "https://bugzilla.suse.com/689895" }, { "category": "self", "summary": "SUSE Bug 690781", "url": "https://bugzilla.suse.com/690781" }, { "category": "self", "summary": "SUSE Bug 695510", "url": "https://bugzilla.suse.com/695510" }, { "category": "self", "summary": "SUSE Bug 695766", "url": "https://bugzilla.suse.com/695766" }, { "category": "self", "summary": "SUSE Bug 698237", "url": "https://bugzilla.suse.com/698237" }, { "category": "self", "summary": "SUSE Bug 701161", "url": "https://bugzilla.suse.com/701161" }, { "category": "self", "summary": "SUSE Bug 702823", "url": "https://bugzilla.suse.com/702823" }, { "category": "self", "summary": "SUSE Bug 704933", "url": "https://bugzilla.suse.com/704933" }, { "category": "self", "summary": "SUSE Bug 705095", "url": "https://bugzilla.suse.com/705095" }, { "category": "self", "summary": "SUSE Bug 705304", "url": "https://bugzilla.suse.com/705304" }, { "category": "self", "summary": "SUSE Bug 740165", "url": "https://bugzilla.suse.com/740165" }, { "category": "self", "summary": "SUSE Bug 764526", "url": "https://bugzilla.suse.com/764526" }, { "category": "self", "summary": "SUSE Bug 777084", "url": "https://bugzilla.suse.com/777084" }, { "category": "self", "summary": "SUSE Bug 877642", "url": "https://bugzilla.suse.com/877642" }, { "category": "self", "summary": "SUSE Bug 877645", "url": "https://bugzilla.suse.com/877645" }, { "category": "self", "summary": "SUSE Bug 929339", "url": "https://bugzilla.suse.com/929339" }, { "category": "self", "summary": "SUSE Bug 932770", "url": "https://bugzilla.suse.com/932770" }, { "category": "self", "summary": "SUSE CVE CVE-2011-1750 page", "url": "https://www.suse.com/security/cve/CVE-2011-1750/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-1751 page", "url": "https://www.suse.com/security/cve/CVE-2011-1751/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-2212 page", "url": "https://www.suse.com/security/cve/CVE-2011-2212/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-2512 page", "url": "https://www.suse.com/security/cve/CVE-2011-2512/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-2527 page", "url": "https://www.suse.com/security/cve/CVE-2011-2527/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-0029 page", "url": "https://www.suse.com/security/cve/CVE-2012-0029/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-2652 page", "url": "https://www.suse.com/security/cve/CVE-2012-2652/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-3515 page", "url": "https://www.suse.com/security/cve/CVE-2012-3515/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0222 page", "url": "https://www.suse.com/security/cve/CVE-2014-0222/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0223 page", "url": "https://www.suse.com/security/cve/CVE-2014-0223/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3209 page", "url": "https://www.suse.com/security/cve/CVE-2015-3209/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3456 page", "url": "https://www.suse.com/security/cve/CVE-2015-3456/" } ], "title": "Security update for kvm", "tracking": { "current_release_date": "2012-08-31T14:36:20Z", "generator": { "date": "2012-08-31T14:36:20Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2015:0929-1", "initial_release_date": "2012-08-31T14:36:20Z", "revision_history": [ { "date": "2012-08-31T14:36:20Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kvm-0.12.5-1.24.1.i586", "product": { "name": "kvm-0.12.5-1.24.1.i586", "product_id": "kvm-0.12.5-1.24.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "kvm-0.12.5-1.24.1.x86_64", "product": { "name": "kvm-0.12.5-1.24.1.x86_64", "product_id": "kvm-0.12.5-1.24.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 11 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles_ltss:11:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP1-TERADATA", "product": { "name": "SUSE Linux Enterprise Server 11 SP1-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP1-TERADATA", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:11:sp1:teradata" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kvm-0.12.5-1.24.1.i586 as component of SUSE Linux Enterprise Server 11 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586" }, "product_reference": "kvm-0.12.5-1.24.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-0.12.5-1.24.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64" }, "product_reference": "kvm-0.12.5-1.24.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-0.12.5-1.24.1.i586 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586" }, "product_reference": "kvm-0.12.5-1.24.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-0.12.5-1.24.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" }, "product_reference": "kvm-0.12.5-1.24.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-TERADATA" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-1750", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-1750" } ], "notes": [ { "category": "general", "text": "Multiple heap-based buffer overflows in the virtio-blk driver (hw/virtio-blk.c) in qemu-kvm 0.14.0 allow local guest users to cause a denial of service (guest crash) and possibly gain privileges via a (1) write request to the virtio_blk_handle_write function or (2) read request to the virtio_blk_handle_read function that is not properly aligned.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-1750", "url": "https://www.suse.com/security/cve/CVE-2011-1750" }, { "category": "external", "summary": "SUSE Bug 689895 for CVE-2011-1750", "url": "https://bugzilla.suse.com/689895" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2012-08-31T14:36:20Z", "details": "important" } ], "title": "CVE-2011-1750" }, { "cve": "CVE-2011-1751", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-1751" } ], "notes": [ { "category": "general", "text": "The pciej_write function in hw/acpi_piix4.c in the PIIX4 Power Management emulation in qemu-kvm does not check if a device is hotpluggable before unplugging the PCI-ISA bridge, which allows privileged guest users to cause a denial of service (guest crash) and possibly execute arbitrary code by sending a crafted value to the 0xae08 (PCI_EJ_BASE) I/O port, which leads to a use-after-free related to \"active qemu timers.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-1751", "url": "https://www.suse.com/security/cve/CVE-2011-1751" }, { "category": "external", "summary": "SUSE Bug 690781 for CVE-2011-1751", "url": "https://bugzilla.suse.com/690781" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2012-08-31T14:36:20Z", "details": "important" } ], "title": "CVE-2011-1751" }, { "cve": "CVE-2011-2212", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-2212" } ], "notes": [ { "category": "general", "text": "Buffer overflow in the virtio subsystem in qemu-kvm 0.14.0 and earlier allows privileged guest users to cause a denial of service (guest crash) or gain privileges via a crafted indirect descriptor related to \"virtqueue in and out requests.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-2212", "url": "https://www.suse.com/security/cve/CVE-2011-2212" }, { "category": "external", "summary": "SUSE Bug 701161 for CVE-2011-2212", "url": "https://bugzilla.suse.com/701161" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2012-08-31T14:36:20Z", "details": "important" } ], "title": "CVE-2011-2212" }, { "cve": "CVE-2011-2512", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-2512" } ], "notes": [ { "category": "general", "text": "The virtio_queue_notify in qemu-kvm 0.14.0 and earlier does not properly validate the virtqueue number, which allows guest users to cause a denial of service (guest crash) and possibly execute arbitrary code via a negative number in the Queue Notify field of the Virtio Header, which bypasses a signed comparison.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-2512", "url": "https://www.suse.com/security/cve/CVE-2011-2512" }, { "category": "external", "summary": "SUSE Bug 702823 for CVE-2011-2512", "url": "https://bugzilla.suse.com/702823" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2012-08-31T14:36:20Z", "details": "moderate" } ], "title": "CVE-2011-2512" }, { "cve": "CVE-2011-2527", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-2527" } ], "notes": [ { "category": "general", "text": "The change_process_uid function in os-posix.c in Qemu 0.14.0 and earlier does not properly drop group privileges when the -runas option is used, which allows local guest users to access restricted files on the host.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-2527", "url": "https://www.suse.com/security/cve/CVE-2011-2527" }, { "category": "external", "summary": "SUSE Bug 705304 for CVE-2011-2527", "url": "https://bugzilla.suse.com/705304" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2012-08-31T14:36:20Z", "details": "low" } ], "title": "CVE-2011-2527" }, { "cve": "CVE-2012-0029", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-0029" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-0029", "url": "https://www.suse.com/security/cve/CVE-2012-0029" }, { "category": "external", "summary": "SUSE Bug 740165 for CVE-2012-0029", "url": "https://bugzilla.suse.com/740165" }, { "category": "external", "summary": "SUSE Bug 747331 for CVE-2012-0029", "url": "https://bugzilla.suse.com/747331" }, { "category": "external", "summary": "SUSE Bug 757537 for CVE-2012-0029", "url": "https://bugzilla.suse.com/757537" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2012-08-31T14:36:20Z", "details": "important" } ], "title": "CVE-2012-0029" }, { "cve": "CVE-2012-2652", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-2652" } ], "notes": [ { "category": "general", "text": "The bdrv_open function in Qemu 1.0 does not properly handle the failure of the mkstemp function, when in snapshot node, which allows local users to overwrite or read arbitrary files via a symlink attack on an unspecified temporary file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-2652", "url": "https://www.suse.com/security/cve/CVE-2012-2652" }, { "category": "external", "summary": "SUSE Bug 764526 for CVE-2012-2652", "url": "https://bugzilla.suse.com/764526" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2012-08-31T14:36:20Z", "details": "moderate" } ], "title": "CVE-2012-2652" }, { "cve": "CVE-2012-3515", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-3515" } ], "notes": [ { "category": "general", "text": "Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a \"device model\u0027s address space.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-3515", "url": "https://www.suse.com/security/cve/CVE-2012-3515" }, { "category": "external", "summary": "SUSE Bug 777084 for CVE-2012-3515", "url": "https://bugzilla.suse.com/777084" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2012-08-31T14:36:20Z", "details": "important" } ], "title": "CVE-2012-3515" }, { "cve": "CVE-2014-0222", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0222" } ], "notes": [ { "category": "general", "text": "Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0222", "url": "https://www.suse.com/security/cve/CVE-2014-0222" }, { "category": "external", "summary": "SUSE Bug 1072223 for CVE-2014-0222", "url": "https://bugzilla.suse.com/1072223" }, { "category": "external", "summary": "SUSE Bug 877642 for CVE-2014-0222", "url": "https://bugzilla.suse.com/877642" }, { "category": "external", "summary": "SUSE Bug 950367 for CVE-2014-0222", "url": "https://bugzilla.suse.com/950367" }, { "category": "external", "summary": "SUSE Bug 964925 for CVE-2014-0222", "url": "https://bugzilla.suse.com/964925" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2012-08-31T14:36:20Z", "details": "moderate" } ], "title": "CVE-2014-0222" }, { "cve": "CVE-2014-0223", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0223" } ], "notes": [ { "category": "general", "text": "Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a large image size, which triggers a buffer overflow or out-of-bounds read.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0223", "url": "https://www.suse.com/security/cve/CVE-2014-0223" }, { "category": "external", "summary": "SUSE Bug 877645 for CVE-2014-0223", "url": "https://bugzilla.suse.com/877645" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2012-08-31T14:36:20Z", "details": "moderate" } ], "title": "CVE-2014-0223" }, { "cve": "CVE-2015-3209", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3209" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3209", "url": "https://www.suse.com/security/cve/CVE-2015-3209" }, { "category": "external", "summary": "SUSE Bug 932267 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932267" }, { "category": "external", "summary": "SUSE Bug 932770 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932770" }, { "category": "external", "summary": "SUSE Bug 932823 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932823" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2012-08-31T14:36:20Z", "details": "important" } ], "title": "CVE-2015-3209" }, { "cve": "CVE-2015-3456", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3456" } ], "notes": [ { "category": "general", "text": "The Floppy Disk Controller (FDC) in QEMU, as used in Xen 4.5.x and earlier and KVM, allows local guest users to cause a denial of service (out-of-bounds write and guest crash) or possibly execute arbitrary code via the (1) FD_CMD_READ_ID, (2) FD_CMD_DRIVE_SPECIFICATION_COMMAND, or other unspecified commands, aka VENOM.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3456", "url": "https://www.suse.com/security/cve/CVE-2015-3456" }, { "category": "external", "summary": "SUSE Bug 929339 for CVE-2015-3456", "url": "https://bugzilla.suse.com/929339" }, { "category": "external", "summary": "SUSE Bug 932770 for CVE-2015-3456", "url": "https://bugzilla.suse.com/932770" }, { "category": "external", "summary": "SUSE Bug 935900 for CVE-2015-3456", "url": "https://bugzilla.suse.com/935900" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2012-08-31T14:36:20Z", "details": "moderate" } ], "title": "CVE-2015-3456" } ] }
suse-su-2015:1045-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Xen", "title": "Title of the patch" }, { "category": "description", "text": "\nXen was updated to fix seven security vulnerabilities:\n\n * CVE-2015-4103: Potential unintended writes to host MSI message data\n field via qemu. (XSA-128, bnc#931625)\n * CVE-2015-4104: PCI MSI mask bits inadvertently exposed to guests.\n (XSA-129, bnc#931626)\n * CVE-2015-4105: Guest triggerable qemu MSI-X pass-through error\n messages. (XSA-130, bnc#931627)\n * CVE-2015-4106: Unmediated PCI register access in qemu. (XSA-131,\n bnc#931628)\n * CVE-2015-4163: GNTTABOP_swap_grant_ref operation misbehavior.\n (XSA-134, bnc#932790)\n * CVE-2015-3209: Heap overflow in qemu pcnet controller allowing guest\n to host escape. (XSA-135, bnc#932770)\n * CVE-2015-4164: DoS through iret hypercall handler. (XSA-136,\n bnc#932996)\n\nSecurity Issues:\n\n * CVE-2015-4103\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4103\u003e\n * CVE-2015-4104\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4104\u003e\n * CVE-2015-4105\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4105\u003e\n * CVE-2015-4106\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4106\u003e\n * CVE-2015-4163\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4163\u003e\n * CVE-2015-4164\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4164\u003e\n * CVE-2015-3209\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3209\u003e\n\n", "title": "Description of the patch" }, { "category": "details", "text": "sdksp3-xen-201506,sledsp3-xen-201506,slessp3-xen-201506", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_1045-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2015:1045-1", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20151045-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2015:1045-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-June/001435.html" }, { "category": "self", "summary": "SUSE Bug 931625", "url": "https://bugzilla.suse.com/931625" }, { "category": "self", "summary": "SUSE Bug 931626", "url": "https://bugzilla.suse.com/931626" }, { "category": "self", "summary": "SUSE Bug 931627", "url": "https://bugzilla.suse.com/931627" }, { "category": "self", "summary": "SUSE Bug 931628", "url": "https://bugzilla.suse.com/931628" }, { "category": "self", "summary": "SUSE Bug 932770", "url": "https://bugzilla.suse.com/932770" }, { "category": "self", "summary": "SUSE Bug 932790", "url": "https://bugzilla.suse.com/932790" }, { "category": "self", "summary": "SUSE Bug 932996", "url": "https://bugzilla.suse.com/932996" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3209 page", "url": "https://www.suse.com/security/cve/CVE-2015-3209/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4103 page", "url": "https://www.suse.com/security/cve/CVE-2015-4103/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4104 page", "url": "https://www.suse.com/security/cve/CVE-2015-4104/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4105 page", "url": "https://www.suse.com/security/cve/CVE-2015-4105/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4106 page", "url": "https://www.suse.com/security/cve/CVE-2015-4106/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4163 page", "url": "https://www.suse.com/security/cve/CVE-2015-4163/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4164 page", "url": "https://www.suse.com/security/cve/CVE-2015-4164/" } ], "title": "Security update for Xen", "tracking": { "current_release_date": "2015-06-05T12:53:19Z", "generator": { "date": "2015-06-05T12:53:19Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2015:1045-1", "initial_release_date": "2015-06-05T12:53:19Z", "revision_history": [ { "date": "2015-06-05T12:53:19Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-devel-4.2.5_08-0.9.1.i586", "product": { "name": "xen-devel-4.2.5_08-0.9.1.i586", "product_id": "xen-devel-4.2.5_08-0.9.1.i586" } }, { "category": "product_version", "name": "xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "product": { "name": "xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "product_id": "xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586" } }, { "category": "product_version", "name": "xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "product": { "name": "xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "product_id": "xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586" } }, { "category": "product_version", "name": "xen-libs-4.2.5_08-0.9.1.i586", "product": { "name": "xen-libs-4.2.5_08-0.9.1.i586", "product_id": "xen-libs-4.2.5_08-0.9.1.i586" } }, { "category": "product_version", "name": "xen-tools-domU-4.2.5_08-0.9.1.i586", "product": { "name": "xen-tools-domU-4.2.5_08-0.9.1.i586", "product_id": "xen-tools-domU-4.2.5_08-0.9.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "xen-devel-4.2.5_08-0.9.1.x86_64", "product": { "name": "xen-devel-4.2.5_08-0.9.1.x86_64", "product_id": "xen-devel-4.2.5_08-0.9.1.x86_64" } }, { "category": "product_version", "name": "xen-4.2.5_08-0.9.1.x86_64", "product": { "name": "xen-4.2.5_08-0.9.1.x86_64", "product_id": "xen-4.2.5_08-0.9.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.2.5_08-0.9.1.x86_64", "product": { "name": "xen-doc-html-4.2.5_08-0.9.1.x86_64", "product_id": "xen-doc-html-4.2.5_08-0.9.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "product": { "name": "xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "product_id": "xen-doc-pdf-4.2.5_08-0.9.1.x86_64" } }, { "category": "product_version", "name": "xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "product": { "name": "xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "product_id": "xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.2.5_08-0.9.1.x86_64", "product": { "name": "xen-libs-4.2.5_08-0.9.1.x86_64", "product_id": "xen-libs-4.2.5_08-0.9.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "product": { "name": "xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "product_id": "xen-libs-32bit-4.2.5_08-0.9.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.2.5_08-0.9.1.x86_64", "product": { "name": "xen-tools-4.2.5_08-0.9.1.x86_64", "product_id": "xen-tools-4.2.5_08-0.9.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.2.5_08-0.9.1.x86_64", "product": { "name": "xen-tools-domU-4.2.5_08-0.9.1.x86_64", "product_id": "xen-tools-domU-4.2.5_08-0.9.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 11 SP3", "product": { "name": "SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3", "product_identification_helper": { "cpe": "cpe:/a:suse:sle-sdk:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 11 SP3", "product": { "name": "SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sled:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3", "product": { "name": "SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product": { "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:11:sp3:teradata" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:11:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.2.5_08-0.9.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.i586" }, "product_reference": "xen-devel-4.2.5_08-0.9.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-devel-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:xen-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-doc-html-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-pdf-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586" }, "product_reference": "xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64" }, "product_reference": "xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586" }, "product_reference": "xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.2.5_08-0.9.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.i586" }, "product_reference": "xen-libs-4.2.5_08-0.9.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-libs-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-tools-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.2.5_08-0.9.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586" }, "product_reference": "xen-tools-domU-4.2.5_08-0.9.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-tools-domU-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:xen-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-doc-html-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-pdf-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586" }, "product_reference": "xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64" }, "product_reference": "xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586" }, "product_reference": "xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.2.5_08-0.9.1.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.i586" }, "product_reference": "xen-libs-4.2.5_08-0.9.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-libs-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-tools-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.2.5_08-0.9.1.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586" }, "product_reference": "xen-tools-domU-4.2.5_08-0.9.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-tools-domU-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-html-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-doc-html-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-pdf-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-pdf-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586" }, "product_reference": "xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64" }, "product_reference": "xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586" }, "product_reference": "xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.2.5_08-0.9.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.i586" }, "product_reference": "xen-libs-4.2.5_08-0.9.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-libs-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-32bit-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-tools-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.2.5_08-0.9.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.i586" }, "product_reference": "xen-tools-domU-4.2.5_08-0.9.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-tools-domU-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-doc-html-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-pdf-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586" }, "product_reference": "xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64" }, "product_reference": "xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586" }, "product_reference": "xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.2.5_08-0.9.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.i586" }, "product_reference": "xen-libs-4.2.5_08-0.9.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-libs-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-tools-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.2.5_08-0.9.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586" }, "product_reference": "xen-tools-domU-4.2.5_08-0.9.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-tools-domU-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-3209", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3209" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3209", "url": "https://www.suse.com/security/cve/CVE-2015-3209" }, { "category": "external", "summary": "SUSE Bug 932267 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932267" }, { "category": "external", "summary": "SUSE Bug 932770 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932770" }, { "category": "external", "summary": "SUSE Bug 932823 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932823" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-05T12:53:19Z", "details": "important" } ], "title": "CVE-2015-3209" }, { "cve": "CVE-2015-4103", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4103" } ], "notes": [ { "category": "general", "text": "Xen 3.3.x through 4.5.x does not properly restrict write access to the host MSI message data field, which allows local x86 HVM guest administrators to cause a denial of service (host interrupt handling confusion) via vectors related to qemu and accessing spanning multiple fields.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4103", "url": "https://www.suse.com/security/cve/CVE-2015-4103" }, { "category": "external", "summary": "SUSE Bug 931625 for CVE-2015-4103", "url": "https://bugzilla.suse.com/931625" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-05T12:53:19Z", "details": "moderate" } ], "title": "CVE-2015-4103" }, { "cve": "CVE-2015-4104", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4104" } ], "notes": [ { "category": "general", "text": "Xen 3.3.x through 4.5.x does not properly restrict access to PCI MSI mask bits, which allows local x86 HVM guest users to cause a denial of service (unexpected interrupt and host crash) via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4104", "url": "https://www.suse.com/security/cve/CVE-2015-4104" }, { "category": "external", "summary": "SUSE Bug 931626 for CVE-2015-4104", "url": "https://bugzilla.suse.com/931626" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-05T12:53:19Z", "details": "important" } ], "title": "CVE-2015-4104" }, { "cve": "CVE-2015-4105", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4105" } ], "notes": [ { "category": "general", "text": "Xen 3.3.x through 4.5.x enables logging for PCI MSI-X pass-through error messages, which allows local x86 HVM guests to cause a denial of service (host disk consumption) via certain invalid operations.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4105", "url": "https://www.suse.com/security/cve/CVE-2015-4105" }, { "category": "external", "summary": "SUSE Bug 931627 for CVE-2015-4105", "url": "https://bugzilla.suse.com/931627" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-05T12:53:19Z", "details": "moderate" } ], "title": "CVE-2015-4105" }, { "cve": "CVE-2015-4106", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4106" } ], "notes": [ { "category": "general", "text": "QEMU does not properly restrict write access to the PCI config space for certain PCI pass-through devices, which might allow local x86 HVM guests to gain privileges, cause a denial of service (host crash), obtain sensitive information, or possibly have other unspecified impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4106", "url": "https://www.suse.com/security/cve/CVE-2015-4106" }, { "category": "external", "summary": "SUSE Bug 931628 for CVE-2015-4106", "url": "https://bugzilla.suse.com/931628" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-05T12:53:19Z", "details": "moderate" } ], "title": "CVE-2015-4106" }, { "cve": "CVE-2015-4163", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4163" } ], "notes": [ { "category": "general", "text": "GNTTABOP_swap_grant_ref in Xen 4.2 through 4.5 does not check the grant table operation version, which allows local guest domains to cause a denial of service (NULL pointer dereference) via a hypercall without a GNTTABOP_setup_table or GNTTABOP_set_version.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4163", "url": "https://www.suse.com/security/cve/CVE-2015-4163" }, { "category": "external", "summary": "SUSE Bug 932790 for CVE-2015-4163", "url": "https://bugzilla.suse.com/932790" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-05T12:53:19Z", "details": "moderate" } ], "title": "CVE-2015-4163" }, { "cve": "CVE-2015-4164", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4164" } ], "notes": [ { "category": "general", "text": "The compat_iret function in Xen 3.1 through 4.5 iterates the wrong way through a loop, which allows local 32-bit PV guest administrators to cause a denial of service (large loop and system hang) via a hypercall_iret call with EFLAGS.VM set.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4164", "url": "https://www.suse.com/security/cve/CVE-2015-4164" }, { "category": "external", "summary": "SUSE Bug 932996 for CVE-2015-4164", "url": "https://bugzilla.suse.com/932996" }, { "category": "external", "summary": "SUSE Bug 950367 for CVE-2015-4164", "url": "https://bugzilla.suse.com/950367" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-05T12:53:19Z", "details": "moderate" } ], "title": "CVE-2015-4164" } ] }
suse-su-2015:1519-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for qemu", "title": "Title of the patch" }, { "category": "description", "text": "qemu was updated to fix two security issues and augments one non-security bug fix.\n\nThe following vulnerabilities were fixed:\n\n* CVE-2015-3209: heap overflow in qemu pcnet controller allowing guest to host escape (XSA-135) (bsc#932770)\n* CVE-2015-4037: Avoid predictable directory name for smb config (bsc#932267)\n\nThe fix for the following non-security bug was improved:\n\n* bsc#893892: Use improved upstream patch for display issue affecting installs of SLES 11 VMs on SLES 12\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-DESKTOP-12-2015-509,SUSE-SLE-SERVER-12-2015-509", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_1519-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2015:1519-1", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20151519-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2015:1519-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-September/001583.html" }, { "category": "self", "summary": "SUSE Bug 893892", "url": "https://bugzilla.suse.com/893892" }, { "category": "self", "summary": "SUSE Bug 932267", "url": "https://bugzilla.suse.com/932267" }, { "category": "self", "summary": "SUSE Bug 932770", "url": "https://bugzilla.suse.com/932770" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3209 page", "url": "https://www.suse.com/security/cve/CVE-2015-3209/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4037 page", "url": "https://www.suse.com/security/cve/CVE-2015-4037/" } ], "title": "Security update for qemu", "tracking": { "current_release_date": "2015-06-08T14:28:12Z", "generator": { "date": "2015-06-08T14:28:12Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2015:1519-1", "initial_release_date": "2015-06-08T14:28:12Z", "revision_history": [ { "date": "2015-06-08T14:28:12Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "qemu-ipxe-1.0.0-48.4.1.noarch", "product": { "name": "qemu-ipxe-1.0.0-48.4.1.noarch", "product_id": "qemu-ipxe-1.0.0-48.4.1.noarch" } }, { "category": "product_version", "name": "qemu-seabios-1.7.4-48.4.1.noarch", "product": { "name": "qemu-seabios-1.7.4-48.4.1.noarch", "product_id": "qemu-seabios-1.7.4-48.4.1.noarch" } }, { "category": "product_version", "name": "qemu-sgabios-8-48.4.1.noarch", "product": { "name": "qemu-sgabios-8-48.4.1.noarch", "product_id": "qemu-sgabios-8-48.4.1.noarch" } }, { "category": "product_version", "name": "qemu-vgabios-1.7.4-48.4.1.noarch", "product": { "name": "qemu-vgabios-1.7.4-48.4.1.noarch", "product_id": "qemu-vgabios-1.7.4-48.4.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "qemu-2.0.2-48.4.1.ppc64le", "product": { "name": "qemu-2.0.2-48.4.1.ppc64le", "product_id": "qemu-2.0.2-48.4.1.ppc64le" } }, { "category": "product_version", "name": "qemu-block-curl-2.0.2-48.4.1.ppc64le", "product": { "name": "qemu-block-curl-2.0.2-48.4.1.ppc64le", "product_id": "qemu-block-curl-2.0.2-48.4.1.ppc64le" } }, { "category": "product_version", "name": "qemu-guest-agent-2.0.2-48.4.1.ppc64le", "product": { "name": "qemu-guest-agent-2.0.2-48.4.1.ppc64le", "product_id": "qemu-guest-agent-2.0.2-48.4.1.ppc64le" } }, { "category": "product_version", "name": "qemu-lang-2.0.2-48.4.1.ppc64le", "product": { "name": "qemu-lang-2.0.2-48.4.1.ppc64le", "product_id": "qemu-lang-2.0.2-48.4.1.ppc64le" } }, { "category": "product_version", "name": "qemu-ppc-2.0.2-48.4.1.ppc64le", "product": { "name": "qemu-ppc-2.0.2-48.4.1.ppc64le", "product_id": "qemu-ppc-2.0.2-48.4.1.ppc64le" } }, { "category": "product_version", "name": "qemu-tools-2.0.2-48.4.1.ppc64le", "product": { "name": "qemu-tools-2.0.2-48.4.1.ppc64le", "product_id": "qemu-tools-2.0.2-48.4.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "qemu-2.0.2-48.4.1.s390x", "product": { "name": "qemu-2.0.2-48.4.1.s390x", "product_id": "qemu-2.0.2-48.4.1.s390x" } }, { "category": "product_version", "name": "qemu-block-curl-2.0.2-48.4.1.s390x", "product": { "name": "qemu-block-curl-2.0.2-48.4.1.s390x", "product_id": "qemu-block-curl-2.0.2-48.4.1.s390x" } }, { "category": "product_version", "name": "qemu-guest-agent-2.0.2-48.4.1.s390x", "product": { "name": "qemu-guest-agent-2.0.2-48.4.1.s390x", "product_id": "qemu-guest-agent-2.0.2-48.4.1.s390x" } }, { "category": "product_version", "name": "qemu-kvm-2.0.2-48.4.1.s390x", "product": { "name": "qemu-kvm-2.0.2-48.4.1.s390x", "product_id": "qemu-kvm-2.0.2-48.4.1.s390x" } }, { "category": "product_version", "name": "qemu-lang-2.0.2-48.4.1.s390x", "product": { "name": "qemu-lang-2.0.2-48.4.1.s390x", "product_id": "qemu-lang-2.0.2-48.4.1.s390x" } }, { "category": "product_version", "name": "qemu-s390-2.0.2-48.4.1.s390x", "product": { "name": "qemu-s390-2.0.2-48.4.1.s390x", "product_id": "qemu-s390-2.0.2-48.4.1.s390x" } }, { "category": "product_version", "name": "qemu-tools-2.0.2-48.4.1.s390x", "product": { "name": "qemu-tools-2.0.2-48.4.1.s390x", "product_id": "qemu-tools-2.0.2-48.4.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "qemu-2.0.2-48.4.1.x86_64", "product": { "name": "qemu-2.0.2-48.4.1.x86_64", "product_id": "qemu-2.0.2-48.4.1.x86_64" } }, { "category": "product_version", "name": "qemu-block-curl-2.0.2-48.4.1.x86_64", "product": { "name": "qemu-block-curl-2.0.2-48.4.1.x86_64", "product_id": "qemu-block-curl-2.0.2-48.4.1.x86_64" } }, { "category": "product_version", "name": "qemu-kvm-2.0.2-48.4.1.x86_64", "product": { "name": "qemu-kvm-2.0.2-48.4.1.x86_64", "product_id": "qemu-kvm-2.0.2-48.4.1.x86_64" } }, { "category": "product_version", "name": "qemu-tools-2.0.2-48.4.1.x86_64", "product": { "name": "qemu-tools-2.0.2-48.4.1.x86_64", "product_id": "qemu-tools-2.0.2-48.4.1.x86_64" } }, { "category": "product_version", "name": "qemu-x86-2.0.2-48.4.1.x86_64", "product": { "name": "qemu-x86-2.0.2-48.4.1.x86_64", "product_id": "qemu-x86-2.0.2-48.4.1.x86_64" } }, { "category": "product_version", "name": "qemu-block-rbd-2.0.2-48.4.1.x86_64", "product": { "name": "qemu-block-rbd-2.0.2-48.4.1.x86_64", "product_id": "qemu-block-rbd-2.0.2-48.4.1.x86_64" } }, { "category": "product_version", "name": "qemu-guest-agent-2.0.2-48.4.1.x86_64", "product": { "name": "qemu-guest-agent-2.0.2-48.4.1.x86_64", "product_id": "qemu-guest-agent-2.0.2-48.4.1.x86_64" } }, { "category": "product_version", "name": "qemu-lang-2.0.2-48.4.1.x86_64", "product": { "name": "qemu-lang-2.0.2-48.4.1.x86_64", "product_id": "qemu-lang-2.0.2-48.4.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12", "product": { "name": "SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12", "product": { "name": "SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "qemu-2.0.2-48.4.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.4.1.x86_64" }, "product_reference": "qemu-2.0.2-48.4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-block-curl-2.0.2-48.4.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.4.1.x86_64" }, "product_reference": "qemu-block-curl-2.0.2-48.4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-ipxe-1.0.0-48.4.1.noarch as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.4.1.noarch" }, "product_reference": "qemu-ipxe-1.0.0-48.4.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2.0.2-48.4.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.4.1.x86_64" }, "product_reference": "qemu-kvm-2.0.2-48.4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-seabios-1.7.4-48.4.1.noarch as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.4.1.noarch" }, "product_reference": "qemu-seabios-1.7.4-48.4.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-sgabios-8-48.4.1.noarch as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.4.1.noarch" }, "product_reference": "qemu-sgabios-8-48.4.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-tools-2.0.2-48.4.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.4.1.x86_64" }, "product_reference": "qemu-tools-2.0.2-48.4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-vgabios-1.7.4-48.4.1.noarch as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.4.1.noarch" }, "product_reference": "qemu-vgabios-1.7.4-48.4.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-x86-2.0.2-48.4.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.4.1.x86_64" }, "product_reference": "qemu-x86-2.0.2-48.4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-2.0.2-48.4.1.ppc64le as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.4.1.ppc64le" }, "product_reference": "qemu-2.0.2-48.4.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-2.0.2-48.4.1.s390x as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.4.1.s390x" }, "product_reference": "qemu-2.0.2-48.4.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-2.0.2-48.4.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.4.1.x86_64" }, "product_reference": "qemu-2.0.2-48.4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-block-curl-2.0.2-48.4.1.ppc64le as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.4.1.ppc64le" }, "product_reference": "qemu-block-curl-2.0.2-48.4.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-block-curl-2.0.2-48.4.1.s390x as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.4.1.s390x" }, "product_reference": "qemu-block-curl-2.0.2-48.4.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-block-curl-2.0.2-48.4.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.4.1.x86_64" }, "product_reference": "qemu-block-curl-2.0.2-48.4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-block-rbd-2.0.2-48.4.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.4.1.x86_64" }, "product_reference": "qemu-block-rbd-2.0.2-48.4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2.0.2-48.4.1.ppc64le as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.4.1.ppc64le" }, "product_reference": "qemu-guest-agent-2.0.2-48.4.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2.0.2-48.4.1.s390x as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.4.1.s390x" }, "product_reference": "qemu-guest-agent-2.0.2-48.4.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2.0.2-48.4.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.4.1.x86_64" }, "product_reference": "qemu-guest-agent-2.0.2-48.4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-ipxe-1.0.0-48.4.1.noarch as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.4.1.noarch" }, "product_reference": "qemu-ipxe-1.0.0-48.4.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2.0.2-48.4.1.s390x as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.4.1.s390x" }, "product_reference": "qemu-kvm-2.0.2-48.4.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2.0.2-48.4.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.4.1.x86_64" }, "product_reference": "qemu-kvm-2.0.2-48.4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-lang-2.0.2-48.4.1.ppc64le as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.4.1.ppc64le" }, "product_reference": "qemu-lang-2.0.2-48.4.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-lang-2.0.2-48.4.1.s390x as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.4.1.s390x" }, "product_reference": "qemu-lang-2.0.2-48.4.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-lang-2.0.2-48.4.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.4.1.x86_64" }, "product_reference": "qemu-lang-2.0.2-48.4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-ppc-2.0.2-48.4.1.ppc64le as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.4.1.ppc64le" }, "product_reference": "qemu-ppc-2.0.2-48.4.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-s390-2.0.2-48.4.1.s390x as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.4.1.s390x" }, "product_reference": "qemu-s390-2.0.2-48.4.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-seabios-1.7.4-48.4.1.noarch as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.4.1.noarch" }, "product_reference": "qemu-seabios-1.7.4-48.4.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-sgabios-8-48.4.1.noarch as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.4.1.noarch" }, "product_reference": "qemu-sgabios-8-48.4.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-tools-2.0.2-48.4.1.ppc64le as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.4.1.ppc64le" }, "product_reference": "qemu-tools-2.0.2-48.4.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-tools-2.0.2-48.4.1.s390x as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.4.1.s390x" }, "product_reference": "qemu-tools-2.0.2-48.4.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-tools-2.0.2-48.4.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.4.1.x86_64" }, "product_reference": "qemu-tools-2.0.2-48.4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-vgabios-1.7.4-48.4.1.noarch as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.4.1.noarch" }, "product_reference": "qemu-vgabios-1.7.4-48.4.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-x86-2.0.2-48.4.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.4.1.x86_64" }, "product_reference": "qemu-x86-2.0.2-48.4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-2.0.2-48.4.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.4.1.ppc64le" }, "product_reference": "qemu-2.0.2-48.4.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-2.0.2-48.4.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.4.1.s390x" }, "product_reference": "qemu-2.0.2-48.4.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-2.0.2-48.4.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.4.1.x86_64" }, "product_reference": "qemu-2.0.2-48.4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-block-curl-2.0.2-48.4.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.4.1.ppc64le" }, "product_reference": "qemu-block-curl-2.0.2-48.4.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-block-curl-2.0.2-48.4.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.4.1.s390x" }, "product_reference": "qemu-block-curl-2.0.2-48.4.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-block-curl-2.0.2-48.4.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.4.1.x86_64" }, "product_reference": "qemu-block-curl-2.0.2-48.4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-block-rbd-2.0.2-48.4.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.4.1.x86_64" }, "product_reference": "qemu-block-rbd-2.0.2-48.4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2.0.2-48.4.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.4.1.ppc64le" }, "product_reference": "qemu-guest-agent-2.0.2-48.4.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2.0.2-48.4.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.4.1.s390x" }, "product_reference": "qemu-guest-agent-2.0.2-48.4.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2.0.2-48.4.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.4.1.x86_64" }, "product_reference": "qemu-guest-agent-2.0.2-48.4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-ipxe-1.0.0-48.4.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.4.1.noarch" }, "product_reference": "qemu-ipxe-1.0.0-48.4.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2.0.2-48.4.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.4.1.s390x" }, "product_reference": "qemu-kvm-2.0.2-48.4.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2.0.2-48.4.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.4.1.x86_64" }, "product_reference": "qemu-kvm-2.0.2-48.4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-lang-2.0.2-48.4.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.4.1.ppc64le" }, "product_reference": "qemu-lang-2.0.2-48.4.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-lang-2.0.2-48.4.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.4.1.s390x" }, "product_reference": "qemu-lang-2.0.2-48.4.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-lang-2.0.2-48.4.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.4.1.x86_64" }, "product_reference": "qemu-lang-2.0.2-48.4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-ppc-2.0.2-48.4.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.4.1.ppc64le" }, "product_reference": "qemu-ppc-2.0.2-48.4.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-s390-2.0.2-48.4.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.4.1.s390x" }, "product_reference": "qemu-s390-2.0.2-48.4.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-seabios-1.7.4-48.4.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.4.1.noarch" }, "product_reference": "qemu-seabios-1.7.4-48.4.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-sgabios-8-48.4.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.4.1.noarch" }, "product_reference": "qemu-sgabios-8-48.4.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-tools-2.0.2-48.4.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.4.1.ppc64le" }, "product_reference": "qemu-tools-2.0.2-48.4.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-tools-2.0.2-48.4.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.4.1.s390x" }, "product_reference": "qemu-tools-2.0.2-48.4.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-tools-2.0.2-48.4.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.4.1.x86_64" }, "product_reference": "qemu-tools-2.0.2-48.4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-vgabios-1.7.4-48.4.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.4.1.noarch" }, "product_reference": "qemu-vgabios-1.7.4-48.4.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-x86-2.0.2-48.4.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.4.1.x86_64" }, "product_reference": "qemu-x86-2.0.2-48.4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-3209", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3209" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.4.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.4.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.4.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.4.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.4.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.4.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.4.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.4.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3209", "url": "https://www.suse.com/security/cve/CVE-2015-3209" }, { "category": "external", "summary": "SUSE Bug 932267 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932267" }, { "category": "external", "summary": "SUSE Bug 932770 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932770" }, { "category": "external", "summary": "SUSE Bug 932823 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932823" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.4.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.4.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.4.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.4.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.4.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.4.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.4.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.4.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-08T14:28:12Z", "details": "important" } ], "title": "CVE-2015-3209" }, { "cve": "CVE-2015-4037", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4037" } ], "notes": [ { "category": "general", "text": "The slirp_smb function in net/slirp.c in QEMU 2.3.0 and earlier creates temporary files with predictable names, which allows local users to cause a denial of service (instantiation failure) by creating /tmp/qemu-smb.*-* files before the program.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.4.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.4.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.4.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.4.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.4.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.4.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.4.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.4.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4037", "url": "https://www.suse.com/security/cve/CVE-2015-4037" }, { "category": "external", "summary": "SUSE Bug 932267 for CVE-2015-4037", "url": "https://bugzilla.suse.com/932267" }, { "category": "external", "summary": "SUSE Bug 950367 for CVE-2015-4037", "url": "https://bugzilla.suse.com/950367" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.4.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.4.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.4.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.4.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.4.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.4.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.4.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.4.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-08T14:28:12Z", "details": "low" } ], "title": "CVE-2015-4037" } ] }
suse-su-2015:1426-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for kvm", "title": "Title of the patch" }, { "category": "description", "text": "kvm was updated to fix two security issues.\n\nThe following vulnerabilities were fixed:\n\n- CVE-2015-5154: Host code execution via IDE subsystem CD-ROM (bsc#938344).\n- CVE-2015-3209: Fix buffer overflow in pcnet emulation (bsc#932770).\n", "title": "Description of the patch" }, { "category": "details", "text": "slessp2-kvm-12041", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_1426-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2015:1426-1", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20151426-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2015:1426-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-August/001550.html" }, { "category": "self", "summary": "SUSE Bug 932770", "url": "https://bugzilla.suse.com/932770" }, { "category": "self", "summary": "SUSE Bug 938344", "url": "https://bugzilla.suse.com/938344" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3209 page", "url": "https://www.suse.com/security/cve/CVE-2015-3209/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5154 page", "url": "https://www.suse.com/security/cve/CVE-2015-5154/" } ], "title": "Security update for kvm", "tracking": { "current_release_date": "2015-08-07T17:46:18Z", "generator": { "date": "2015-08-07T17:46:18Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2015:1426-1", "initial_release_date": "2015-08-07T17:46:18Z", "revision_history": [ { "date": "2015-08-07T17:46:18Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kvm-0.15.1-0.32.2.i586", "product": { "name": "kvm-0.15.1-0.32.2.i586", "product_id": "kvm-0.15.1-0.32.2.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "kvm-0.15.1-0.32.2.x86_64", "product": { "name": "kvm-0.15.1-0.32.2.x86_64", "product_id": "kvm-0.15.1-0.32.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles_ltss:11:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kvm-0.15.1-0.32.2.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kvm-0.15.1-0.32.2.i586" }, "product_reference": "kvm-0.15.1-0.32.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-0.15.1-0.32.2.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kvm-0.15.1-0.32.2.x86_64" }, "product_reference": "kvm-0.15.1-0.32.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-3209", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3209" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kvm-0.15.1-0.32.2.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kvm-0.15.1-0.32.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3209", "url": "https://www.suse.com/security/cve/CVE-2015-3209" }, { "category": "external", "summary": "SUSE Bug 932267 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932267" }, { "category": "external", "summary": "SUSE Bug 932770 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932770" }, { "category": "external", "summary": "SUSE Bug 932823 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932823" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kvm-0.15.1-0.32.2.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kvm-0.15.1-0.32.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-08-07T17:46:18Z", "details": "important" } ], "title": "CVE-2015-3209" }, { "cve": "CVE-2015-5154", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5154" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the IDE subsystem in QEMU, as used in Xen 4.5.x and earlier, when the container has a CDROM drive enabled, allows local guest users to execute arbitrary code on the host via unspecified ATAPI commands.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kvm-0.15.1-0.32.2.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kvm-0.15.1-0.32.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5154", "url": "https://www.suse.com/security/cve/CVE-2015-5154" }, { "category": "external", "summary": "SUSE Bug 938344 for CVE-2015-5154", "url": "https://bugzilla.suse.com/938344" }, { "category": "external", "summary": "SUSE Bug 950367 for CVE-2015-5154", "url": "https://bugzilla.suse.com/950367" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kvm-0.15.1-0.32.2.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kvm-0.15.1-0.32.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-08-07T17:46:18Z", "details": "important" } ], "title": "CVE-2015-5154" } ] }
suse-su-2015:0870-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for kvm", "title": "Title of the patch" }, { "category": "description", "text": "\nkvm has been updated to fix issues in the embedded qemu:\n\n * \n\n CVE-2014-0223: An integer overflow flaw was found in the QEMU block\n driver for QCOW version 1 disk images. A user able to alter the QEMU\n disk image files loaded by a guest could have used this flaw to\n corrupt QEMU process memory on the host, which could potentially have\n resulted in arbitrary code execution on the host with the privileges\n of the QEMU process.\n\n * \n\n CVE-2014-3461: A user able to alter the savevm data (either on the\n disk or over the wire during migration) could have used this flaw to\n to corrupt QEMU process memory on the (destination) host, which could\n have potentially resulted in arbitrary code execution on the host\n with the privileges of the QEMU process.\n\n * \n\n CVE-2014-0222: An integer overflow flaw was found in the QEMU block\n driver for QCOW version 1 disk images. A user able to alter the QEMU\n disk image files loaded by a guest could have used this flaw to\n corrupt QEMU process memory on the host, which could have potentially\n resulted in arbitrary code execution on the host with the privileges\n of the QEMU process.\n\nNon-security bugs fixed:\n\n * Fix exceeding IRQ routes that could have caused freezes of guests.\n (bnc#876842)\n * Fix CPUID emulation bugs that may have broken Windows guests with\n newer -cpu types (bnc#886535)\n\nSecurity Issues:\n\n * CVE-2014-0222\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0222\u003e\n * CVE-2014-0223\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0223\u003e\n * CVE-2014-3461\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3461\u003e\n\n", "title": "Description of the patch" }, { "category": "details", "text": "sledsp3-kvm,slessp3-kvm", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_0870-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2015:0870-1", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20150870-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2015:0870-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-May/001381.html" }, { "category": "self", "summary": "SUSE Bug 812836", "url": "https://bugzilla.suse.com/812836" }, { "category": "self", "summary": "SUSE Bug 812983", "url": "https://bugzilla.suse.com/812983" }, { "category": "self", "summary": "SUSE Bug 817593", "url": "https://bugzilla.suse.com/817593" }, { "category": "self", "summary": "SUSE Bug 821819", "url": "https://bugzilla.suse.com/821819" }, { "category": "self", "summary": "SUSE Bug 824340", "url": "https://bugzilla.suse.com/824340" }, { "category": "self", "summary": "SUSE Bug 829800", "url": "https://bugzilla.suse.com/829800" }, { "category": "self", "summary": "SUSE Bug 841080", "url": "https://bugzilla.suse.com/841080" }, { "category": "self", "summary": "SUSE Bug 842006", "url": "https://bugzilla.suse.com/842006" }, { "category": "self", "summary": "SUSE Bug 842088", "url": "https://bugzilla.suse.com/842088" }, { "category": "self", "summary": "SUSE Bug 858858", "url": "https://bugzilla.suse.com/858858" }, { "category": "self", "summary": "SUSE Bug 864391", "url": "https://bugzilla.suse.com/864391" }, { "category": "self", "summary": "SUSE Bug 864649", "url": "https://bugzilla.suse.com/864649" }, { "category": "self", "summary": "SUSE Bug 864650", "url": "https://bugzilla.suse.com/864650" }, { "category": "self", "summary": "SUSE Bug 864653", "url": "https://bugzilla.suse.com/864653" }, { "category": "self", "summary": "SUSE Bug 864655", "url": "https://bugzilla.suse.com/864655" }, { "category": "self", "summary": "SUSE Bug 864665", "url": "https://bugzilla.suse.com/864665" }, { "category": "self", "summary": "SUSE Bug 864671", "url": "https://bugzilla.suse.com/864671" }, { "category": "self", "summary": "SUSE Bug 864673", "url": "https://bugzilla.suse.com/864673" }, { "category": "self", "summary": "SUSE Bug 864678", "url": "https://bugzilla.suse.com/864678" }, { "category": "self", "summary": "SUSE Bug 864682", "url": "https://bugzilla.suse.com/864682" }, { "category": "self", "summary": "SUSE Bug 864769", "url": "https://bugzilla.suse.com/864769" }, { "category": "self", "summary": "SUSE Bug 864796", "url": "https://bugzilla.suse.com/864796" }, { "category": "self", "summary": "SUSE Bug 864801", "url": "https://bugzilla.suse.com/864801" }, { "category": "self", "summary": "SUSE Bug 864802", "url": "https://bugzilla.suse.com/864802" }, { "category": "self", "summary": "SUSE Bug 864804", "url": "https://bugzilla.suse.com/864804" }, { "category": "self", "summary": "SUSE Bug 864805", "url": "https://bugzilla.suse.com/864805" }, { "category": "self", "summary": "SUSE Bug 864811", "url": "https://bugzilla.suse.com/864811" }, { "category": "self", "summary": "SUSE Bug 864812", "url": "https://bugzilla.suse.com/864812" }, { "category": "self", "summary": "SUSE Bug 864814", "url": "https://bugzilla.suse.com/864814" }, { "category": "self", "summary": "SUSE Bug 870439", "url": "https://bugzilla.suse.com/870439" }, { "category": "self", "summary": "SUSE Bug 873235", "url": "https://bugzilla.suse.com/873235" }, { "category": "self", "summary": "SUSE Bug 874749", "url": "https://bugzilla.suse.com/874749" }, { "category": "self", "summary": "SUSE Bug 874788", "url": "https://bugzilla.suse.com/874788" }, { "category": "self", "summary": "SUSE Bug 876842", "url": "https://bugzilla.suse.com/876842" }, { "category": "self", "summary": "SUSE Bug 877642", "url": "https://bugzilla.suse.com/877642" }, { "category": "self", "summary": "SUSE Bug 877645", "url": "https://bugzilla.suse.com/877645" }, { "category": "self", "summary": "SUSE Bug 878541", "url": "https://bugzilla.suse.com/878541" }, { "category": "self", "summary": "SUSE Bug 886535", "url": "https://bugzilla.suse.com/886535" }, { "category": "self", "summary": "SUSE Bug 920571", "url": "https://bugzilla.suse.com/920571" }, { "category": "self", "summary": "SUSE Bug 924018", "url": "https://bugzilla.suse.com/924018" }, { "category": "self", "summary": "SUSE Bug 929339", "url": "https://bugzilla.suse.com/929339" }, { "category": "self", "summary": "SUSE Bug 932267", "url": "https://bugzilla.suse.com/932267" }, { "category": "self", "summary": "SUSE Bug 932770", "url": "https://bugzilla.suse.com/932770" }, { "category": "self", "summary": "SUSE CVE CVE-2013-2016 page", "url": "https://www.suse.com/security/cve/CVE-2013-2016/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4344 page", "url": "https://www.suse.com/security/cve/CVE-2013-4344/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4541 page", "url": "https://www.suse.com/security/cve/CVE-2013-4541/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0142 page", "url": "https://www.suse.com/security/cve/CVE-2014-0142/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0143 page", "url": "https://www.suse.com/security/cve/CVE-2014-0143/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0144 page", "url": "https://www.suse.com/security/cve/CVE-2014-0144/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0145 page", "url": "https://www.suse.com/security/cve/CVE-2014-0145/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0146 page", "url": "https://www.suse.com/security/cve/CVE-2014-0146/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0147 page", "url": "https://www.suse.com/security/cve/CVE-2014-0147/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0150 page", "url": "https://www.suse.com/security/cve/CVE-2014-0150/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0222 page", "url": "https://www.suse.com/security/cve/CVE-2014-0222/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0223 page", "url": "https://www.suse.com/security/cve/CVE-2014-0223/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-2894 page", "url": "https://www.suse.com/security/cve/CVE-2014-2894/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3461 page", "url": "https://www.suse.com/security/cve/CVE-2014-3461/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1779 page", "url": "https://www.suse.com/security/cve/CVE-2015-1779/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3209 page", "url": "https://www.suse.com/security/cve/CVE-2015-3209/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3456 page", "url": "https://www.suse.com/security/cve/CVE-2015-3456/" } ], "title": "Security update for kvm", "tracking": { "current_release_date": "2014-09-19T14:41:45Z", "generator": { "date": "2014-09-19T14:41:45Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2015:0870-1", "initial_release_date": "2014-09-19T14:41:45Z", "revision_history": [ { "date": "2014-09-19T14:41:45Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kvm-1.4.2-0.17.1.i586", "product": { "name": "kvm-1.4.2-0.17.1.i586", "product_id": "kvm-1.4.2-0.17.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "kvm-1.4.2-0.17.1.s390x", "product": { "name": "kvm-1.4.2-0.17.1.s390x", "product_id": "kvm-1.4.2-0.17.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kvm-1.4.2-0.17.1.x86_64", "product": { "name": "kvm-1.4.2-0.17.1.x86_64", "product_id": "kvm-1.4.2-0.17.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 11 SP3", "product": { "name": "SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sled:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3", "product": { "name": "SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product": { "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:11:sp3:teradata" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:11:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-0.17.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586" }, "product_reference": "kvm-1.4.2-0.17.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-0.17.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64" }, "product_reference": "kvm-1.4.2-0.17.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-0.17.1.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586" }, "product_reference": "kvm-1.4.2-0.17.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-0.17.1.s390x as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x" }, "product_reference": "kvm-1.4.2-0.17.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-0.17.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64" }, "product_reference": "kvm-1.4.2-0.17.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-0.17.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586" }, "product_reference": "kvm-1.4.2-0.17.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-0.17.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x" }, "product_reference": "kvm-1.4.2-0.17.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-0.17.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64" }, "product_reference": "kvm-1.4.2-0.17.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-0.17.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586" }, "product_reference": "kvm-1.4.2-0.17.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-0.17.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x" }, "product_reference": "kvm-1.4.2-0.17.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-0.17.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" }, "product_reference": "kvm-1.4.2-0.17.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-2016", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-2016" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way qemu v1.3.0 and later (virtio-rng) validates addresses when guest accesses the config space of a virtio device. If the virtio device has zero/small sized config space, such as virtio-rng, a privileged guest user could use this flaw to access the matching host\u0027s qemu address space and thus increase their privileges on the host.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-2016", "url": "https://www.suse.com/security/cve/CVE-2013-2016" }, { "category": "external", "summary": "SUSE Bug 817593 for CVE-2013-2016", "url": "https://bugzilla.suse.com/817593" }, { "category": "external", "summary": "SUSE Bug 871442 for CVE-2013-2016", "url": "https://bugzilla.suse.com/871442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "important" } ], "title": "CVE-2013-2016" }, { "cve": "CVE-2013-4344", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4344" } ], "notes": [ { "category": "general", "text": "Buffer overflow in the SCSI implementation in QEMU, as used in Xen, when a SCSI controller has more than 256 attached devices, allows local users to gain privileges via a small transfer buffer in a REPORT LUNS command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4344", "url": "https://www.suse.com/security/cve/CVE-2013-4344" }, { "category": "external", "summary": "SUSE Bug 842006 for CVE-2013-4344", "url": "https://bugzilla.suse.com/842006" }, { "category": "external", "summary": "SUSE Bug 871442 for CVE-2013-4344", "url": "https://bugzilla.suse.com/871442" }, { "category": "external", "summary": "SUSE Bug 880751 for CVE-2013-4344", "url": "https://bugzilla.suse.com/880751" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2013-4344" }, { "cve": "CVE-2013-4541", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4541" } ], "notes": [ { "category": "general", "text": "The usb_device_post_load function in hw/usb/bus.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a crafted savevm image, related to a negative setup_len or setup_index value.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4541", "url": "https://www.suse.com/security/cve/CVE-2013-4541" }, { "category": "external", "summary": "SUSE Bug 864802 for CVE-2013-4541", "url": "https://bugzilla.suse.com/864802" }, { "category": "external", "summary": "SUSE Bug 871442 for CVE-2013-4541", "url": "https://bugzilla.suse.com/871442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2013-4541" }, { "cve": "CVE-2014-0142", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0142" } ], "notes": [ { "category": "general", "text": "QEMU, possibly before 2.0.0, allows local users to cause a denial of service (divide-by-zero error and crash) via a zero value in the (1) tracks field to the seek_to_sector function in block/parallels.c or (2) extent_size field in the bochs function in block/bochs.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0142", "url": "https://www.suse.com/security/cve/CVE-2014-0142" }, { "category": "external", "summary": "SUSE Bug 870439 for CVE-2014-0142", "url": "https://bugzilla.suse.com/870439" }, { "category": "external", "summary": "SUSE Bug 871442 for CVE-2014-0142", "url": "https://bugzilla.suse.com/871442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2014-0142" }, { "cve": "CVE-2014-0143", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0143" } ], "notes": [ { "category": "general", "text": "Multiple integer overflows in the block drivers in QEMU, possibly before 2.0.0, allow local users to cause a denial of service (crash) via a crafted catalog size in (1) the parallels_open function in block/parallels.c or (2) bochs_open function in bochs.c, a large L1 table in the (3) qcow2_snapshot_load_tmp in qcow2-snapshot.c or (4) qcow2_grow_l1_table function in qcow2-cluster.c, (5) a large request in the bdrv_check_byte_request function in block.c and other block drivers, (6) crafted cluster indexes in the get_refcount function in qcow2-refcount.c, or (7) a large number of blocks in the cloop_open function in cloop.c, which trigger buffer overflows, memory corruption, large memory allocations and out-of-bounds read and writes.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0143", "url": "https://www.suse.com/security/cve/CVE-2014-0143" }, { "category": "external", "summary": "SUSE Bug 870439 for CVE-2014-0143", "url": "https://bugzilla.suse.com/870439" }, { "category": "external", "summary": "SUSE Bug 871442 for CVE-2014-0143", "url": "https://bugzilla.suse.com/871442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2014-0143" }, { "cve": "CVE-2014-0144", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0144" } ], "notes": [ { "category": "general", "text": "QEMU before 2.0.0 block drivers for CLOOP, QCOW2 version 2 and various other image formats are vulnerable to potential memory corruptions, integer/buffer overflows or crash caused by missing input validations which could allow a remote user to execute arbitrary code on the host with the privileges of the QEMU process.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0144", "url": "https://www.suse.com/security/cve/CVE-2014-0144" }, { "category": "external", "summary": "SUSE Bug 870439 for CVE-2014-0144", "url": "https://bugzilla.suse.com/870439" }, { "category": "external", "summary": "SUSE Bug 871442 for CVE-2014-0144", "url": "https://bugzilla.suse.com/871442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2014-0144" }, { "cve": "CVE-2014-0145", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0145" } ], "notes": [ { "category": "general", "text": "Multiple buffer overflows in QEMU before 1.7.2 and 2.x before 2.0.0, allow local users to cause a denial of service (crash) or possibly execute arbitrary code via a large (1) L1 table in the qcow2_snapshot_load_tmp in the QCOW 2 block driver (block/qcow2-snapshot.c) or (2) uncompressed chunk, (3) chunk length, or (4) number of sectors in the DMG block driver (block/dmg.c).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0145", "url": "https://www.suse.com/security/cve/CVE-2014-0145" }, { "category": "external", "summary": "SUSE Bug 870439 for CVE-2014-0145", "url": "https://bugzilla.suse.com/870439" }, { "category": "external", "summary": "SUSE Bug 871442 for CVE-2014-0145", "url": "https://bugzilla.suse.com/871442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "important" } ], "title": "CVE-2014-0145" }, { "cve": "CVE-2014-0146", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0146" } ], "notes": [ { "category": "general", "text": "The qcow2_open function in the (block/qcow2.c) in QEMU before 1.7.2 and 2.x before 2.0.0 allows local users to cause a denial of service (NULL pointer dereference) via a crafted image which causes an error, related to the initialization of the snapshot_offset and nb_snapshots fields.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0146", "url": "https://www.suse.com/security/cve/CVE-2014-0146" }, { "category": "external", "summary": "SUSE Bug 870439 for CVE-2014-0146", "url": "https://bugzilla.suse.com/870439" }, { "category": "external", "summary": "SUSE Bug 871442 for CVE-2014-0146", "url": "https://bugzilla.suse.com/871442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2014-0146" }, { "cve": "CVE-2014-0147", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0147" } ], "notes": [ { "category": "general", "text": "Qemu before 1.6.2 block diver for the various disk image formats used by Bochs and for the QCOW version 2 format, are vulnerable to a possible crash caused by signed data types or a logic error while creating QCOW2 snapshots, which leads to incorrectly calling update_refcount() routine.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0147", "url": "https://www.suse.com/security/cve/CVE-2014-0147" }, { "category": "external", "summary": "SUSE Bug 870439 for CVE-2014-0147", "url": "https://bugzilla.suse.com/870439" }, { "category": "external", "summary": "SUSE Bug 871442 for CVE-2014-0147", "url": "https://bugzilla.suse.com/871442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2014-0147" }, { "cve": "CVE-2014-0150", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0150" } ], "notes": [ { "category": "general", "text": "Integer overflow in the virtio_net_handle_mac function in hw/net/virtio-net.c in QEMU 2.0 and earlier allows local guest users to execute arbitrary code via a MAC addresses table update request, which triggers a heap-based buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0150", "url": "https://www.suse.com/security/cve/CVE-2014-0150" }, { "category": "external", "summary": "SUSE Bug 873235 for CVE-2014-0150", "url": "https://bugzilla.suse.com/873235" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2014-0150" }, { "cve": "CVE-2014-0222", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0222" } ], "notes": [ { "category": "general", "text": "Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0222", "url": "https://www.suse.com/security/cve/CVE-2014-0222" }, { "category": "external", "summary": "SUSE Bug 1072223 for CVE-2014-0222", "url": "https://bugzilla.suse.com/1072223" }, { "category": "external", "summary": "SUSE Bug 877642 for CVE-2014-0222", "url": "https://bugzilla.suse.com/877642" }, { "category": "external", "summary": "SUSE Bug 950367 for CVE-2014-0222", "url": "https://bugzilla.suse.com/950367" }, { "category": "external", "summary": "SUSE Bug 964925 for CVE-2014-0222", "url": "https://bugzilla.suse.com/964925" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2014-0222" }, { "cve": "CVE-2014-0223", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0223" } ], "notes": [ { "category": "general", "text": "Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a large image size, which triggers a buffer overflow or out-of-bounds read.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0223", "url": "https://www.suse.com/security/cve/CVE-2014-0223" }, { "category": "external", "summary": "SUSE Bug 877645 for CVE-2014-0223", "url": "https://bugzilla.suse.com/877645" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2014-0223" }, { "cve": "CVE-2014-2894", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-2894" } ], "notes": [ { "category": "general", "text": "Off-by-one error in the cmd_smart function in the smart self test in hw/ide/core.c in QEMU before 2.0 allows local users to have unspecified impact via a SMART EXECUTE OFFLINE command that triggers a buffer underflow and memory corruption.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-2894", "url": "https://www.suse.com/security/cve/CVE-2014-2894" }, { "category": "external", "summary": "SUSE Bug 874749 for CVE-2014-2894", "url": "https://bugzilla.suse.com/874749" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2014-2894" }, { "cve": "CVE-2014-3461", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3461" } ], "notes": [ { "category": "general", "text": "hw/usb/bus.c in QEMU 1.6.2 allows remote attackers to execute arbitrary code via crafted savevm data, which triggers a heap-based buffer overflow, related to \"USB post load checks.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3461", "url": "https://www.suse.com/security/cve/CVE-2014-3461" }, { "category": "external", "summary": "SUSE Bug 878541 for CVE-2014-3461", "url": "https://bugzilla.suse.com/878541" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2014-3461" }, { "cve": "CVE-2015-1779", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1779" } ], "notes": [ { "category": "general", "text": "The VNC websocket frame decoder in QEMU allows remote attackers to cause a denial of service (memory and CPU consumption) via a large (1) websocket payload or (2) HTTP headers section.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1779", "url": "https://www.suse.com/security/cve/CVE-2015-1779" }, { "category": "external", "summary": "SUSE Bug 924018 for CVE-2015-1779", "url": "https://bugzilla.suse.com/924018" }, { "category": "external", "summary": "SUSE Bug 962632 for CVE-2015-1779", "url": "https://bugzilla.suse.com/962632" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2015-1779" }, { "cve": "CVE-2015-3209", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3209" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3209", "url": "https://www.suse.com/security/cve/CVE-2015-3209" }, { "category": "external", "summary": "SUSE Bug 932267 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932267" }, { "category": "external", "summary": "SUSE Bug 932770 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932770" }, { "category": "external", "summary": "SUSE Bug 932823 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932823" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "important" } ], "title": "CVE-2015-3209" }, { "cve": "CVE-2015-3456", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3456" } ], "notes": [ { "category": "general", "text": "The Floppy Disk Controller (FDC) in QEMU, as used in Xen 4.5.x and earlier and KVM, allows local guest users to cause a denial of service (out-of-bounds write and guest crash) or possibly execute arbitrary code via the (1) FD_CMD_READ_ID, (2) FD_CMD_DRIVE_SPECIFICATION_COMMAND, or other unspecified commands, aka VENOM.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3456", "url": "https://www.suse.com/security/cve/CVE-2015-3456" }, { "category": "external", "summary": "SUSE Bug 929339 for CVE-2015-3456", "url": "https://bugzilla.suse.com/929339" }, { "category": "external", "summary": "SUSE Bug 932770 for CVE-2015-3456", "url": "https://bugzilla.suse.com/932770" }, { "category": "external", "summary": "SUSE Bug 935900 for CVE-2015-3456", "url": "https://bugzilla.suse.com/935900" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2015-3456" } ] }
suse-su-2015:0889-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for kvm", "title": "Title of the patch" }, { "category": "description", "text": "\nkvm has been updated to fix issues in the embedded qemu:\n\n * \n\n CVE-2014-0223: An integer overflow flaw was found in the QEMU block\n driver for QCOW version 1 disk images. A user able to alter the QEMU\n disk image files loaded by a guest could have used this flaw to\n corrupt QEMU process memory on the host, which could potentially have\n resulted in arbitrary code execution on the host with the privileges\n of the QEMU process.\n\n * \n\n CVE-2014-3461: A user able to alter the savevm data (either on the\n disk or over the wire during migration) could have used this flaw to\n to corrupt QEMU process memory on the (destination) host, which could\n have potentially resulted in arbitrary code execution on the host\n with the privileges of the QEMU process.\n\n * \n\n CVE-2014-0222: An integer overflow flaw was found in the QEMU block\n driver for QCOW version 1 disk images. A user able to alter the QEMU\n disk image files loaded by a guest could have used this flaw to\n corrupt QEMU process memory on the host, which could have potentially\n resulted in arbitrary code execution on the host with the privileges\n of the QEMU process.\n\nNon-security bugs fixed:\n\n * Fix exceeding IRQ routes that could have caused freezes of guests.\n (bnc#876842)\n * Fix CPUID emulation bugs that may have broken Windows guests with\n newer -cpu types (bnc#886535)\n\nSecurity Issues:\n\n * CVE-2014-0222\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0222\u003e\n * CVE-2014-0223\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0223\u003e\n * CVE-2014-3461\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3461\u003e\n\n", "title": "Description of the patch" }, { "category": "details", "text": "sledsp3-kvm,slessp3-kvm", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_0889-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2015:0889-1", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20150889-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2015:0889-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-May/001390.html" }, { "category": "self", "summary": "SUSE Bug 812836", "url": "https://bugzilla.suse.com/812836" }, { "category": "self", "summary": "SUSE Bug 812983", "url": "https://bugzilla.suse.com/812983" }, { "category": "self", "summary": "SUSE Bug 817593", "url": "https://bugzilla.suse.com/817593" }, { "category": "self", "summary": "SUSE Bug 821819", "url": "https://bugzilla.suse.com/821819" }, { "category": "self", "summary": "SUSE Bug 824340", "url": "https://bugzilla.suse.com/824340" }, { "category": "self", "summary": "SUSE Bug 829800", "url": "https://bugzilla.suse.com/829800" }, { "category": "self", "summary": "SUSE Bug 841080", "url": "https://bugzilla.suse.com/841080" }, { "category": "self", "summary": "SUSE Bug 842006", "url": "https://bugzilla.suse.com/842006" }, { "category": "self", "summary": "SUSE Bug 842088", "url": "https://bugzilla.suse.com/842088" }, { "category": "self", "summary": "SUSE Bug 858858", "url": "https://bugzilla.suse.com/858858" }, { "category": "self", "summary": "SUSE Bug 864391", "url": "https://bugzilla.suse.com/864391" }, { "category": "self", "summary": "SUSE Bug 864649", "url": "https://bugzilla.suse.com/864649" }, { "category": "self", "summary": "SUSE Bug 864650", "url": "https://bugzilla.suse.com/864650" }, { "category": "self", "summary": "SUSE Bug 864653", "url": "https://bugzilla.suse.com/864653" }, { "category": "self", "summary": "SUSE Bug 864655", "url": "https://bugzilla.suse.com/864655" }, { "category": "self", "summary": "SUSE Bug 864665", "url": "https://bugzilla.suse.com/864665" }, { "category": "self", "summary": "SUSE Bug 864671", "url": "https://bugzilla.suse.com/864671" }, { "category": "self", "summary": "SUSE Bug 864673", "url": "https://bugzilla.suse.com/864673" }, { "category": "self", "summary": "SUSE Bug 864678", "url": "https://bugzilla.suse.com/864678" }, { "category": "self", "summary": "SUSE Bug 864682", "url": "https://bugzilla.suse.com/864682" }, { "category": "self", "summary": "SUSE Bug 864769", "url": "https://bugzilla.suse.com/864769" }, { "category": "self", "summary": "SUSE Bug 864796", "url": "https://bugzilla.suse.com/864796" }, { "category": "self", "summary": "SUSE Bug 864801", "url": "https://bugzilla.suse.com/864801" }, { "category": "self", "summary": "SUSE Bug 864802", "url": "https://bugzilla.suse.com/864802" }, { "category": "self", "summary": "SUSE Bug 864804", "url": "https://bugzilla.suse.com/864804" }, { "category": "self", "summary": "SUSE Bug 864805", "url": "https://bugzilla.suse.com/864805" }, { "category": "self", "summary": "SUSE Bug 864811", "url": "https://bugzilla.suse.com/864811" }, { "category": "self", "summary": "SUSE Bug 864812", "url": "https://bugzilla.suse.com/864812" }, { "category": "self", "summary": "SUSE Bug 864814", "url": "https://bugzilla.suse.com/864814" }, { "category": "self", "summary": "SUSE Bug 870439", "url": "https://bugzilla.suse.com/870439" }, { "category": "self", "summary": "SUSE Bug 873235", "url": "https://bugzilla.suse.com/873235" }, { "category": "self", "summary": "SUSE Bug 874749", "url": "https://bugzilla.suse.com/874749" }, { "category": "self", "summary": "SUSE Bug 874788", "url": "https://bugzilla.suse.com/874788" }, { "category": "self", "summary": "SUSE Bug 876842", "url": "https://bugzilla.suse.com/876842" }, { "category": "self", "summary": "SUSE Bug 877642", "url": "https://bugzilla.suse.com/877642" }, { "category": "self", "summary": "SUSE Bug 877645", "url": "https://bugzilla.suse.com/877645" }, { "category": "self", "summary": "SUSE Bug 878541", "url": "https://bugzilla.suse.com/878541" }, { "category": "self", "summary": "SUSE Bug 886535", "url": "https://bugzilla.suse.com/886535" }, { "category": "self", "summary": "SUSE Bug 920571", "url": "https://bugzilla.suse.com/920571" }, { "category": "self", "summary": "SUSE Bug 924018", "url": "https://bugzilla.suse.com/924018" }, { "category": "self", "summary": "SUSE Bug 929339", "url": "https://bugzilla.suse.com/929339" }, { "category": "self", "summary": "SUSE Bug 932267", "url": "https://bugzilla.suse.com/932267" }, { "category": "self", "summary": "SUSE Bug 932770", "url": "https://bugzilla.suse.com/932770" }, { "category": "self", "summary": "SUSE CVE CVE-2013-2016 page", "url": "https://www.suse.com/security/cve/CVE-2013-2016/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4344 page", "url": "https://www.suse.com/security/cve/CVE-2013-4344/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4541 page", "url": "https://www.suse.com/security/cve/CVE-2013-4541/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0142 page", "url": "https://www.suse.com/security/cve/CVE-2014-0142/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0143 page", "url": "https://www.suse.com/security/cve/CVE-2014-0143/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0144 page", "url": "https://www.suse.com/security/cve/CVE-2014-0144/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0145 page", "url": "https://www.suse.com/security/cve/CVE-2014-0145/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0146 page", "url": "https://www.suse.com/security/cve/CVE-2014-0146/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0147 page", "url": "https://www.suse.com/security/cve/CVE-2014-0147/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0150 page", "url": "https://www.suse.com/security/cve/CVE-2014-0150/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0222 page", "url": "https://www.suse.com/security/cve/CVE-2014-0222/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0223 page", "url": "https://www.suse.com/security/cve/CVE-2014-0223/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-2894 page", "url": "https://www.suse.com/security/cve/CVE-2014-2894/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3461 page", "url": "https://www.suse.com/security/cve/CVE-2014-3461/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1779 page", "url": "https://www.suse.com/security/cve/CVE-2015-1779/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3209 page", "url": "https://www.suse.com/security/cve/CVE-2015-3209/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3456 page", "url": "https://www.suse.com/security/cve/CVE-2015-3456/" } ], "title": "Security update for kvm", "tracking": { "current_release_date": "2014-09-19T14:41:45Z", "generator": { "date": "2014-09-19T14:41:45Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2015:0889-1", "initial_release_date": "2014-09-19T14:41:45Z", "revision_history": [ { "date": "2014-09-19T14:41:45Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kvm-1.4.2-0.17.1.i586", "product": { "name": "kvm-1.4.2-0.17.1.i586", "product_id": "kvm-1.4.2-0.17.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "kvm-1.4.2-0.17.1.s390x", "product": { "name": "kvm-1.4.2-0.17.1.s390x", "product_id": "kvm-1.4.2-0.17.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kvm-1.4.2-0.17.1.x86_64", "product": { "name": "kvm-1.4.2-0.17.1.x86_64", "product_id": "kvm-1.4.2-0.17.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 11 SP3", "product": { "name": "SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sled:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3", "product": { "name": "SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product": { "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:11:sp3:teradata" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:11:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-0.17.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586" }, "product_reference": "kvm-1.4.2-0.17.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-0.17.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64" }, "product_reference": "kvm-1.4.2-0.17.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-0.17.1.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586" }, "product_reference": "kvm-1.4.2-0.17.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-0.17.1.s390x as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x" }, "product_reference": "kvm-1.4.2-0.17.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-0.17.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64" }, "product_reference": "kvm-1.4.2-0.17.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-0.17.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586" }, "product_reference": "kvm-1.4.2-0.17.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-0.17.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x" }, "product_reference": "kvm-1.4.2-0.17.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-0.17.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64" }, "product_reference": "kvm-1.4.2-0.17.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-0.17.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586" }, "product_reference": "kvm-1.4.2-0.17.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-0.17.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x" }, "product_reference": "kvm-1.4.2-0.17.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-0.17.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" }, "product_reference": "kvm-1.4.2-0.17.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-2016", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-2016" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way qemu v1.3.0 and later (virtio-rng) validates addresses when guest accesses the config space of a virtio device. If the virtio device has zero/small sized config space, such as virtio-rng, a privileged guest user could use this flaw to access the matching host\u0027s qemu address space and thus increase their privileges on the host.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-2016", "url": "https://www.suse.com/security/cve/CVE-2013-2016" }, { "category": "external", "summary": "SUSE Bug 817593 for CVE-2013-2016", "url": "https://bugzilla.suse.com/817593" }, { "category": "external", "summary": "SUSE Bug 871442 for CVE-2013-2016", "url": "https://bugzilla.suse.com/871442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "important" } ], "title": "CVE-2013-2016" }, { "cve": "CVE-2013-4344", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4344" } ], "notes": [ { "category": "general", "text": "Buffer overflow in the SCSI implementation in QEMU, as used in Xen, when a SCSI controller has more than 256 attached devices, allows local users to gain privileges via a small transfer buffer in a REPORT LUNS command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4344", "url": "https://www.suse.com/security/cve/CVE-2013-4344" }, { "category": "external", "summary": "SUSE Bug 842006 for CVE-2013-4344", "url": "https://bugzilla.suse.com/842006" }, { "category": "external", "summary": "SUSE Bug 871442 for CVE-2013-4344", "url": "https://bugzilla.suse.com/871442" }, { "category": "external", "summary": "SUSE Bug 880751 for CVE-2013-4344", "url": "https://bugzilla.suse.com/880751" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2013-4344" }, { "cve": "CVE-2013-4541", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4541" } ], "notes": [ { "category": "general", "text": "The usb_device_post_load function in hw/usb/bus.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a crafted savevm image, related to a negative setup_len or setup_index value.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4541", "url": "https://www.suse.com/security/cve/CVE-2013-4541" }, { "category": "external", "summary": "SUSE Bug 864802 for CVE-2013-4541", "url": "https://bugzilla.suse.com/864802" }, { "category": "external", "summary": "SUSE Bug 871442 for CVE-2013-4541", "url": "https://bugzilla.suse.com/871442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2013-4541" }, { "cve": "CVE-2014-0142", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0142" } ], "notes": [ { "category": "general", "text": "QEMU, possibly before 2.0.0, allows local users to cause a denial of service (divide-by-zero error and crash) via a zero value in the (1) tracks field to the seek_to_sector function in block/parallels.c or (2) extent_size field in the bochs function in block/bochs.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0142", "url": "https://www.suse.com/security/cve/CVE-2014-0142" }, { "category": "external", "summary": "SUSE Bug 870439 for CVE-2014-0142", "url": "https://bugzilla.suse.com/870439" }, { "category": "external", "summary": "SUSE Bug 871442 for CVE-2014-0142", "url": "https://bugzilla.suse.com/871442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2014-0142" }, { "cve": "CVE-2014-0143", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0143" } ], "notes": [ { "category": "general", "text": "Multiple integer overflows in the block drivers in QEMU, possibly before 2.0.0, allow local users to cause a denial of service (crash) via a crafted catalog size in (1) the parallels_open function in block/parallels.c or (2) bochs_open function in bochs.c, a large L1 table in the (3) qcow2_snapshot_load_tmp in qcow2-snapshot.c or (4) qcow2_grow_l1_table function in qcow2-cluster.c, (5) a large request in the bdrv_check_byte_request function in block.c and other block drivers, (6) crafted cluster indexes in the get_refcount function in qcow2-refcount.c, or (7) a large number of blocks in the cloop_open function in cloop.c, which trigger buffer overflows, memory corruption, large memory allocations and out-of-bounds read and writes.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0143", "url": "https://www.suse.com/security/cve/CVE-2014-0143" }, { "category": "external", "summary": "SUSE Bug 870439 for CVE-2014-0143", "url": "https://bugzilla.suse.com/870439" }, { "category": "external", "summary": "SUSE Bug 871442 for CVE-2014-0143", "url": "https://bugzilla.suse.com/871442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2014-0143" }, { "cve": "CVE-2014-0144", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0144" } ], "notes": [ { "category": "general", "text": "QEMU before 2.0.0 block drivers for CLOOP, QCOW2 version 2 and various other image formats are vulnerable to potential memory corruptions, integer/buffer overflows or crash caused by missing input validations which could allow a remote user to execute arbitrary code on the host with the privileges of the QEMU process.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0144", "url": "https://www.suse.com/security/cve/CVE-2014-0144" }, { "category": "external", "summary": "SUSE Bug 870439 for CVE-2014-0144", "url": "https://bugzilla.suse.com/870439" }, { "category": "external", "summary": "SUSE Bug 871442 for CVE-2014-0144", "url": "https://bugzilla.suse.com/871442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2014-0144" }, { "cve": "CVE-2014-0145", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0145" } ], "notes": [ { "category": "general", "text": "Multiple buffer overflows in QEMU before 1.7.2 and 2.x before 2.0.0, allow local users to cause a denial of service (crash) or possibly execute arbitrary code via a large (1) L1 table in the qcow2_snapshot_load_tmp in the QCOW 2 block driver (block/qcow2-snapshot.c) or (2) uncompressed chunk, (3) chunk length, or (4) number of sectors in the DMG block driver (block/dmg.c).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0145", "url": "https://www.suse.com/security/cve/CVE-2014-0145" }, { "category": "external", "summary": "SUSE Bug 870439 for CVE-2014-0145", "url": "https://bugzilla.suse.com/870439" }, { "category": "external", "summary": "SUSE Bug 871442 for CVE-2014-0145", "url": "https://bugzilla.suse.com/871442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "important" } ], "title": "CVE-2014-0145" }, { "cve": "CVE-2014-0146", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0146" } ], "notes": [ { "category": "general", "text": "The qcow2_open function in the (block/qcow2.c) in QEMU before 1.7.2 and 2.x before 2.0.0 allows local users to cause a denial of service (NULL pointer dereference) via a crafted image which causes an error, related to the initialization of the snapshot_offset and nb_snapshots fields.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0146", "url": "https://www.suse.com/security/cve/CVE-2014-0146" }, { "category": "external", "summary": "SUSE Bug 870439 for CVE-2014-0146", "url": "https://bugzilla.suse.com/870439" }, { "category": "external", "summary": "SUSE Bug 871442 for CVE-2014-0146", "url": "https://bugzilla.suse.com/871442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2014-0146" }, { "cve": "CVE-2014-0147", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0147" } ], "notes": [ { "category": "general", "text": "Qemu before 1.6.2 block diver for the various disk image formats used by Bochs and for the QCOW version 2 format, are vulnerable to a possible crash caused by signed data types or a logic error while creating QCOW2 snapshots, which leads to incorrectly calling update_refcount() routine.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0147", "url": "https://www.suse.com/security/cve/CVE-2014-0147" }, { "category": "external", "summary": "SUSE Bug 870439 for CVE-2014-0147", "url": "https://bugzilla.suse.com/870439" }, { "category": "external", "summary": "SUSE Bug 871442 for CVE-2014-0147", "url": "https://bugzilla.suse.com/871442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2014-0147" }, { "cve": "CVE-2014-0150", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0150" } ], "notes": [ { "category": "general", "text": "Integer overflow in the virtio_net_handle_mac function in hw/net/virtio-net.c in QEMU 2.0 and earlier allows local guest users to execute arbitrary code via a MAC addresses table update request, which triggers a heap-based buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0150", "url": "https://www.suse.com/security/cve/CVE-2014-0150" }, { "category": "external", "summary": "SUSE Bug 873235 for CVE-2014-0150", "url": "https://bugzilla.suse.com/873235" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2014-0150" }, { "cve": "CVE-2014-0222", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0222" } ], "notes": [ { "category": "general", "text": "Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0222", "url": "https://www.suse.com/security/cve/CVE-2014-0222" }, { "category": "external", "summary": "SUSE Bug 1072223 for CVE-2014-0222", "url": "https://bugzilla.suse.com/1072223" }, { "category": "external", "summary": "SUSE Bug 877642 for CVE-2014-0222", "url": "https://bugzilla.suse.com/877642" }, { "category": "external", "summary": "SUSE Bug 950367 for CVE-2014-0222", "url": "https://bugzilla.suse.com/950367" }, { "category": "external", "summary": "SUSE Bug 964925 for CVE-2014-0222", "url": "https://bugzilla.suse.com/964925" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2014-0222" }, { "cve": "CVE-2014-0223", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0223" } ], "notes": [ { "category": "general", "text": "Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a large image size, which triggers a buffer overflow or out-of-bounds read.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0223", "url": "https://www.suse.com/security/cve/CVE-2014-0223" }, { "category": "external", "summary": "SUSE Bug 877645 for CVE-2014-0223", "url": "https://bugzilla.suse.com/877645" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2014-0223" }, { "cve": "CVE-2014-2894", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-2894" } ], "notes": [ { "category": "general", "text": "Off-by-one error in the cmd_smart function in the smart self test in hw/ide/core.c in QEMU before 2.0 allows local users to have unspecified impact via a SMART EXECUTE OFFLINE command that triggers a buffer underflow and memory corruption.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-2894", "url": "https://www.suse.com/security/cve/CVE-2014-2894" }, { "category": "external", "summary": "SUSE Bug 874749 for CVE-2014-2894", "url": "https://bugzilla.suse.com/874749" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2014-2894" }, { "cve": "CVE-2014-3461", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3461" } ], "notes": [ { "category": "general", "text": "hw/usb/bus.c in QEMU 1.6.2 allows remote attackers to execute arbitrary code via crafted savevm data, which triggers a heap-based buffer overflow, related to \"USB post load checks.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3461", "url": "https://www.suse.com/security/cve/CVE-2014-3461" }, { "category": "external", "summary": "SUSE Bug 878541 for CVE-2014-3461", "url": "https://bugzilla.suse.com/878541" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2014-3461" }, { "cve": "CVE-2015-1779", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1779" } ], "notes": [ { "category": "general", "text": "The VNC websocket frame decoder in QEMU allows remote attackers to cause a denial of service (memory and CPU consumption) via a large (1) websocket payload or (2) HTTP headers section.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1779", "url": "https://www.suse.com/security/cve/CVE-2015-1779" }, { "category": "external", "summary": "SUSE Bug 924018 for CVE-2015-1779", "url": "https://bugzilla.suse.com/924018" }, { "category": "external", "summary": "SUSE Bug 962632 for CVE-2015-1779", "url": "https://bugzilla.suse.com/962632" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2015-1779" }, { "cve": "CVE-2015-3209", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3209" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3209", "url": "https://www.suse.com/security/cve/CVE-2015-3209" }, { "category": "external", "summary": "SUSE Bug 932267 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932267" }, { "category": "external", "summary": "SUSE Bug 932770 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932770" }, { "category": "external", "summary": "SUSE Bug 932823 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932823" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "important" } ], "title": "CVE-2015-3209" }, { "cve": "CVE-2015-3456", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3456" } ], "notes": [ { "category": "general", "text": "The Floppy Disk Controller (FDC) in QEMU, as used in Xen 4.5.x and earlier and KVM, allows local guest users to cause a denial of service (out-of-bounds write and guest crash) or possibly execute arbitrary code via the (1) FD_CMD_READ_ID, (2) FD_CMD_DRIVE_SPECIFICATION_COMMAND, or other unspecified commands, aka VENOM.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3456", "url": "https://www.suse.com/security/cve/CVE-2015-3456" }, { "category": "external", "summary": "SUSE Bug 929339 for CVE-2015-3456", "url": "https://bugzilla.suse.com/929339" }, { "category": "external", "summary": "SUSE Bug 932770 for CVE-2015-3456", "url": "https://bugzilla.suse.com/932770" }, { "category": "external", "summary": "SUSE Bug 935900 for CVE-2015-3456", "url": "https://bugzilla.suse.com/935900" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2015-3456" } ] }
cnvd-2015-03820
Vulnerability from cnvd
Title: Xen QEMU PCNET控制器堆溢出漏洞
Description:
Xen是一款用于Linux内核的一种虚拟化技术,允许同时运行多个操作系统。
Xen QEMU PCNET设备控制器存在堆溢出漏洞,允许攻击者利用漏洞在主机上以QEMU进程上下文执行任意代码。
Severity: 高
Patch Name: Xen QEMU PCNET控制器堆溢出漏洞的补丁
Patch Description:
Xen是一款用于Linux内核的一种虚拟化技术,允许同时运行多个操作系统。
Xen QEMU PCNET设备控制器存在堆溢出漏洞,允许攻击者利用漏洞在主机上以QEMU进程上下文执行任意代码。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description:
用户可参考如下厂商提供的安全补丁以修复该漏洞: http://xenbits.xen.org/xsa/advisory-135.html
Reference: http://xenbits.xen.org/xsa/advisory-135.html https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3209
Name | ['XenSource Xen 4.2.x', 'XenSource Xen 4.3.x', 'XenSource Xen 4.4.x'] |
---|
{ "bids": { "bid": { "bidNumber": "75123" } }, "cves": { "cve": { "cveNumber": "CVE-2015-3209" } }, "description": "Xen\u662f\u4e00\u6b3e\u7528\u4e8eLinux\u5185\u6838\u7684\u4e00\u79cd\u865a\u62df\u5316\u6280\u672f,\u5141\u8bb8\u540c\u65f6\u8fd0\u884c\u591a\u4e2a\u64cd\u4f5c\u7cfb\u7edf\u3002\r\n\r\nXen QEMU PCNET\u8bbe\u5907\u63a7\u5236\u5668\u5b58\u5728\u5806\u6ea2\u51fa\u6f0f\u6d1e\uff0c\u5141\u8bb8\u653b\u51fb\u8005\u5229\u7528\u6f0f\u6d1e\u5728\u4e3b\u673a\u4e0a\u4ee5QEMU\u8fdb\u7a0b\u4e0a\u4e0b\u6587\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002", "discovererName": "Matt Tait of Google,the QEMU security team", "formalWay": "\u7528\u6237\u53ef\u53c2\u8003\u5982\u4e0b\u5382\u5546\u63d0\u4f9b\u7684\u5b89\u5168\u8865\u4e01\u4ee5\u4fee\u590d\u8be5\u6f0f\u6d1e\uff1a\r\nhttp://xenbits.xen.org/xsa/advisory-135.html", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2015-03820", "openTime": "2015-06-17", "patchDescription": "Xen\u662f\u4e00\u6b3e\u7528\u4e8eLinux\u5185\u6838\u7684\u4e00\u79cd\u865a\u62df\u5316\u6280\u672f,\u5141\u8bb8\u540c\u65f6\u8fd0\u884c\u591a\u4e2a\u64cd\u4f5c\u7cfb\u7edf\u3002\r\n\r\nXen QEMU PCNET\u8bbe\u5907\u63a7\u5236\u5668\u5b58\u5728\u5806\u6ea2\u51fa\u6f0f\u6d1e\uff0c\u5141\u8bb8\u653b\u51fb\u8005\u5229\u7528\u6f0f\u6d1e\u5728\u4e3b\u673a\u4e0a\u4ee5QEMU\u8fdb\u7a0b\u4e0a\u4e0b\u6587\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "Xen QEMU PCNET\u63a7\u5236\u5668\u5806\u6ea2\u51fa\u6f0f\u6d1e\u7684\u8865\u4e01", "products": { "product": [ "XenSource Xen 4.2.x", "XenSource Xen 4.3.x", "XenSource Xen 4.4.x" ] }, "referenceLink": "http://xenbits.xen.org/xsa/advisory-135.html\r\nhttps://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3209", "serverity": "\u9ad8", "submitTime": "2015-06-11", "title": "Xen QEMU PCNET\u63a7\u5236\u5668\u5806\u6ea2\u51fa\u6f0f\u6d1e" }
ghsa-f8hq-r3jp-2m27
Vulnerability from github
Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.
{ "affected": [], "aliases": [ "CVE-2015-3209" ], "database_specific": { "cwe_ids": [ "CWE-787" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2015-06-15T15:59:00Z", "severity": "HIGH" }, "details": "Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.", "id": "GHSA-f8hq-r3jp-2m27", "modified": "2022-05-13T01:03:35Z", "published": "2022-05-13T01:03:35Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3209" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2015:1087" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2015:1088" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2015:1089" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2015:1189" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2015-3209" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1225882" }, { "type": "WEB", "url": "https://kb.juniper.net/JSA10783" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/201510-02" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/201604-03" }, { "type": "WEB", "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1180-security-advisory-13" }, { "type": "WEB", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10698" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160669.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160677.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160685.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00027.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00029.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00014.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00020.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00015.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00027.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2015-1087.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2015-1088.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2015-1089.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2015-1189.html" }, { "type": "WEB", "url": "http://www.debian.org/security/2015/dsa-3284" }, { "type": "WEB", "url": "http://www.debian.org/security/2015/dsa-3285" }, { "type": "WEB", "url": "http://www.debian.org/security/2015/dsa-3286" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/75123" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1032545" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-2630-1" }, { "type": "WEB", "url": "http://xenbits.xen.org/xsa/advisory-135.html" } ], "schema_version": "1.4.0", "severity": [] }
rhsa-2015_1088
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated qemu-kvm-rhev packages that fix one security issue are now\navailable for Red Hat Enterprise Virtualization 3.5.\n\nRed Hat Product Security has rated this update as having Important security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", "title": "Topic" }, { "category": "general", "text": "KVM (Kernel-based Virtual Machine) is a full virtualization solution for\nLinux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the\nuser-space component for running virtual machines using KVM.\n\nA flaw was found in the way QEMU\u0027s AMD PCnet Ethernet emulation handled\nmulti-TMD packets with a length above 4096 bytes. A privileged guest user\nin a guest with an AMD PCNet ethernet card enabled could potentially use\nthis flaw to execute arbitrary code on the host with the privileges of the\nhosting QEMU process. (CVE-2015-3209)\n\nRed Hat would like to thank Matt Tait of Google\u0027s Project Zero security\nteam for reporting this issue.\n\nAll qemu-kvm-rhev users are advised to upgrade to these updated packages,\nwhich contain a backported patch to correct this issue. After installing\nthis update, shut down all running virtual machines. Once all virtual\nmachines have shut down, start them again for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:1088", "url": "https://access.redhat.com/errata/RHSA-2015:1088" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1225882", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1225882" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_1088.json" } ], "title": "Red Hat Security Advisory: qemu-kvm-rhev security update", "tracking": { "current_release_date": "2024-11-22T09:12:35+00:00", "generator": { "date": "2024-11-22T09:12:35+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2015:1088", "initial_release_date": "2015-06-10T15:00:16+00:00", "revision_history": [ { "date": "2015-06-10T15:00:16+00:00", "number": "1", "summary": "Initial version" }, { "date": "2015-06-10T15:00:16+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T09:12:35+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHEV Agents (vdsm)", "product": { "name": "RHEV Agents (vdsm)", "product_id": "6Server-RHEV-Agents", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:6::hypervisor" } } } ], "category": "product_family", "name": "Red Hat Virtualization" }, { "branches": [ { "category": "product_version", "name": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src", "product": { "name": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src", "product_id": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev@0.12.1.2-2.448.el6_6.4?arch=src\u0026epoch=2" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "product": { "name": "qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_id": "qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev-tools@0.12.1.2-2.448.el6_6.4?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "product": { "name": "qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_id": "qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-img-rhev@0.12.1.2-2.448.el6_6.4?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "product": { "name": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_id": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev@0.12.1.2-2.448.el6_6.4?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "product": { "name": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_id": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev-debuginfo@0.12.1.2-2.448.el6_6.4?arch=x86_64\u0026epoch=2" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of RHEV Agents (vdsm)", "product_id": "6Server-RHEV-Agents:qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Server-RHEV-Agents" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src as a component of RHEV Agents (vdsm)", "product_id": "6Server-RHEV-Agents:qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src" }, "product_reference": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src", "relates_to_product_reference": "6Server-RHEV-Agents" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of RHEV Agents (vdsm)", "product_id": "6Server-RHEV-Agents:qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Server-RHEV-Agents" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of RHEV Agents (vdsm)", "product_id": "6Server-RHEV-Agents:qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Server-RHEV-Agents" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of RHEV Agents (vdsm)", "product_id": "6Server-RHEV-Agents:qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Server-RHEV-Agents" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Matt Tait" ], "organization": "Google\u0027s Project Zero security team" } ], "cve": "CVE-2015-3209", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2015-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1225882" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way QEMU\u0027s AMD PCnet Ethernet emulation handled multi-TMD packets with a length above 4096 bytes. A privileged guest user in a guest with an AMD PCNet ethernet card enabled could potentially use this flaw to execute arbitrary code on the host with the privileges of the hosting QEMU process.", "title": "Vulnerability description" }, { "category": "summary", "text": "qemu: pcnet: multi-tmd buffer overflow in the tx path", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of the qemu-kvm packages as shipped with Red Hat Enterprise Linux 7 as they do not enable the pcnet backend driver.\n\nThis issue does not affect the Red Hat Enterprise Linux 7 based versions of the qemu-kvm-rhev packages as shipped with Red Hat Enterprise Virtualization 3.\n\nThis issue affects the versions of the kvm and xen packages as shipped with Red Hat Enterprise Linux 5, the versions of the qemu-kvm packages as shipped with Red Hat Enterprise Linux 6, and the Red Hat Enterprise Linux 6 based versions of qemu-kvm-rhev packages as shipped with Red Hat Enterprise Virtualization 3. Future updates for the respective releases may address this flaw.\n\nPlease note that AMD PCNet adapter has to be explicitly enabled per-guest as it is not enabled in default configuration and is not supported by Red Hat in Red Hat Enterprise Linux 6 (for a list of supported devices please consult https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Virtualization_Administration_Guide/sect-whitelist-device-options.html).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHEV-Agents:qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src", "6Server-RHEV-Agents:qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-3209" }, { "category": "external", "summary": "RHBZ#1225882", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1225882" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-3209", "url": "https://www.cve.org/CVERecord?id=CVE-2015-3209" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-3209", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3209" } ], "release_date": "2015-06-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-06-10T15:00:16+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RHEV-Agents:qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src", "6Server-RHEV-Agents:qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1088" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 6.5, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:H/Au:S/C:C/I:C/A:C", "version": "2.0" }, "products": [ "6Server-RHEV-Agents:qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src", "6Server-RHEV-Agents:qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "qemu: pcnet: multi-tmd buffer overflow in the tx path" } ] }
RHSA-2015:1088
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated qemu-kvm-rhev packages that fix one security issue are now\navailable for Red Hat Enterprise Virtualization 3.5.\n\nRed Hat Product Security has rated this update as having Important security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", "title": "Topic" }, { "category": "general", "text": "KVM (Kernel-based Virtual Machine) is a full virtualization solution for\nLinux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the\nuser-space component for running virtual machines using KVM.\n\nA flaw was found in the way QEMU\u0027s AMD PCnet Ethernet emulation handled\nmulti-TMD packets with a length above 4096 bytes. A privileged guest user\nin a guest with an AMD PCNet ethernet card enabled could potentially use\nthis flaw to execute arbitrary code on the host with the privileges of the\nhosting QEMU process. (CVE-2015-3209)\n\nRed Hat would like to thank Matt Tait of Google\u0027s Project Zero security\nteam for reporting this issue.\n\nAll qemu-kvm-rhev users are advised to upgrade to these updated packages,\nwhich contain a backported patch to correct this issue. After installing\nthis update, shut down all running virtual machines. Once all virtual\nmachines have shut down, start them again for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:1088", "url": "https://access.redhat.com/errata/RHSA-2015:1088" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1225882", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1225882" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_1088.json" } ], "title": "Red Hat Security Advisory: qemu-kvm-rhev security update", "tracking": { "current_release_date": "2025-09-10T14:07:14+00:00", "generator": { "date": "2025-09-10T14:07:14+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2015:1088", "initial_release_date": "2015-06-10T15:00:16+00:00", "revision_history": [ { "date": "2015-06-10T15:00:16+00:00", "number": "1", "summary": "Initial version" }, { "date": "2015-06-10T15:00:16+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T14:07:14+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHEV Agents (vdsm)", "product": { "name": "RHEV Agents (vdsm)", "product_id": "6Server-RHEV-Agents", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:6::hypervisor" } } } ], "category": "product_family", "name": "Red Hat Virtualization" }, { "branches": [ { "category": "product_version", "name": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src", "product": { "name": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src", "product_id": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev@0.12.1.2-2.448.el6_6.4?arch=src\u0026epoch=2" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "product": { "name": "qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_id": "qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev-tools@0.12.1.2-2.448.el6_6.4?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "product": { "name": "qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_id": "qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-img-rhev@0.12.1.2-2.448.el6_6.4?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "product": { "name": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_id": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev@0.12.1.2-2.448.el6_6.4?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "product": { "name": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_id": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev-debuginfo@0.12.1.2-2.448.el6_6.4?arch=x86_64\u0026epoch=2" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of RHEV Agents (vdsm)", "product_id": "6Server-RHEV-Agents:qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Server-RHEV-Agents" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src as a component of RHEV Agents (vdsm)", "product_id": "6Server-RHEV-Agents:qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src" }, "product_reference": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src", "relates_to_product_reference": "6Server-RHEV-Agents" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of RHEV Agents (vdsm)", "product_id": "6Server-RHEV-Agents:qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Server-RHEV-Agents" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of RHEV Agents (vdsm)", "product_id": "6Server-RHEV-Agents:qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Server-RHEV-Agents" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of RHEV Agents (vdsm)", "product_id": "6Server-RHEV-Agents:qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Server-RHEV-Agents" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Matt Tait" ], "organization": "Google\u0027s Project Zero security team" } ], "cve": "CVE-2015-3209", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2015-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1225882" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way QEMU\u0027s AMD PCnet Ethernet emulation handled multi-TMD packets with a length above 4096 bytes. A privileged guest user in a guest with an AMD PCNet ethernet card enabled could potentially use this flaw to execute arbitrary code on the host with the privileges of the hosting QEMU process.", "title": "Vulnerability description" }, { "category": "summary", "text": "qemu: pcnet: multi-tmd buffer overflow in the tx path", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of the qemu-kvm packages as shipped with Red Hat Enterprise Linux 7 as they do not enable the pcnet backend driver.\n\nThis issue does not affect the Red Hat Enterprise Linux 7 based versions of the qemu-kvm-rhev packages as shipped with Red Hat Enterprise Virtualization 3.\n\nThis issue affects the versions of the kvm and xen packages as shipped with Red Hat Enterprise Linux 5, the versions of the qemu-kvm packages as shipped with Red Hat Enterprise Linux 6, and the Red Hat Enterprise Linux 6 based versions of qemu-kvm-rhev packages as shipped with Red Hat Enterprise Virtualization 3. Future updates for the respective releases may address this flaw.\n\nPlease note that AMD PCNet adapter has to be explicitly enabled per-guest as it is not enabled in default configuration and is not supported by Red Hat in Red Hat Enterprise Linux 6 (for a list of supported devices please consult https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Virtualization_Administration_Guide/sect-whitelist-device-options.html).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHEV-Agents:qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src", "6Server-RHEV-Agents:qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-3209" }, { "category": "external", "summary": "RHBZ#1225882", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1225882" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-3209", "url": "https://www.cve.org/CVERecord?id=CVE-2015-3209" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-3209", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3209" } ], "release_date": "2015-06-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-06-10T15:00:16+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RHEV-Agents:qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src", "6Server-RHEV-Agents:qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1088" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 6.5, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:H/Au:S/C:C/I:C/A:C", "version": "2.0" }, "products": [ "6Server-RHEV-Agents:qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src", "6Server-RHEV-Agents:qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "qemu: pcnet: multi-tmd buffer overflow in the tx path" } ] }
rhsa-2015_1189
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kvm packages that fix one security issue are now available for Red\nHat Enterprise Linux 5.\n\nRed Hat Product Security has rated this update as having Important security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", "title": "Topic" }, { "category": "general", "text": "KVM (Kernel-based Virtual Machine) is a full virtualization solution for\nLinux on AMD64 and Intel 64 systems.\n\nA flaw was found in the way QEMU\u0027s AMD PCnet Ethernet emulation handled\nmulti-TMD packets with a length above 4096 bytes. A privileged guest user\nin a guest with an AMD PCNet ethernet card enabled could potentially use\nthis flaw to execute arbitrary code on the host with the privileges of the\nhosting QEMU process. (CVE-2015-3209)\n\nRed Hat would like to thank Matt Tait of Google\u0027s Project Zero security\nteam for reporting this issue.\n\nAll kvm users are advised to upgrade to these updated packages, which\ncontain a backported patch to correct this issue. Note: The procedure in\nthe Solution section must be performed before this update will take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:1189", "url": "https://access.redhat.com/errata/RHSA-2015:1189" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1225882", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1225882" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_1189.json" } ], "title": "Red Hat Security Advisory: kvm security update", "tracking": { "current_release_date": "2024-11-22T09:12:43+00:00", "generator": { "date": "2024-11-22T09:12:43+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2015:1189", "initial_release_date": "2015-06-25T13:27:18+00:00", "revision_history": [ { "date": "2015-06-25T13:27:18+00:00", "number": "1", "summary": "Initial version" }, { "date": "2015-06-25T13:27:18+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T09:12:43+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.11.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_virtualization:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Virtualization (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT-5.11.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_virtualization:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kmod-kvm-0:83-273.el5_11.x86_64", "product": { "name": "kmod-kvm-0:83-273.el5_11.x86_64", "product_id": "kmod-kvm-0:83-273.el5_11.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kmod-kvm@83-273.el5_11?arch=x86_64" } } }, { "category": "product_version", "name": "kvm-0:83-273.el5_11.x86_64", "product": { "name": "kvm-0:83-273.el5_11.x86_64", "product_id": "kvm-0:83-273.el5_11.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kvm@83-273.el5_11?arch=x86_64" } } }, { "category": "product_version", "name": "kmod-kvm-debug-0:83-273.el5_11.x86_64", "product": { "name": "kmod-kvm-debug-0:83-273.el5_11.x86_64", "product_id": "kmod-kvm-debug-0:83-273.el5_11.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kmod-kvm-debug@83-273.el5_11?arch=x86_64" } } }, { "category": "product_version", "name": "kvm-debuginfo-0:83-273.el5_11.x86_64", "product": { "name": "kvm-debuginfo-0:83-273.el5_11.x86_64", "product_id": "kvm-debuginfo-0:83-273.el5_11.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kvm-debuginfo@83-273.el5_11?arch=x86_64" } } }, { "category": "product_version", "name": "kvm-qemu-img-0:83-273.el5_11.x86_64", "product": { "name": "kvm-qemu-img-0:83-273.el5_11.x86_64", "product_id": "kvm-qemu-img-0:83-273.el5_11.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kvm-qemu-img@83-273.el5_11?arch=x86_64" } } }, { "category": "product_version", "name": "kvm-tools-0:83-273.el5_11.x86_64", "product": { "name": "kvm-tools-0:83-273.el5_11.x86_64", "product_id": "kvm-tools-0:83-273.el5_11.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kvm-tools@83-273.el5_11?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kvm-0:83-273.el5_11.src", "product": { "name": "kvm-0:83-273.el5_11.src", "product_id": "kvm-0:83-273.el5_11.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kvm@83-273.el5_11?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kmod-kvm-0:83-273.el5_11.x86_64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.11.Z:kmod-kvm-0:83-273.el5_11.x86_64" }, "product_reference": "kmod-kvm-0:83-273.el5_11.x86_64", "relates_to_product_reference": "5Client-VT-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kmod-kvm-debug-0:83-273.el5_11.x86_64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.11.Z:kmod-kvm-debug-0:83-273.el5_11.x86_64" }, "product_reference": "kmod-kvm-debug-0:83-273.el5_11.x86_64", "relates_to_product_reference": "5Client-VT-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-0:83-273.el5_11.src as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.11.Z:kvm-0:83-273.el5_11.src" }, "product_reference": "kvm-0:83-273.el5_11.src", "relates_to_product_reference": "5Client-VT-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-0:83-273.el5_11.x86_64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.11.Z:kvm-0:83-273.el5_11.x86_64" }, "product_reference": "kvm-0:83-273.el5_11.x86_64", "relates_to_product_reference": "5Client-VT-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-debuginfo-0:83-273.el5_11.x86_64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.11.Z:kvm-debuginfo-0:83-273.el5_11.x86_64" }, "product_reference": "kvm-debuginfo-0:83-273.el5_11.x86_64", "relates_to_product_reference": "5Client-VT-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-qemu-img-0:83-273.el5_11.x86_64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.11.Z:kvm-qemu-img-0:83-273.el5_11.x86_64" }, "product_reference": "kvm-qemu-img-0:83-273.el5_11.x86_64", "relates_to_product_reference": "5Client-VT-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-tools-0:83-273.el5_11.x86_64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.11.Z:kvm-tools-0:83-273.el5_11.x86_64" }, "product_reference": "kvm-tools-0:83-273.el5_11.x86_64", "relates_to_product_reference": "5Client-VT-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kmod-kvm-0:83-273.el5_11.x86_64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT-5.11.Z:kmod-kvm-0:83-273.el5_11.x86_64" }, "product_reference": "kmod-kvm-0:83-273.el5_11.x86_64", "relates_to_product_reference": "5Server-VT-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kmod-kvm-debug-0:83-273.el5_11.x86_64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT-5.11.Z:kmod-kvm-debug-0:83-273.el5_11.x86_64" }, "product_reference": "kmod-kvm-debug-0:83-273.el5_11.x86_64", "relates_to_product_reference": "5Server-VT-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-0:83-273.el5_11.src as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT-5.11.Z:kvm-0:83-273.el5_11.src" }, "product_reference": "kvm-0:83-273.el5_11.src", "relates_to_product_reference": "5Server-VT-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-0:83-273.el5_11.x86_64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT-5.11.Z:kvm-0:83-273.el5_11.x86_64" }, "product_reference": "kvm-0:83-273.el5_11.x86_64", "relates_to_product_reference": "5Server-VT-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-debuginfo-0:83-273.el5_11.x86_64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT-5.11.Z:kvm-debuginfo-0:83-273.el5_11.x86_64" }, "product_reference": "kvm-debuginfo-0:83-273.el5_11.x86_64", "relates_to_product_reference": "5Server-VT-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-qemu-img-0:83-273.el5_11.x86_64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT-5.11.Z:kvm-qemu-img-0:83-273.el5_11.x86_64" }, "product_reference": "kvm-qemu-img-0:83-273.el5_11.x86_64", "relates_to_product_reference": "5Server-VT-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-tools-0:83-273.el5_11.x86_64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT-5.11.Z:kvm-tools-0:83-273.el5_11.x86_64" }, "product_reference": "kvm-tools-0:83-273.el5_11.x86_64", "relates_to_product_reference": "5Server-VT-5.11.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Matt Tait" ], "organization": "Google\u0027s Project Zero security team" } ], "cve": "CVE-2015-3209", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2015-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1225882" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way QEMU\u0027s AMD PCnet Ethernet emulation handled multi-TMD packets with a length above 4096 bytes. A privileged guest user in a guest with an AMD PCNet ethernet card enabled could potentially use this flaw to execute arbitrary code on the host with the privileges of the hosting QEMU process.", "title": "Vulnerability description" }, { "category": "summary", "text": "qemu: pcnet: multi-tmd buffer overflow in the tx path", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of the qemu-kvm packages as shipped with Red Hat Enterprise Linux 7 as they do not enable the pcnet backend driver.\n\nThis issue does not affect the Red Hat Enterprise Linux 7 based versions of the qemu-kvm-rhev packages as shipped with Red Hat Enterprise Virtualization 3.\n\nThis issue affects the versions of the kvm and xen packages as shipped with Red Hat Enterprise Linux 5, the versions of the qemu-kvm packages as shipped with Red Hat Enterprise Linux 6, and the Red Hat Enterprise Linux 6 based versions of qemu-kvm-rhev packages as shipped with Red Hat Enterprise Virtualization 3. Future updates for the respective releases may address this flaw.\n\nPlease note that AMD PCNet adapter has to be explicitly enabled per-guest as it is not enabled in default configuration and is not supported by Red Hat in Red Hat Enterprise Linux 6 (for a list of supported devices please consult https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Virtualization_Administration_Guide/sect-whitelist-device-options.html).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-VT-5.11.Z:kmod-kvm-0:83-273.el5_11.x86_64", "5Client-VT-5.11.Z:kmod-kvm-debug-0:83-273.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-0:83-273.el5_11.src", "5Client-VT-5.11.Z:kvm-0:83-273.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-debuginfo-0:83-273.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-qemu-img-0:83-273.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-tools-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kmod-kvm-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kmod-kvm-debug-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-0:83-273.el5_11.src", "5Server-VT-5.11.Z:kvm-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-debuginfo-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-qemu-img-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-tools-0:83-273.el5_11.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-3209" }, { "category": "external", "summary": "RHBZ#1225882", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1225882" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-3209", "url": "https://www.cve.org/CVERecord?id=CVE-2015-3209" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-3209", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3209" } ], "release_date": "2015-06-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-06-25T13:27:18+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe following procedure must be performed before this update will take\neffect:\n\n1) Stop all KVM guest virtual machines.\n\n2) Either reboot the hypervisor machine or, as the root user, remove (using\n\"modprobe -r [module]\") and reload (using \"modprobe [module]\") all of the\nfollowing modules which are currently running (determined using \"lsmod\"):\nkvm, ksm, kvm-intel or kvm-amd.\n\n3) Restart the KVM guest virtual machines.", "product_ids": [ "5Client-VT-5.11.Z:kmod-kvm-0:83-273.el5_11.x86_64", "5Client-VT-5.11.Z:kmod-kvm-debug-0:83-273.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-0:83-273.el5_11.src", "5Client-VT-5.11.Z:kvm-0:83-273.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-debuginfo-0:83-273.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-qemu-img-0:83-273.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-tools-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kmod-kvm-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kmod-kvm-debug-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-0:83-273.el5_11.src", "5Server-VT-5.11.Z:kvm-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-debuginfo-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-qemu-img-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-tools-0:83-273.el5_11.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1189" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 6.5, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:H/Au:S/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Client-VT-5.11.Z:kmod-kvm-0:83-273.el5_11.x86_64", "5Client-VT-5.11.Z:kmod-kvm-debug-0:83-273.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-0:83-273.el5_11.src", "5Client-VT-5.11.Z:kvm-0:83-273.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-debuginfo-0:83-273.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-qemu-img-0:83-273.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-tools-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kmod-kvm-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kmod-kvm-debug-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-0:83-273.el5_11.src", "5Server-VT-5.11.Z:kvm-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-debuginfo-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-qemu-img-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-tools-0:83-273.el5_11.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "qemu: pcnet: multi-tmd buffer overflow in the tx path" } ] }
rhsa-2015:1088
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated qemu-kvm-rhev packages that fix one security issue are now\navailable for Red Hat Enterprise Virtualization 3.5.\n\nRed Hat Product Security has rated this update as having Important security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", "title": "Topic" }, { "category": "general", "text": "KVM (Kernel-based Virtual Machine) is a full virtualization solution for\nLinux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the\nuser-space component for running virtual machines using KVM.\n\nA flaw was found in the way QEMU\u0027s AMD PCnet Ethernet emulation handled\nmulti-TMD packets with a length above 4096 bytes. A privileged guest user\nin a guest with an AMD PCNet ethernet card enabled could potentially use\nthis flaw to execute arbitrary code on the host with the privileges of the\nhosting QEMU process. (CVE-2015-3209)\n\nRed Hat would like to thank Matt Tait of Google\u0027s Project Zero security\nteam for reporting this issue.\n\nAll qemu-kvm-rhev users are advised to upgrade to these updated packages,\nwhich contain a backported patch to correct this issue. After installing\nthis update, shut down all running virtual machines. Once all virtual\nmachines have shut down, start them again for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:1088", "url": "https://access.redhat.com/errata/RHSA-2015:1088" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1225882", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1225882" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_1088.json" } ], "title": "Red Hat Security Advisory: qemu-kvm-rhev security update", "tracking": { "current_release_date": "2025-09-10T14:07:14+00:00", "generator": { "date": "2025-09-10T14:07:14+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2015:1088", "initial_release_date": "2015-06-10T15:00:16+00:00", "revision_history": [ { "date": "2015-06-10T15:00:16+00:00", "number": "1", "summary": "Initial version" }, { "date": "2015-06-10T15:00:16+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T14:07:14+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHEV Agents (vdsm)", "product": { "name": "RHEV Agents (vdsm)", "product_id": "6Server-RHEV-Agents", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:6::hypervisor" } } } ], "category": "product_family", "name": "Red Hat Virtualization" }, { "branches": [ { "category": "product_version", "name": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src", "product": { "name": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src", "product_id": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev@0.12.1.2-2.448.el6_6.4?arch=src\u0026epoch=2" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "product": { "name": "qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_id": "qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev-tools@0.12.1.2-2.448.el6_6.4?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "product": { "name": "qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_id": "qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-img-rhev@0.12.1.2-2.448.el6_6.4?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "product": { "name": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_id": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev@0.12.1.2-2.448.el6_6.4?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "product": { "name": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_id": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev-debuginfo@0.12.1.2-2.448.el6_6.4?arch=x86_64\u0026epoch=2" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of RHEV Agents (vdsm)", "product_id": "6Server-RHEV-Agents:qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Server-RHEV-Agents" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src as a component of RHEV Agents (vdsm)", "product_id": "6Server-RHEV-Agents:qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src" }, "product_reference": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src", "relates_to_product_reference": "6Server-RHEV-Agents" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of RHEV Agents (vdsm)", "product_id": "6Server-RHEV-Agents:qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Server-RHEV-Agents" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of RHEV Agents (vdsm)", "product_id": "6Server-RHEV-Agents:qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Server-RHEV-Agents" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of RHEV Agents (vdsm)", "product_id": "6Server-RHEV-Agents:qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Server-RHEV-Agents" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Matt Tait" ], "organization": "Google\u0027s Project Zero security team" } ], "cve": "CVE-2015-3209", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2015-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1225882" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way QEMU\u0027s AMD PCnet Ethernet emulation handled multi-TMD packets with a length above 4096 bytes. A privileged guest user in a guest with an AMD PCNet ethernet card enabled could potentially use this flaw to execute arbitrary code on the host with the privileges of the hosting QEMU process.", "title": "Vulnerability description" }, { "category": "summary", "text": "qemu: pcnet: multi-tmd buffer overflow in the tx path", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of the qemu-kvm packages as shipped with Red Hat Enterprise Linux 7 as they do not enable the pcnet backend driver.\n\nThis issue does not affect the Red Hat Enterprise Linux 7 based versions of the qemu-kvm-rhev packages as shipped with Red Hat Enterprise Virtualization 3.\n\nThis issue affects the versions of the kvm and xen packages as shipped with Red Hat Enterprise Linux 5, the versions of the qemu-kvm packages as shipped with Red Hat Enterprise Linux 6, and the Red Hat Enterprise Linux 6 based versions of qemu-kvm-rhev packages as shipped with Red Hat Enterprise Virtualization 3. Future updates for the respective releases may address this flaw.\n\nPlease note that AMD PCNet adapter has to be explicitly enabled per-guest as it is not enabled in default configuration and is not supported by Red Hat in Red Hat Enterprise Linux 6 (for a list of supported devices please consult https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Virtualization_Administration_Guide/sect-whitelist-device-options.html).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHEV-Agents:qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src", "6Server-RHEV-Agents:qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-3209" }, { "category": "external", "summary": "RHBZ#1225882", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1225882" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-3209", "url": "https://www.cve.org/CVERecord?id=CVE-2015-3209" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-3209", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3209" } ], "release_date": "2015-06-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-06-10T15:00:16+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RHEV-Agents:qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src", "6Server-RHEV-Agents:qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1088" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 6.5, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:H/Au:S/C:C/I:C/A:C", "version": "2.0" }, "products": [ "6Server-RHEV-Agents:qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src", "6Server-RHEV-Agents:qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "qemu: pcnet: multi-tmd buffer overflow in the tx path" } ] }
RHSA-2015:1189
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kvm packages that fix one security issue are now available for Red\nHat Enterprise Linux 5.\n\nRed Hat Product Security has rated this update as having Important security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", "title": "Topic" }, { "category": "general", "text": "KVM (Kernel-based Virtual Machine) is a full virtualization solution for\nLinux on AMD64 and Intel 64 systems.\n\nA flaw was found in the way QEMU\u0027s AMD PCnet Ethernet emulation handled\nmulti-TMD packets with a length above 4096 bytes. A privileged guest user\nin a guest with an AMD PCNet ethernet card enabled could potentially use\nthis flaw to execute arbitrary code on the host with the privileges of the\nhosting QEMU process. (CVE-2015-3209)\n\nRed Hat would like to thank Matt Tait of Google\u0027s Project Zero security\nteam for reporting this issue.\n\nAll kvm users are advised to upgrade to these updated packages, which\ncontain a backported patch to correct this issue. Note: The procedure in\nthe Solution section must be performed before this update will take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:1189", "url": "https://access.redhat.com/errata/RHSA-2015:1189" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1225882", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1225882" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_1189.json" } ], "title": "Red Hat Security Advisory: kvm security update", "tracking": { "current_release_date": "2025-09-10T14:07:27+00:00", "generator": { "date": "2025-09-10T14:07:27+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2015:1189", "initial_release_date": "2015-06-25T13:27:18+00:00", "revision_history": [ { "date": "2015-06-25T13:27:18+00:00", "number": "1", "summary": "Initial version" }, { "date": "2015-06-25T13:27:18+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T14:07:27+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.11.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_virtualization:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Virtualization (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT-5.11.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_virtualization:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kmod-kvm-0:83-273.el5_11.x86_64", "product": { "name": "kmod-kvm-0:83-273.el5_11.x86_64", "product_id": "kmod-kvm-0:83-273.el5_11.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kmod-kvm@83-273.el5_11?arch=x86_64" } } }, { "category": "product_version", "name": "kvm-0:83-273.el5_11.x86_64", "product": { "name": "kvm-0:83-273.el5_11.x86_64", "product_id": "kvm-0:83-273.el5_11.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kvm@83-273.el5_11?arch=x86_64" } } }, { "category": "product_version", "name": "kmod-kvm-debug-0:83-273.el5_11.x86_64", "product": { "name": "kmod-kvm-debug-0:83-273.el5_11.x86_64", "product_id": "kmod-kvm-debug-0:83-273.el5_11.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kmod-kvm-debug@83-273.el5_11?arch=x86_64" } } }, { "category": "product_version", "name": "kvm-debuginfo-0:83-273.el5_11.x86_64", "product": { "name": "kvm-debuginfo-0:83-273.el5_11.x86_64", "product_id": "kvm-debuginfo-0:83-273.el5_11.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kvm-debuginfo@83-273.el5_11?arch=x86_64" } } }, { "category": "product_version", "name": "kvm-qemu-img-0:83-273.el5_11.x86_64", "product": { "name": "kvm-qemu-img-0:83-273.el5_11.x86_64", "product_id": "kvm-qemu-img-0:83-273.el5_11.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kvm-qemu-img@83-273.el5_11?arch=x86_64" } } }, { "category": "product_version", "name": "kvm-tools-0:83-273.el5_11.x86_64", "product": { "name": "kvm-tools-0:83-273.el5_11.x86_64", "product_id": "kvm-tools-0:83-273.el5_11.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kvm-tools@83-273.el5_11?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kvm-0:83-273.el5_11.src", "product": { "name": "kvm-0:83-273.el5_11.src", "product_id": "kvm-0:83-273.el5_11.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kvm@83-273.el5_11?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kmod-kvm-0:83-273.el5_11.x86_64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.11.Z:kmod-kvm-0:83-273.el5_11.x86_64" }, "product_reference": "kmod-kvm-0:83-273.el5_11.x86_64", "relates_to_product_reference": "5Client-VT-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kmod-kvm-debug-0:83-273.el5_11.x86_64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.11.Z:kmod-kvm-debug-0:83-273.el5_11.x86_64" }, "product_reference": "kmod-kvm-debug-0:83-273.el5_11.x86_64", "relates_to_product_reference": "5Client-VT-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-0:83-273.el5_11.src as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.11.Z:kvm-0:83-273.el5_11.src" }, "product_reference": "kvm-0:83-273.el5_11.src", "relates_to_product_reference": "5Client-VT-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-0:83-273.el5_11.x86_64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.11.Z:kvm-0:83-273.el5_11.x86_64" }, "product_reference": "kvm-0:83-273.el5_11.x86_64", "relates_to_product_reference": "5Client-VT-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-debuginfo-0:83-273.el5_11.x86_64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.11.Z:kvm-debuginfo-0:83-273.el5_11.x86_64" }, "product_reference": "kvm-debuginfo-0:83-273.el5_11.x86_64", "relates_to_product_reference": "5Client-VT-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-qemu-img-0:83-273.el5_11.x86_64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.11.Z:kvm-qemu-img-0:83-273.el5_11.x86_64" }, "product_reference": "kvm-qemu-img-0:83-273.el5_11.x86_64", "relates_to_product_reference": "5Client-VT-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-tools-0:83-273.el5_11.x86_64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.11.Z:kvm-tools-0:83-273.el5_11.x86_64" }, "product_reference": "kvm-tools-0:83-273.el5_11.x86_64", "relates_to_product_reference": "5Client-VT-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kmod-kvm-0:83-273.el5_11.x86_64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT-5.11.Z:kmod-kvm-0:83-273.el5_11.x86_64" }, "product_reference": "kmod-kvm-0:83-273.el5_11.x86_64", "relates_to_product_reference": "5Server-VT-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kmod-kvm-debug-0:83-273.el5_11.x86_64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT-5.11.Z:kmod-kvm-debug-0:83-273.el5_11.x86_64" }, "product_reference": "kmod-kvm-debug-0:83-273.el5_11.x86_64", "relates_to_product_reference": "5Server-VT-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-0:83-273.el5_11.src as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT-5.11.Z:kvm-0:83-273.el5_11.src" }, "product_reference": "kvm-0:83-273.el5_11.src", "relates_to_product_reference": "5Server-VT-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-0:83-273.el5_11.x86_64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT-5.11.Z:kvm-0:83-273.el5_11.x86_64" }, "product_reference": "kvm-0:83-273.el5_11.x86_64", "relates_to_product_reference": "5Server-VT-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-debuginfo-0:83-273.el5_11.x86_64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT-5.11.Z:kvm-debuginfo-0:83-273.el5_11.x86_64" }, "product_reference": "kvm-debuginfo-0:83-273.el5_11.x86_64", "relates_to_product_reference": "5Server-VT-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-qemu-img-0:83-273.el5_11.x86_64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT-5.11.Z:kvm-qemu-img-0:83-273.el5_11.x86_64" }, "product_reference": "kvm-qemu-img-0:83-273.el5_11.x86_64", "relates_to_product_reference": "5Server-VT-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-tools-0:83-273.el5_11.x86_64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT-5.11.Z:kvm-tools-0:83-273.el5_11.x86_64" }, "product_reference": "kvm-tools-0:83-273.el5_11.x86_64", "relates_to_product_reference": "5Server-VT-5.11.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Matt Tait" ], "organization": "Google\u0027s Project Zero security team" } ], "cve": "CVE-2015-3209", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2015-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1225882" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way QEMU\u0027s AMD PCnet Ethernet emulation handled multi-TMD packets with a length above 4096 bytes. A privileged guest user in a guest with an AMD PCNet ethernet card enabled could potentially use this flaw to execute arbitrary code on the host with the privileges of the hosting QEMU process.", "title": "Vulnerability description" }, { "category": "summary", "text": "qemu: pcnet: multi-tmd buffer overflow in the tx path", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of the qemu-kvm packages as shipped with Red Hat Enterprise Linux 7 as they do not enable the pcnet backend driver.\n\nThis issue does not affect the Red Hat Enterprise Linux 7 based versions of the qemu-kvm-rhev packages as shipped with Red Hat Enterprise Virtualization 3.\n\nThis issue affects the versions of the kvm and xen packages as shipped with Red Hat Enterprise Linux 5, the versions of the qemu-kvm packages as shipped with Red Hat Enterprise Linux 6, and the Red Hat Enterprise Linux 6 based versions of qemu-kvm-rhev packages as shipped with Red Hat Enterprise Virtualization 3. Future updates for the respective releases may address this flaw.\n\nPlease note that AMD PCNet adapter has to be explicitly enabled per-guest as it is not enabled in default configuration and is not supported by Red Hat in Red Hat Enterprise Linux 6 (for a list of supported devices please consult https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Virtualization_Administration_Guide/sect-whitelist-device-options.html).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-VT-5.11.Z:kmod-kvm-0:83-273.el5_11.x86_64", "5Client-VT-5.11.Z:kmod-kvm-debug-0:83-273.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-0:83-273.el5_11.src", "5Client-VT-5.11.Z:kvm-0:83-273.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-debuginfo-0:83-273.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-qemu-img-0:83-273.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-tools-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kmod-kvm-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kmod-kvm-debug-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-0:83-273.el5_11.src", "5Server-VT-5.11.Z:kvm-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-debuginfo-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-qemu-img-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-tools-0:83-273.el5_11.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-3209" }, { "category": "external", "summary": "RHBZ#1225882", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1225882" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-3209", "url": "https://www.cve.org/CVERecord?id=CVE-2015-3209" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-3209", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3209" } ], "release_date": "2015-06-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-06-25T13:27:18+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe following procedure must be performed before this update will take\neffect:\n\n1) Stop all KVM guest virtual machines.\n\n2) Either reboot the hypervisor machine or, as the root user, remove (using\n\"modprobe -r [module]\") and reload (using \"modprobe [module]\") all of the\nfollowing modules which are currently running (determined using \"lsmod\"):\nkvm, ksm, kvm-intel or kvm-amd.\n\n3) Restart the KVM guest virtual machines.", "product_ids": [ "5Client-VT-5.11.Z:kmod-kvm-0:83-273.el5_11.x86_64", "5Client-VT-5.11.Z:kmod-kvm-debug-0:83-273.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-0:83-273.el5_11.src", "5Client-VT-5.11.Z:kvm-0:83-273.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-debuginfo-0:83-273.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-qemu-img-0:83-273.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-tools-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kmod-kvm-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kmod-kvm-debug-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-0:83-273.el5_11.src", "5Server-VT-5.11.Z:kvm-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-debuginfo-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-qemu-img-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-tools-0:83-273.el5_11.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1189" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 6.5, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:H/Au:S/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Client-VT-5.11.Z:kmod-kvm-0:83-273.el5_11.x86_64", "5Client-VT-5.11.Z:kmod-kvm-debug-0:83-273.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-0:83-273.el5_11.src", "5Client-VT-5.11.Z:kvm-0:83-273.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-debuginfo-0:83-273.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-qemu-img-0:83-273.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-tools-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kmod-kvm-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kmod-kvm-debug-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-0:83-273.el5_11.src", "5Server-VT-5.11.Z:kvm-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-debuginfo-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-qemu-img-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-tools-0:83-273.el5_11.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "qemu: pcnet: multi-tmd buffer overflow in the tx path" } ] }
rhsa-2015:1189
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kvm packages that fix one security issue are now available for Red\nHat Enterprise Linux 5.\n\nRed Hat Product Security has rated this update as having Important security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", "title": "Topic" }, { "category": "general", "text": "KVM (Kernel-based Virtual Machine) is a full virtualization solution for\nLinux on AMD64 and Intel 64 systems.\n\nA flaw was found in the way QEMU\u0027s AMD PCnet Ethernet emulation handled\nmulti-TMD packets with a length above 4096 bytes. A privileged guest user\nin a guest with an AMD PCNet ethernet card enabled could potentially use\nthis flaw to execute arbitrary code on the host with the privileges of the\nhosting QEMU process. (CVE-2015-3209)\n\nRed Hat would like to thank Matt Tait of Google\u0027s Project Zero security\nteam for reporting this issue.\n\nAll kvm users are advised to upgrade to these updated packages, which\ncontain a backported patch to correct this issue. Note: The procedure in\nthe Solution section must be performed before this update will take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:1189", "url": "https://access.redhat.com/errata/RHSA-2015:1189" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1225882", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1225882" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_1189.json" } ], "title": "Red Hat Security Advisory: kvm security update", "tracking": { "current_release_date": "2025-09-10T14:07:27+00:00", "generator": { "date": "2025-09-10T14:07:27+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2015:1189", "initial_release_date": "2015-06-25T13:27:18+00:00", "revision_history": [ { "date": "2015-06-25T13:27:18+00:00", "number": "1", "summary": "Initial version" }, { "date": "2015-06-25T13:27:18+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T14:07:27+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.11.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_virtualization:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Virtualization (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT-5.11.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_virtualization:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kmod-kvm-0:83-273.el5_11.x86_64", "product": { "name": "kmod-kvm-0:83-273.el5_11.x86_64", "product_id": "kmod-kvm-0:83-273.el5_11.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kmod-kvm@83-273.el5_11?arch=x86_64" } } }, { "category": "product_version", "name": "kvm-0:83-273.el5_11.x86_64", "product": { "name": "kvm-0:83-273.el5_11.x86_64", "product_id": "kvm-0:83-273.el5_11.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kvm@83-273.el5_11?arch=x86_64" } } }, { "category": "product_version", "name": "kmod-kvm-debug-0:83-273.el5_11.x86_64", "product": { "name": "kmod-kvm-debug-0:83-273.el5_11.x86_64", "product_id": "kmod-kvm-debug-0:83-273.el5_11.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kmod-kvm-debug@83-273.el5_11?arch=x86_64" } } }, { "category": "product_version", "name": "kvm-debuginfo-0:83-273.el5_11.x86_64", "product": { "name": "kvm-debuginfo-0:83-273.el5_11.x86_64", "product_id": "kvm-debuginfo-0:83-273.el5_11.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kvm-debuginfo@83-273.el5_11?arch=x86_64" } } }, { "category": "product_version", "name": "kvm-qemu-img-0:83-273.el5_11.x86_64", "product": { "name": "kvm-qemu-img-0:83-273.el5_11.x86_64", "product_id": "kvm-qemu-img-0:83-273.el5_11.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kvm-qemu-img@83-273.el5_11?arch=x86_64" } } }, { "category": "product_version", "name": "kvm-tools-0:83-273.el5_11.x86_64", "product": { "name": "kvm-tools-0:83-273.el5_11.x86_64", "product_id": "kvm-tools-0:83-273.el5_11.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kvm-tools@83-273.el5_11?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kvm-0:83-273.el5_11.src", "product": { "name": "kvm-0:83-273.el5_11.src", "product_id": "kvm-0:83-273.el5_11.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kvm@83-273.el5_11?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kmod-kvm-0:83-273.el5_11.x86_64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.11.Z:kmod-kvm-0:83-273.el5_11.x86_64" }, "product_reference": "kmod-kvm-0:83-273.el5_11.x86_64", "relates_to_product_reference": "5Client-VT-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kmod-kvm-debug-0:83-273.el5_11.x86_64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.11.Z:kmod-kvm-debug-0:83-273.el5_11.x86_64" }, "product_reference": "kmod-kvm-debug-0:83-273.el5_11.x86_64", "relates_to_product_reference": "5Client-VT-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-0:83-273.el5_11.src as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.11.Z:kvm-0:83-273.el5_11.src" }, "product_reference": "kvm-0:83-273.el5_11.src", "relates_to_product_reference": "5Client-VT-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-0:83-273.el5_11.x86_64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.11.Z:kvm-0:83-273.el5_11.x86_64" }, "product_reference": "kvm-0:83-273.el5_11.x86_64", "relates_to_product_reference": "5Client-VT-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-debuginfo-0:83-273.el5_11.x86_64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.11.Z:kvm-debuginfo-0:83-273.el5_11.x86_64" }, "product_reference": "kvm-debuginfo-0:83-273.el5_11.x86_64", "relates_to_product_reference": "5Client-VT-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-qemu-img-0:83-273.el5_11.x86_64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.11.Z:kvm-qemu-img-0:83-273.el5_11.x86_64" }, "product_reference": "kvm-qemu-img-0:83-273.el5_11.x86_64", "relates_to_product_reference": "5Client-VT-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-tools-0:83-273.el5_11.x86_64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.11.Z:kvm-tools-0:83-273.el5_11.x86_64" }, "product_reference": "kvm-tools-0:83-273.el5_11.x86_64", "relates_to_product_reference": "5Client-VT-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kmod-kvm-0:83-273.el5_11.x86_64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT-5.11.Z:kmod-kvm-0:83-273.el5_11.x86_64" }, "product_reference": "kmod-kvm-0:83-273.el5_11.x86_64", "relates_to_product_reference": "5Server-VT-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kmod-kvm-debug-0:83-273.el5_11.x86_64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT-5.11.Z:kmod-kvm-debug-0:83-273.el5_11.x86_64" }, "product_reference": "kmod-kvm-debug-0:83-273.el5_11.x86_64", "relates_to_product_reference": "5Server-VT-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-0:83-273.el5_11.src as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT-5.11.Z:kvm-0:83-273.el5_11.src" }, "product_reference": "kvm-0:83-273.el5_11.src", "relates_to_product_reference": "5Server-VT-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-0:83-273.el5_11.x86_64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT-5.11.Z:kvm-0:83-273.el5_11.x86_64" }, "product_reference": "kvm-0:83-273.el5_11.x86_64", "relates_to_product_reference": "5Server-VT-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-debuginfo-0:83-273.el5_11.x86_64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT-5.11.Z:kvm-debuginfo-0:83-273.el5_11.x86_64" }, "product_reference": "kvm-debuginfo-0:83-273.el5_11.x86_64", "relates_to_product_reference": "5Server-VT-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-qemu-img-0:83-273.el5_11.x86_64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT-5.11.Z:kvm-qemu-img-0:83-273.el5_11.x86_64" }, "product_reference": "kvm-qemu-img-0:83-273.el5_11.x86_64", "relates_to_product_reference": "5Server-VT-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-tools-0:83-273.el5_11.x86_64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT-5.11.Z:kvm-tools-0:83-273.el5_11.x86_64" }, "product_reference": "kvm-tools-0:83-273.el5_11.x86_64", "relates_to_product_reference": "5Server-VT-5.11.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Matt Tait" ], "organization": "Google\u0027s Project Zero security team" } ], "cve": "CVE-2015-3209", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2015-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1225882" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way QEMU\u0027s AMD PCnet Ethernet emulation handled multi-TMD packets with a length above 4096 bytes. A privileged guest user in a guest with an AMD PCNet ethernet card enabled could potentially use this flaw to execute arbitrary code on the host with the privileges of the hosting QEMU process.", "title": "Vulnerability description" }, { "category": "summary", "text": "qemu: pcnet: multi-tmd buffer overflow in the tx path", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of the qemu-kvm packages as shipped with Red Hat Enterprise Linux 7 as they do not enable the pcnet backend driver.\n\nThis issue does not affect the Red Hat Enterprise Linux 7 based versions of the qemu-kvm-rhev packages as shipped with Red Hat Enterprise Virtualization 3.\n\nThis issue affects the versions of the kvm and xen packages as shipped with Red Hat Enterprise Linux 5, the versions of the qemu-kvm packages as shipped with Red Hat Enterprise Linux 6, and the Red Hat Enterprise Linux 6 based versions of qemu-kvm-rhev packages as shipped with Red Hat Enterprise Virtualization 3. Future updates for the respective releases may address this flaw.\n\nPlease note that AMD PCNet adapter has to be explicitly enabled per-guest as it is not enabled in default configuration and is not supported by Red Hat in Red Hat Enterprise Linux 6 (for a list of supported devices please consult https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Virtualization_Administration_Guide/sect-whitelist-device-options.html).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-VT-5.11.Z:kmod-kvm-0:83-273.el5_11.x86_64", "5Client-VT-5.11.Z:kmod-kvm-debug-0:83-273.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-0:83-273.el5_11.src", "5Client-VT-5.11.Z:kvm-0:83-273.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-debuginfo-0:83-273.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-qemu-img-0:83-273.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-tools-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kmod-kvm-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kmod-kvm-debug-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-0:83-273.el5_11.src", "5Server-VT-5.11.Z:kvm-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-debuginfo-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-qemu-img-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-tools-0:83-273.el5_11.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-3209" }, { "category": "external", "summary": "RHBZ#1225882", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1225882" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-3209", "url": "https://www.cve.org/CVERecord?id=CVE-2015-3209" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-3209", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3209" } ], "release_date": "2015-06-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-06-25T13:27:18+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe following procedure must be performed before this update will take\neffect:\n\n1) Stop all KVM guest virtual machines.\n\n2) Either reboot the hypervisor machine or, as the root user, remove (using\n\"modprobe -r [module]\") and reload (using \"modprobe [module]\") all of the\nfollowing modules which are currently running (determined using \"lsmod\"):\nkvm, ksm, kvm-intel or kvm-amd.\n\n3) Restart the KVM guest virtual machines.", "product_ids": [ "5Client-VT-5.11.Z:kmod-kvm-0:83-273.el5_11.x86_64", "5Client-VT-5.11.Z:kmod-kvm-debug-0:83-273.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-0:83-273.el5_11.src", "5Client-VT-5.11.Z:kvm-0:83-273.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-debuginfo-0:83-273.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-qemu-img-0:83-273.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-tools-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kmod-kvm-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kmod-kvm-debug-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-0:83-273.el5_11.src", "5Server-VT-5.11.Z:kvm-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-debuginfo-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-qemu-img-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-tools-0:83-273.el5_11.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1189" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 6.5, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:H/Au:S/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Client-VT-5.11.Z:kmod-kvm-0:83-273.el5_11.x86_64", "5Client-VT-5.11.Z:kmod-kvm-debug-0:83-273.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-0:83-273.el5_11.src", "5Client-VT-5.11.Z:kvm-0:83-273.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-debuginfo-0:83-273.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-qemu-img-0:83-273.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-tools-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kmod-kvm-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kmod-kvm-debug-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-0:83-273.el5_11.src", "5Server-VT-5.11.Z:kvm-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-debuginfo-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-qemu-img-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-tools-0:83-273.el5_11.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "qemu: pcnet: multi-tmd buffer overflow in the tx path" } ] }
rhsa-2015_1087
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated qemu-kvm packages that fix one security issue are now available for\nRed Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having Important security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", "title": "Topic" }, { "category": "general", "text": "KVM (Kernel-based Virtual Machine) is a full virtualization solution for\nLinux on AMD64 and Intel 64 systems. The qemu-kvm package provides the\nuser-space component for running virtual machines using KVM.\n\nA flaw was found in the way QEMU\u0027s AMD PCnet Ethernet emulation handled\nmulti-TMD packets with a length above 4096 bytes. A privileged guest user\nin a guest with an AMD PCNet ethernet card enabled could potentially use\nthis flaw to execute arbitrary code on the host with the privileges of the\nhosting QEMU process. (CVE-2015-3209)\n\nRed Hat would like to thank Matt Tait of Google\u0027s Project Zero security\nteam for reporting this issue.\n\nAll qemu-kvm users are advised to upgrade to these updated packages, which\ncontain a backported patch to correct this issue. After installing this\nupdate, shut down all running virtual machines. Once all virtual machines\nhave shut down, start them again for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:1087", "url": "https://access.redhat.com/errata/RHSA-2015:1087" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1225882", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1225882" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_1087.json" } ], "title": "Red Hat Security Advisory: qemu-kvm security update", "tracking": { "current_release_date": "2024-11-22T09:12:30+00:00", "generator": { "date": "2024-11-22T09:12:30+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2015:1087", "initial_release_date": "2015-06-10T14:46:59+00:00", "revision_history": [ { "date": "2015-06-10T14:46:59+00:00", "number": "1", "summary": "Initial version" }, { "date": "2015-06-10T14:46:59+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T09:12:30+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "product": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_id": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-debuginfo@0.12.1.2-2.448.el6_6.4?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "product": { "name": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_id": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-guest-agent@0.12.1.2-2.448.el6_6.4?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "product": { "name": "qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_id": "qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-tools@0.12.1.2-2.448.el6_6.4?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "product": { "name": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_id": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm@0.12.1.2-2.448.el6_6.4?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "product": { "name": "qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_id": "qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-img@0.12.1.2-2.448.el6_6.4?arch=x86_64\u0026epoch=2" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "product": { "name": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "product_id": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-guest-agent@0.12.1.2-2.448.el6_6.4?arch=i686\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "product": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "product_id": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-debuginfo@0.12.1.2-2.448.el6_6.4?arch=i686\u0026epoch=2" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "product": { "name": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "product_id": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm@0.12.1.2-2.448.el6_6.4?arch=src\u0026epoch=2" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686" }, "product_reference": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686" }, "product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686" }, "product_reference": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686" }, "product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686" }, "product_reference": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686" }, "product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686" }, "product_reference": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686" }, "product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Workstation-6.6.z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Matt Tait" ], "organization": "Google\u0027s Project Zero security team" } ], "cve": "CVE-2015-3209", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2015-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1225882" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way QEMU\u0027s AMD PCnet Ethernet emulation handled multi-TMD packets with a length above 4096 bytes. A privileged guest user in a guest with an AMD PCNet ethernet card enabled could potentially use this flaw to execute arbitrary code on the host with the privileges of the hosting QEMU process.", "title": "Vulnerability description" }, { "category": "summary", "text": "qemu: pcnet: multi-tmd buffer overflow in the tx path", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of the qemu-kvm packages as shipped with Red Hat Enterprise Linux 7 as they do not enable the pcnet backend driver.\n\nThis issue does not affect the Red Hat Enterprise Linux 7 based versions of the qemu-kvm-rhev packages as shipped with Red Hat Enterprise Virtualization 3.\n\nThis issue affects the versions of the kvm and xen packages as shipped with Red Hat Enterprise Linux 5, the versions of the qemu-kvm packages as shipped with Red Hat Enterprise Linux 6, and the Red Hat Enterprise Linux 6 based versions of qemu-kvm-rhev packages as shipped with Red Hat Enterprise Virtualization 3. Future updates for the respective releases may address this flaw.\n\nPlease note that AMD PCNet adapter has to be explicitly enabled per-guest as it is not enabled in default configuration and is not supported by Red Hat in Red Hat Enterprise Linux 6 (for a list of supported devices please consult https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Virtualization_Administration_Guide/sect-whitelist-device-options.html).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "6Client-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Client-6.6.z:qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Client-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "6Client-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Client-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "6Client-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Client-6.6.z:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "6ComputeNode-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "6ComputeNode-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "6ComputeNode-6.6.z:qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "6ComputeNode-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "6ComputeNode-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "6ComputeNode-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "6ComputeNode-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6ComputeNode-6.6.z:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "6Server-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-6.6.z:qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "6Server-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "6Server-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-6.6.z:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Workstation-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "6Workstation-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Workstation-6.6.z:qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Workstation-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "6Workstation-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Workstation-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "6Workstation-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Workstation-6.6.z:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-3209" }, { "category": "external", "summary": "RHBZ#1225882", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1225882" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-3209", "url": "https://www.cve.org/CVERecord?id=CVE-2015-3209" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-3209", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3209" } ], "release_date": "2015-06-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-06-10T14:46:59+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "6Client-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Client-6.6.z:qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Client-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "6Client-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Client-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "6Client-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Client-6.6.z:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "6ComputeNode-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "6ComputeNode-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "6ComputeNode-6.6.z:qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "6ComputeNode-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "6ComputeNode-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "6ComputeNode-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "6ComputeNode-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6ComputeNode-6.6.z:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "6Server-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-6.6.z:qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "6Server-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "6Server-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-6.6.z:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Workstation-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "6Workstation-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Workstation-6.6.z:qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Workstation-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "6Workstation-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Workstation-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "6Workstation-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Workstation-6.6.z:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1087" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 6.5, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:H/Au:S/C:C/I:C/A:C", "version": "2.0" }, "products": [ "6Client-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "6Client-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Client-6.6.z:qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Client-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "6Client-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Client-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "6Client-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Client-6.6.z:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "6ComputeNode-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "6ComputeNode-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "6ComputeNode-6.6.z:qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "6ComputeNode-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "6ComputeNode-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "6ComputeNode-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "6ComputeNode-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6ComputeNode-6.6.z:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "6Server-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-6.6.z:qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "6Server-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "6Server-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-6.6.z:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Workstation-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "6Workstation-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Workstation-6.6.z:qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Workstation-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "6Workstation-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Workstation-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "6Workstation-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Workstation-6.6.z:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "qemu: pcnet: multi-tmd buffer overflow in the tx path" } ] }
RHSA-2015:1089
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated qemu-kvm-rhev packages that fix one security issue are now\navailable for Red Hat Enterprise Linux OpenStack Platform 5.0 for Red Hat\nEnterprise Linux 6.\n\nRed Hat Product Security has rated this update as having Important security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", "title": "Topic" }, { "category": "general", "text": "KVM (Kernel-based Virtual Machine) is a full virtualization solution for\nLinux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the\nuser-space component for running virtual machines using KVM.\n\nA flaw was found in the way QEMU\u0027s AMD PCnet Ethernet emulation handled\nmulti-TMD packets with a length above 4096 bytes. A privileged guest user\nin a guest with an AMD PCNet ethernet card enabled could potentially use\nthis flaw to execute arbitrary code on the host with the privileges of the\nhosting QEMU process. (CVE-2015-3209)\n\nRed Hat would like to thank Matt Tait of Google\u0027s Project Zero security\nteam for reporting this issue.\n\nAll qemu-kvm-rhev users are advised to upgrade to these updated packages,\nwhich contain a backported patch to correct this issue. After installing\nthis update, shut down all running virtual machines. Once all virtual\nmachines have shut down, start them again for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:1089", "url": "https://access.redhat.com/errata/RHSA-2015:1089" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1225882", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1225882" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_1089.json" } ], "title": "Red Hat Security Advisory: qemu-kvm-rhev security update", "tracking": { "current_release_date": "2025-09-10T14:07:15+00:00", "generator": { "date": "2025-09-10T14:07:15+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2015:1089", "initial_release_date": "2015-06-10T16:23:09+00:00", "revision_history": [ { "date": "2015-06-10T16:23:09+00:00", "number": "1", "summary": "Initial version" }, { "date": "2015-06-10T16:23:09+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T14:07:15+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6", "product": { "name": "Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6", "product_id": "6Server-RH6-RHOS-5.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:5::el6" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src", "product": { "name": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src", "product_id": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev@0.12.1.2-2.448.el6_6.4?arch=src\u0026epoch=2" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "product": { "name": "qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_id": "qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev-tools@0.12.1.2-2.448.el6_6.4?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "product": { "name": "qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_id": "qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-img-rhev@0.12.1.2-2.448.el6_6.4?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "product": { "name": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_id": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev@0.12.1.2-2.448.el6_6.4?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "product": { "name": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_id": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev-debuginfo@0.12.1.2-2.448.el6_6.4?arch=x86_64\u0026epoch=2" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6", "product_id": "6Server-RH6-RHOS-5.0:qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Server-RH6-RHOS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6", "product_id": "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src" }, "product_reference": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src", "relates_to_product_reference": "6Server-RH6-RHOS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6", "product_id": "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Server-RH6-RHOS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6", "product_id": "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Server-RH6-RHOS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6", "product_id": "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Server-RH6-RHOS-5.0" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Matt Tait" ], "organization": "Google\u0027s Project Zero security team" } ], "cve": "CVE-2015-3209", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2015-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1225882" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way QEMU\u0027s AMD PCnet Ethernet emulation handled multi-TMD packets with a length above 4096 bytes. A privileged guest user in a guest with an AMD PCNet ethernet card enabled could potentially use this flaw to execute arbitrary code on the host with the privileges of the hosting QEMU process.", "title": "Vulnerability description" }, { "category": "summary", "text": "qemu: pcnet: multi-tmd buffer overflow in the tx path", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of the qemu-kvm packages as shipped with Red Hat Enterprise Linux 7 as they do not enable the pcnet backend driver.\n\nThis issue does not affect the Red Hat Enterprise Linux 7 based versions of the qemu-kvm-rhev packages as shipped with Red Hat Enterprise Virtualization 3.\n\nThis issue affects the versions of the kvm and xen packages as shipped with Red Hat Enterprise Linux 5, the versions of the qemu-kvm packages as shipped with Red Hat Enterprise Linux 6, and the Red Hat Enterprise Linux 6 based versions of qemu-kvm-rhev packages as shipped with Red Hat Enterprise Virtualization 3. Future updates for the respective releases may address this flaw.\n\nPlease note that AMD PCNet adapter has to be explicitly enabled per-guest as it is not enabled in default configuration and is not supported by Red Hat in Red Hat Enterprise Linux 6 (for a list of supported devices please consult https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Virtualization_Administration_Guide/sect-whitelist-device-options.html).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RH6-RHOS-5.0:qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src", "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-3209" }, { "category": "external", "summary": "RHBZ#1225882", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1225882" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-3209", "url": "https://www.cve.org/CVERecord?id=CVE-2015-3209" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-3209", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3209" } ], "release_date": "2015-06-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-06-10T16:23:09+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RH6-RHOS-5.0:qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src", "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1089" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 6.5, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:H/Au:S/C:C/I:C/A:C", "version": "2.0" }, "products": [ "6Server-RH6-RHOS-5.0:qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src", "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "qemu: pcnet: multi-tmd buffer overflow in the tx path" } ] }
rhsa-2015:1089
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated qemu-kvm-rhev packages that fix one security issue are now\navailable for Red Hat Enterprise Linux OpenStack Platform 5.0 for Red Hat\nEnterprise Linux 6.\n\nRed Hat Product Security has rated this update as having Important security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", "title": "Topic" }, { "category": "general", "text": "KVM (Kernel-based Virtual Machine) is a full virtualization solution for\nLinux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the\nuser-space component for running virtual machines using KVM.\n\nA flaw was found in the way QEMU\u0027s AMD PCnet Ethernet emulation handled\nmulti-TMD packets with a length above 4096 bytes. A privileged guest user\nin a guest with an AMD PCNet ethernet card enabled could potentially use\nthis flaw to execute arbitrary code on the host with the privileges of the\nhosting QEMU process. (CVE-2015-3209)\n\nRed Hat would like to thank Matt Tait of Google\u0027s Project Zero security\nteam for reporting this issue.\n\nAll qemu-kvm-rhev users are advised to upgrade to these updated packages,\nwhich contain a backported patch to correct this issue. After installing\nthis update, shut down all running virtual machines. Once all virtual\nmachines have shut down, start them again for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:1089", "url": "https://access.redhat.com/errata/RHSA-2015:1089" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1225882", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1225882" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_1089.json" } ], "title": "Red Hat Security Advisory: qemu-kvm-rhev security update", "tracking": { "current_release_date": "2025-09-10T14:07:15+00:00", "generator": { "date": "2025-09-10T14:07:15+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2015:1089", "initial_release_date": "2015-06-10T16:23:09+00:00", "revision_history": [ { "date": "2015-06-10T16:23:09+00:00", "number": "1", "summary": "Initial version" }, { "date": "2015-06-10T16:23:09+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T14:07:15+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6", "product": { "name": "Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6", "product_id": "6Server-RH6-RHOS-5.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:5::el6" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src", "product": { "name": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src", "product_id": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev@0.12.1.2-2.448.el6_6.4?arch=src\u0026epoch=2" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "product": { "name": "qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_id": "qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev-tools@0.12.1.2-2.448.el6_6.4?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "product": { "name": "qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_id": "qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-img-rhev@0.12.1.2-2.448.el6_6.4?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "product": { "name": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_id": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev@0.12.1.2-2.448.el6_6.4?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "product": { "name": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_id": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev-debuginfo@0.12.1.2-2.448.el6_6.4?arch=x86_64\u0026epoch=2" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6", "product_id": "6Server-RH6-RHOS-5.0:qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Server-RH6-RHOS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6", "product_id": "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src" }, "product_reference": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src", "relates_to_product_reference": "6Server-RH6-RHOS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6", "product_id": "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Server-RH6-RHOS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6", "product_id": "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Server-RH6-RHOS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6", "product_id": "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Server-RH6-RHOS-5.0" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Matt Tait" ], "organization": "Google\u0027s Project Zero security team" } ], "cve": "CVE-2015-3209", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2015-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1225882" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way QEMU\u0027s AMD PCnet Ethernet emulation handled multi-TMD packets with a length above 4096 bytes. A privileged guest user in a guest with an AMD PCNet ethernet card enabled could potentially use this flaw to execute arbitrary code on the host with the privileges of the hosting QEMU process.", "title": "Vulnerability description" }, { "category": "summary", "text": "qemu: pcnet: multi-tmd buffer overflow in the tx path", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of the qemu-kvm packages as shipped with Red Hat Enterprise Linux 7 as they do not enable the pcnet backend driver.\n\nThis issue does not affect the Red Hat Enterprise Linux 7 based versions of the qemu-kvm-rhev packages as shipped with Red Hat Enterprise Virtualization 3.\n\nThis issue affects the versions of the kvm and xen packages as shipped with Red Hat Enterprise Linux 5, the versions of the qemu-kvm packages as shipped with Red Hat Enterprise Linux 6, and the Red Hat Enterprise Linux 6 based versions of qemu-kvm-rhev packages as shipped with Red Hat Enterprise Virtualization 3. Future updates for the respective releases may address this flaw.\n\nPlease note that AMD PCNet adapter has to be explicitly enabled per-guest as it is not enabled in default configuration and is not supported by Red Hat in Red Hat Enterprise Linux 6 (for a list of supported devices please consult https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Virtualization_Administration_Guide/sect-whitelist-device-options.html).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RH6-RHOS-5.0:qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src", "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-3209" }, { "category": "external", "summary": "RHBZ#1225882", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1225882" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-3209", "url": "https://www.cve.org/CVERecord?id=CVE-2015-3209" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-3209", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3209" } ], "release_date": "2015-06-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-06-10T16:23:09+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RH6-RHOS-5.0:qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src", "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1089" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 6.5, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:H/Au:S/C:C/I:C/A:C", "version": "2.0" }, "products": [ "6Server-RH6-RHOS-5.0:qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src", "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "qemu: pcnet: multi-tmd buffer overflow in the tx path" } ] }
RHSA-2015:1087
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated qemu-kvm packages that fix one security issue are now available for\nRed Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having Important security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", "title": "Topic" }, { "category": "general", "text": "KVM (Kernel-based Virtual Machine) is a full virtualization solution for\nLinux on AMD64 and Intel 64 systems. The qemu-kvm package provides the\nuser-space component for running virtual machines using KVM.\n\nA flaw was found in the way QEMU\u0027s AMD PCnet Ethernet emulation handled\nmulti-TMD packets with a length above 4096 bytes. A privileged guest user\nin a guest with an AMD PCNet ethernet card enabled could potentially use\nthis flaw to execute arbitrary code on the host with the privileges of the\nhosting QEMU process. (CVE-2015-3209)\n\nRed Hat would like to thank Matt Tait of Google\u0027s Project Zero security\nteam for reporting this issue.\n\nAll qemu-kvm users are advised to upgrade to these updated packages, which\ncontain a backported patch to correct this issue. After installing this\nupdate, shut down all running virtual machines. Once all virtual machines\nhave shut down, start them again for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:1087", "url": "https://access.redhat.com/errata/RHSA-2015:1087" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1225882", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1225882" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_1087.json" } ], "title": "Red Hat Security Advisory: qemu-kvm security update", "tracking": { "current_release_date": "2025-09-10T14:07:18+00:00", "generator": { "date": "2025-09-10T14:07:18+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2015:1087", "initial_release_date": "2015-06-10T14:46:59+00:00", "revision_history": [ { "date": "2015-06-10T14:46:59+00:00", "number": "1", "summary": "Initial version" }, { "date": "2015-06-10T14:46:59+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T14:07:18+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "product": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_id": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-debuginfo@0.12.1.2-2.448.el6_6.4?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "product": { "name": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_id": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-guest-agent@0.12.1.2-2.448.el6_6.4?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "product": { "name": "qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_id": "qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-tools@0.12.1.2-2.448.el6_6.4?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "product": { "name": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_id": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm@0.12.1.2-2.448.el6_6.4?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "product": { "name": "qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_id": "qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-img@0.12.1.2-2.448.el6_6.4?arch=x86_64\u0026epoch=2" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "product": { "name": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "product_id": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-guest-agent@0.12.1.2-2.448.el6_6.4?arch=i686\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "product": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "product_id": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-debuginfo@0.12.1.2-2.448.el6_6.4?arch=i686\u0026epoch=2" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "product": { "name": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "product_id": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm@0.12.1.2-2.448.el6_6.4?arch=src\u0026epoch=2" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686" }, "product_reference": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686" }, "product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686" }, "product_reference": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686" }, "product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686" }, "product_reference": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686" }, "product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686" }, "product_reference": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686" }, "product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Workstation-6.6.z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Matt Tait" ], "organization": "Google\u0027s Project Zero security team" } ], "cve": "CVE-2015-3209", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2015-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1225882" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way QEMU\u0027s AMD PCnet Ethernet emulation handled multi-TMD packets with a length above 4096 bytes. A privileged guest user in a guest with an AMD PCNet ethernet card enabled could potentially use this flaw to execute arbitrary code on the host with the privileges of the hosting QEMU process.", "title": "Vulnerability description" }, { "category": "summary", "text": "qemu: pcnet: multi-tmd buffer overflow in the tx path", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of the qemu-kvm packages as shipped with Red Hat Enterprise Linux 7 as they do not enable the pcnet backend driver.\n\nThis issue does not affect the Red Hat Enterprise Linux 7 based versions of the qemu-kvm-rhev packages as shipped with Red Hat Enterprise Virtualization 3.\n\nThis issue affects the versions of the kvm and xen packages as shipped with Red Hat Enterprise Linux 5, the versions of the qemu-kvm packages as shipped with Red Hat Enterprise Linux 6, and the Red Hat Enterprise Linux 6 based versions of qemu-kvm-rhev packages as shipped with Red Hat Enterprise Virtualization 3. Future updates for the respective releases may address this flaw.\n\nPlease note that AMD PCNet adapter has to be explicitly enabled per-guest as it is not enabled in default configuration and is not supported by Red Hat in Red Hat Enterprise Linux 6 (for a list of supported devices please consult https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Virtualization_Administration_Guide/sect-whitelist-device-options.html).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "6Client-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Client-6.6.z:qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Client-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "6Client-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Client-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "6Client-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Client-6.6.z:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "6ComputeNode-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "6ComputeNode-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "6ComputeNode-6.6.z:qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "6ComputeNode-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "6ComputeNode-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "6ComputeNode-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "6ComputeNode-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6ComputeNode-6.6.z:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "6Server-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-6.6.z:qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "6Server-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "6Server-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-6.6.z:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Workstation-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "6Workstation-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Workstation-6.6.z:qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Workstation-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "6Workstation-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Workstation-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "6Workstation-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Workstation-6.6.z:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-3209" }, { "category": "external", "summary": "RHBZ#1225882", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1225882" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-3209", "url": "https://www.cve.org/CVERecord?id=CVE-2015-3209" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-3209", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3209" } ], "release_date": "2015-06-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-06-10T14:46:59+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "6Client-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Client-6.6.z:qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Client-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "6Client-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Client-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "6Client-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Client-6.6.z:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "6ComputeNode-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "6ComputeNode-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "6ComputeNode-6.6.z:qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "6ComputeNode-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "6ComputeNode-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "6ComputeNode-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "6ComputeNode-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6ComputeNode-6.6.z:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "6Server-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-6.6.z:qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "6Server-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "6Server-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-6.6.z:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Workstation-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "6Workstation-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Workstation-6.6.z:qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Workstation-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "6Workstation-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Workstation-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "6Workstation-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Workstation-6.6.z:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1087" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 6.5, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:H/Au:S/C:C/I:C/A:C", "version": "2.0" }, "products": [ "6Client-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "6Client-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Client-6.6.z:qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Client-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "6Client-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Client-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "6Client-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Client-6.6.z:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "6ComputeNode-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "6ComputeNode-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "6ComputeNode-6.6.z:qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "6ComputeNode-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "6ComputeNode-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "6ComputeNode-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "6ComputeNode-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6ComputeNode-6.6.z:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "6Server-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-6.6.z:qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "6Server-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "6Server-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-6.6.z:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Workstation-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "6Workstation-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Workstation-6.6.z:qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Workstation-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "6Workstation-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Workstation-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "6Workstation-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Workstation-6.6.z:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "qemu: pcnet: multi-tmd buffer overflow in the tx path" } ] }
rhsa-2015_1089
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated qemu-kvm-rhev packages that fix one security issue are now\navailable for Red Hat Enterprise Linux OpenStack Platform 5.0 for Red Hat\nEnterprise Linux 6.\n\nRed Hat Product Security has rated this update as having Important security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", "title": "Topic" }, { "category": "general", "text": "KVM (Kernel-based Virtual Machine) is a full virtualization solution for\nLinux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the\nuser-space component for running virtual machines using KVM.\n\nA flaw was found in the way QEMU\u0027s AMD PCnet Ethernet emulation handled\nmulti-TMD packets with a length above 4096 bytes. A privileged guest user\nin a guest with an AMD PCNet ethernet card enabled could potentially use\nthis flaw to execute arbitrary code on the host with the privileges of the\nhosting QEMU process. (CVE-2015-3209)\n\nRed Hat would like to thank Matt Tait of Google\u0027s Project Zero security\nteam for reporting this issue.\n\nAll qemu-kvm-rhev users are advised to upgrade to these updated packages,\nwhich contain a backported patch to correct this issue. After installing\nthis update, shut down all running virtual machines. Once all virtual\nmachines have shut down, start them again for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:1089", "url": "https://access.redhat.com/errata/RHSA-2015:1089" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1225882", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1225882" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_1089.json" } ], "title": "Red Hat Security Advisory: qemu-kvm-rhev security update", "tracking": { "current_release_date": "2024-11-22T09:12:39+00:00", "generator": { "date": "2024-11-22T09:12:39+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2015:1089", "initial_release_date": "2015-06-10T16:23:09+00:00", "revision_history": [ { "date": "2015-06-10T16:23:09+00:00", "number": "1", "summary": "Initial version" }, { "date": "2015-06-10T16:23:09+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T09:12:39+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6", "product": { "name": "Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6", "product_id": "6Server-RH6-RHOS-5.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:5::el6" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src", "product": { "name": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src", "product_id": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev@0.12.1.2-2.448.el6_6.4?arch=src\u0026epoch=2" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "product": { "name": "qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_id": "qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev-tools@0.12.1.2-2.448.el6_6.4?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "product": { "name": "qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_id": "qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-img-rhev@0.12.1.2-2.448.el6_6.4?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "product": { "name": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_id": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev@0.12.1.2-2.448.el6_6.4?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "product": { "name": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_id": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev-debuginfo@0.12.1.2-2.448.el6_6.4?arch=x86_64\u0026epoch=2" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6", "product_id": "6Server-RH6-RHOS-5.0:qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Server-RH6-RHOS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6", "product_id": "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src" }, "product_reference": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src", "relates_to_product_reference": "6Server-RH6-RHOS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6", "product_id": "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Server-RH6-RHOS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6", "product_id": "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Server-RH6-RHOS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6", "product_id": "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Server-RH6-RHOS-5.0" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Matt Tait" ], "organization": "Google\u0027s Project Zero security team" } ], "cve": "CVE-2015-3209", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2015-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1225882" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way QEMU\u0027s AMD PCnet Ethernet emulation handled multi-TMD packets with a length above 4096 bytes. A privileged guest user in a guest with an AMD PCNet ethernet card enabled could potentially use this flaw to execute arbitrary code on the host with the privileges of the hosting QEMU process.", "title": "Vulnerability description" }, { "category": "summary", "text": "qemu: pcnet: multi-tmd buffer overflow in the tx path", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of the qemu-kvm packages as shipped with Red Hat Enterprise Linux 7 as they do not enable the pcnet backend driver.\n\nThis issue does not affect the Red Hat Enterprise Linux 7 based versions of the qemu-kvm-rhev packages as shipped with Red Hat Enterprise Virtualization 3.\n\nThis issue affects the versions of the kvm and xen packages as shipped with Red Hat Enterprise Linux 5, the versions of the qemu-kvm packages as shipped with Red Hat Enterprise Linux 6, and the Red Hat Enterprise Linux 6 based versions of qemu-kvm-rhev packages as shipped with Red Hat Enterprise Virtualization 3. Future updates for the respective releases may address this flaw.\n\nPlease note that AMD PCNet adapter has to be explicitly enabled per-guest as it is not enabled in default configuration and is not supported by Red Hat in Red Hat Enterprise Linux 6 (for a list of supported devices please consult https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Virtualization_Administration_Guide/sect-whitelist-device-options.html).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RH6-RHOS-5.0:qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src", "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-3209" }, { "category": "external", "summary": "RHBZ#1225882", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1225882" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-3209", "url": "https://www.cve.org/CVERecord?id=CVE-2015-3209" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-3209", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3209" } ], "release_date": "2015-06-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-06-10T16:23:09+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RH6-RHOS-5.0:qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src", "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1089" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 6.5, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:H/Au:S/C:C/I:C/A:C", "version": "2.0" }, "products": [ "6Server-RH6-RHOS-5.0:qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src", "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "qemu: pcnet: multi-tmd buffer overflow in the tx path" } ] }
rhsa-2015:1087
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated qemu-kvm packages that fix one security issue are now available for\nRed Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having Important security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", "title": "Topic" }, { "category": "general", "text": "KVM (Kernel-based Virtual Machine) is a full virtualization solution for\nLinux on AMD64 and Intel 64 systems. The qemu-kvm package provides the\nuser-space component for running virtual machines using KVM.\n\nA flaw was found in the way QEMU\u0027s AMD PCnet Ethernet emulation handled\nmulti-TMD packets with a length above 4096 bytes. A privileged guest user\nin a guest with an AMD PCNet ethernet card enabled could potentially use\nthis flaw to execute arbitrary code on the host with the privileges of the\nhosting QEMU process. (CVE-2015-3209)\n\nRed Hat would like to thank Matt Tait of Google\u0027s Project Zero security\nteam for reporting this issue.\n\nAll qemu-kvm users are advised to upgrade to these updated packages, which\ncontain a backported patch to correct this issue. After installing this\nupdate, shut down all running virtual machines. Once all virtual machines\nhave shut down, start them again for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:1087", "url": "https://access.redhat.com/errata/RHSA-2015:1087" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1225882", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1225882" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_1087.json" } ], "title": "Red Hat Security Advisory: qemu-kvm security update", "tracking": { "current_release_date": "2025-09-10T14:07:18+00:00", "generator": { "date": "2025-09-10T14:07:18+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2015:1087", "initial_release_date": "2015-06-10T14:46:59+00:00", "revision_history": [ { "date": "2015-06-10T14:46:59+00:00", "number": "1", "summary": "Initial version" }, { "date": "2015-06-10T14:46:59+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T14:07:18+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "product": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_id": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-debuginfo@0.12.1.2-2.448.el6_6.4?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "product": { "name": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_id": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-guest-agent@0.12.1.2-2.448.el6_6.4?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "product": { "name": "qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_id": "qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-tools@0.12.1.2-2.448.el6_6.4?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "product": { "name": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_id": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm@0.12.1.2-2.448.el6_6.4?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "product": { "name": "qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_id": "qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-img@0.12.1.2-2.448.el6_6.4?arch=x86_64\u0026epoch=2" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "product": { "name": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "product_id": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-guest-agent@0.12.1.2-2.448.el6_6.4?arch=i686\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "product": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "product_id": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-debuginfo@0.12.1.2-2.448.el6_6.4?arch=i686\u0026epoch=2" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "product": { "name": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "product_id": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm@0.12.1.2-2.448.el6_6.4?arch=src\u0026epoch=2" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686" }, "product_reference": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686" }, "product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686" }, "product_reference": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686" }, "product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686" }, "product_reference": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686" }, "product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686" }, "product_reference": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686" }, "product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Workstation-6.6.z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Matt Tait" ], "organization": "Google\u0027s Project Zero security team" } ], "cve": "CVE-2015-3209", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2015-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1225882" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way QEMU\u0027s AMD PCnet Ethernet emulation handled multi-TMD packets with a length above 4096 bytes. A privileged guest user in a guest with an AMD PCNet ethernet card enabled could potentially use this flaw to execute arbitrary code on the host with the privileges of the hosting QEMU process.", "title": "Vulnerability description" }, { "category": "summary", "text": "qemu: pcnet: multi-tmd buffer overflow in the tx path", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of the qemu-kvm packages as shipped with Red Hat Enterprise Linux 7 as they do not enable the pcnet backend driver.\n\nThis issue does not affect the Red Hat Enterprise Linux 7 based versions of the qemu-kvm-rhev packages as shipped with Red Hat Enterprise Virtualization 3.\n\nThis issue affects the versions of the kvm and xen packages as shipped with Red Hat Enterprise Linux 5, the versions of the qemu-kvm packages as shipped with Red Hat Enterprise Linux 6, and the Red Hat Enterprise Linux 6 based versions of qemu-kvm-rhev packages as shipped with Red Hat Enterprise Virtualization 3. Future updates for the respective releases may address this flaw.\n\nPlease note that AMD PCNet adapter has to be explicitly enabled per-guest as it is not enabled in default configuration and is not supported by Red Hat in Red Hat Enterprise Linux 6 (for a list of supported devices please consult https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Virtualization_Administration_Guide/sect-whitelist-device-options.html).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "6Client-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Client-6.6.z:qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Client-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "6Client-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Client-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "6Client-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Client-6.6.z:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "6ComputeNode-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "6ComputeNode-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "6ComputeNode-6.6.z:qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "6ComputeNode-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "6ComputeNode-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "6ComputeNode-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "6ComputeNode-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6ComputeNode-6.6.z:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "6Server-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-6.6.z:qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "6Server-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "6Server-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-6.6.z:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Workstation-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "6Workstation-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Workstation-6.6.z:qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Workstation-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "6Workstation-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Workstation-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "6Workstation-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Workstation-6.6.z:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-3209" }, { "category": "external", "summary": "RHBZ#1225882", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1225882" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-3209", "url": "https://www.cve.org/CVERecord?id=CVE-2015-3209" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-3209", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3209" } ], "release_date": "2015-06-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-06-10T14:46:59+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "6Client-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Client-6.6.z:qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Client-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "6Client-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Client-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "6Client-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Client-6.6.z:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "6ComputeNode-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "6ComputeNode-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "6ComputeNode-6.6.z:qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "6ComputeNode-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "6ComputeNode-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "6ComputeNode-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "6ComputeNode-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6ComputeNode-6.6.z:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "6Server-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-6.6.z:qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "6Server-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "6Server-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-6.6.z:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Workstation-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "6Workstation-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Workstation-6.6.z:qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Workstation-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "6Workstation-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Workstation-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "6Workstation-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Workstation-6.6.z:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1087" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 6.5, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:H/Au:S/C:C/I:C/A:C", "version": "2.0" }, "products": [ "6Client-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "6Client-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Client-6.6.z:qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Client-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "6Client-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Client-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "6Client-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Client-6.6.z:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "6ComputeNode-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "6ComputeNode-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "6ComputeNode-6.6.z:qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "6ComputeNode-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "6ComputeNode-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "6ComputeNode-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "6ComputeNode-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6ComputeNode-6.6.z:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "6Server-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-6.6.z:qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "6Server-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "6Server-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-6.6.z:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Workstation-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "6Workstation-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Workstation-6.6.z:qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Workstation-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "6Workstation-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Workstation-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "6Workstation-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Workstation-6.6.z:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "qemu: pcnet: multi-tmd buffer overflow in the tx path" } ] }
fkie_cve-2015-3209
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*", "matchCriteriaId": "19E6775C-BA58-4D7E-96AB-9283C99D9641", "versionEndIncluding": "2.3.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:juniper:junos_space:*:*:*:*:*:*:*:*", "matchCriteriaId": "6133CA80-A291-487F-AE06-85D4AA154727", "versionEndIncluding": "15.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "matchCriteriaId": "8D305F7A-D159-4716-AB26-5E38BB5CD991", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*", "matchCriteriaId": "49A63F39-30BE-443F-AF10-6245587D3359", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*", "matchCriteriaId": "F38D3B7E-8429-473F-BB31-FC3583EE5A5B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:6.6:*:*:*:*:*:*:*", "matchCriteriaId": "319EC0C6-94C5-494A-9C5D-DC5124DFC8E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "54D669D4-6D7E-449D-80C1-28FA44F06FFE", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*", "matchCriteriaId": "16E6D998-B41D-4B49-9E00-8336D2E40A4A", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*", "matchCriteriaId": "13E02156-E748-4820-B76F-7074793837E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "D0AC5CD5-6E58-433C-9EB3-6DFE5656463E", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "B152EDF3-3140-4343-802F-F4F1C329F5C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "D86166F9-BBF0-4650-8CCD-0F9C97104D21", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*", "matchCriteriaId": "FF47C9F0-D8DA-4B55-89EB-9B2C9383ADB9", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*", "matchCriteriaId": "56BDB5A0-0839-4A20-A003-B8CD56F48171", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "matchCriteriaId": "253C303A-E577-4488-93E6-68A8DD942C38", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*", "matchCriteriaId": "D5900A25-FDD7-4900-BF7C-F3ECCB714D2B", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*", "matchCriteriaId": "3ED68ADD-BBDA-4485-BC76-58F011D72311", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*", "matchCriteriaId": "D2DF4815-B8CB-4AD3-B91D-2E09A8E318E9", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*", "matchCriteriaId": "35BBD83D-BDC7-4678-BE94-639F59281139", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:*:*:*", "matchCriteriaId": "67960FB9-13D1-4DEE-8158-31BF31BCBE6F", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*", "matchCriteriaId": "CB6476C7-03F2-4939-AB85-69AA524516D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*", "matchCriteriaId": "E534C201-BCC5-473C-AAA7-AAB97CEB5437", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*", "matchCriteriaId": "15FC9014-BD85-4382-9D04-C0703E901D7A", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*", "matchCriteriaId": "2F7F8866-DEAD-44D1-AB10-21EE611AA026", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*", "matchCriteriaId": "1831D45A-EE6E-4220-8F8C-248B69520948", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:eos:4.12:*:*:*:*:*:*:*", "matchCriteriaId": "FDDF9823-D999-41A4-BB7B-A63C00ACE11B", "vulnerable": true }, { "criteria": "cpe:2.3:o:arista:eos:4.13:*:*:*:*:*:*:*", "matchCriteriaId": "51F7426A-46F7-4BE0-806F-F4598C8B0426", "vulnerable": true }, { "criteria": "cpe:2.3:o:arista:eos:4.14:*:*:*:*:*:*:*", "matchCriteriaId": "E7F71EBA-27AC-464B-8708-4E8971BC75A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:arista:eos:4.15:*:*:*:*:*:*:*", "matchCriteriaId": "8705CF80-DEFC-4425-8E23-D98FFD678157", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set." }, { "lang": "es", "value": "Desbordamiento de buffer basado en memoria din\u00e1mica en el controlador PCNET en QEMU permite a atacantes remotos ejecutar c\u00f3digo arbitrario mediante el env\u00edo de un paquete con el juego TXSTATUS_STARTPACKET y posteriormente un paquete manipulado con el juego TXSTATUS_DEVICEOWNS." } ], "id": "CVE-2015-3209", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-06-15T15:59:00.070", "references": [ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10698" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160669.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160677.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160685.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00027.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00029.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00014.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00020.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00015.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00027.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1087.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1088.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1089.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1189.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2015/dsa-3284" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2015/dsa-3285" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2015/dsa-3286" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/75123" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1032545" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2630-1" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://xenbits.xen.org/xsa/advisory-135.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://kb.juniper.net/JSA10783" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201510-02" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201604-03" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1180-security-advisory-13" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10698" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160669.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160677.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160685.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00027.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00029.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00014.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00015.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00027.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1087.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1088.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1089.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1189.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2015/dsa-3284" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2015/dsa-3285" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2015/dsa-3286" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/75123" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1032545" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2630-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://xenbits.xen.org/xsa/advisory-135.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://kb.juniper.net/JSA10783" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201510-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201604-03" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1180-security-advisory-13" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
var-201506-0038
Vulnerability from variot
Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set. Xen is a virtualization technology for the Linux kernel that allows multiple operating systems to run simultaneously. QEMU (also known as Quick Emulator) is a set of analog processor software developed by French programmer Fabrice Bellard. The software has the characteristics of fast speed and cross-platform. 5 client) - x86_64 RHEL Virtualization (v. 5 server) - x86_64
- Note: The procedure in the Solution section must be performed before this update will take effect.
2) Either reboot the hypervisor machine or, as the root user, remove (using "modprobe -r [module]") and reload (using "modprobe [module]") all of the following modules which are currently running (determined using "lsmod"): kvm, ksm, kvm-intel or kvm-amd. 5 client):
Source: kvm-83-273.el5_11.src.rpm
x86_64: kmod-kvm-83-273.el5_11.x86_64.rpm kmod-kvm-debug-83-273.el5_11.x86_64.rpm kvm-83-273.el5_11.x86_64.rpm kvm-debuginfo-83-273.el5_11.x86_64.rpm kvm-qemu-img-83-273.el5_11.x86_64.rpm kvm-tools-83-273.el5_11.x86_64.rpm
RHEL Virtualization (v. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Important: qemu-kvm security update Advisory ID: RHSA-2015:1087-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1087.html Issue date: 2015-06-10 CVE Names: CVE-2015-3209 =====================================================================
- Summary:
Updated qemu-kvm packages that fix one security issue are now available for Red Hat Enterprise Linux 6.
Red Hat Product Security has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64
- Description:
KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm package provides the user-space component for running virtual machines using KVM.
A flaw was found in the way QEMU's AMD PCnet Ethernet emulation handled multi-TMD packets with a length above 4096 bytes. (CVE-2015-3209)
Red Hat would like to thank Matt Tait of Google's Project Zero security team for reporting this issue.
All qemu-kvm users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.
- Solution:
Before applying this update, make sure all previously released errata relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
- Bugs fixed (https://bugzilla.redhat.com/):
1225882 - CVE-2015-3209 qemu: pcnet: multi-tmd buffer overflow in the tx path
- Package List:
Red Hat Enterprise Linux Desktop (v. 6):
Source: qemu-kvm-0.12.1.2-2.448.el6_6.4.src.rpm
i386: qemu-guest-agent-0.12.1.2-2.448.el6_6.4.i686.rpm qemu-kvm-debuginfo-0.12.1.2-2.448.el6_6.4.i686.rpm
x86_64: qemu-guest-agent-0.12.1.2-2.448.el6_6.4.x86_64.rpm qemu-img-0.12.1.2-2.448.el6_6.4.x86_64.rpm qemu-kvm-0.12.1.2-2.448.el6_6.4.x86_64.rpm qemu-kvm-debuginfo-0.12.1.2-2.448.el6_6.4.x86_64.rpm qemu-kvm-tools-0.12.1.2-2.448.el6_6.4.x86_64.rpm
Red Hat Enterprise Linux HPC Node (v. 6):
Source: qemu-kvm-0.12.1.2-2.448.el6_6.4.src.rpm
x86_64: qemu-guest-agent-0.12.1.2-2.448.el6_6.4.x86_64.rpm qemu-img-0.12.1.2-2.448.el6_6.4.x86_64.rpm qemu-kvm-0.12.1.2-2.448.el6_6.4.x86_64.rpm qemu-kvm-debuginfo-0.12.1.2-2.448.el6_6.4.x86_64.rpm qemu-kvm-tools-0.12.1.2-2.448.el6_6.4.x86_64.rpm
Red Hat Enterprise Linux Server (v. 6):
Source: qemu-kvm-0.12.1.2-2.448.el6_6.4.src.rpm
i386: qemu-guest-agent-0.12.1.2-2.448.el6_6.4.i686.rpm qemu-kvm-debuginfo-0.12.1.2-2.448.el6_6.4.i686.rpm
x86_64: qemu-guest-agent-0.12.1.2-2.448.el6_6.4.x86_64.rpm qemu-img-0.12.1.2-2.448.el6_6.4.x86_64.rpm qemu-kvm-0.12.1.2-2.448.el6_6.4.x86_64.rpm qemu-kvm-debuginfo-0.12.1.2-2.448.el6_6.4.x86_64.rpm qemu-kvm-tools-0.12.1.2-2.448.el6_6.4.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 6):
Source: qemu-kvm-0.12.1.2-2.448.el6_6.4.src.rpm
i386: qemu-guest-agent-0.12.1.2-2.448.el6_6.4.i686.rpm qemu-kvm-debuginfo-0.12.1.2-2.448.el6_6.4.i686.rpm
x86_64: qemu-guest-agent-0.12.1.2-2.448.el6_6.4.x86_64.rpm qemu-img-0.12.1.2-2.448.el6_6.4.x86_64.rpm qemu-kvm-0.12.1.2-2.448.el6_6.4.x86_64.rpm qemu-kvm-debuginfo-0.12.1.2-2.448.el6_6.4.x86_64.rpm qemu-kvm-tools-0.12.1.2-2.448.el6_6.4.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2015-3209 https://access.redhat.com/security/updates/classification/#important
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iD8DBQFVeHRmXlSAg2UNWIIRAkq5AKCeYGr9MG7Kdic1FVJZw2avAhO6eACdFG0W VCkW3jIuuaxOqeYM0s8u6ss= =+WsT -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce .
CVE-2015-4037
Kurt Seifried of Red Hat Product Security discovered that QEMU's
user mode networking stack uses predictable temporary file names
when the -smb option is used.
CVE-2015-4163
Jan Beulich discovered that a missing version check in the
GNTTABOP_swap_grant_ref hypercall handler may result in denial of service.
This only applies to Debian stable/jessie.
CVE-2015-4164
Andrew Cooper discovered a vulnerability in the iret hypercall handler,
which may result in denial of service.
For the oldstable distribution (wheezy), these problems have been fixed in version 4.1.4-3+deb7u8.
For the stable distribution (jessie), these problems have been fixed in version 4.4.1-9+deb8u1. CVE-2015-3209, CVE-2015-4103, CVE-2015-4104, CVE-2015-4105 and CVE-2015-4106 don't affect the Xen package in stable jessie, it uses the standard qemu package and has already been fixed in DSA-3284-1.
For the unstable distribution (sid), these problems will be fixed soon.
We recommend that you upgrade your xen packages. From: Yury German blueknight@gentoo.org To: gentoo-announce@lists.gentoo.org Message-ID: 57035F2D.8090108@gentoo.org Subject: [ GLSA 201604-03 ] Xen: Multiple vulnerabilities
Gentoo Linux Security Advisory GLSA 201604-03
https://security.gentoo.org/
Severity: Normal Title: Xen: Multiple vulnerabilities Date: April 05, 2016 Bugs: #445254, #513832, #547202, #549200, #549950, #550658, #553664, #553718, #555532, #556304, #561110, #564472, #564932, #566798, #566838, #566842, #567962, #571552, #571556, #574012 ID: 201604-03
Synopsis
Multiple vulnerabilities have been found in Xen, the worst of which cause a Denial of Service.
Background
Xen is a bare-metal hypervisor.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 app-emulation/xen < 4.6.0-r9 >= 4.6.0-r9 >= 4.5.2-r5 2 app-emulation/xen-pvgrub < 4.6.0 Vulnerable! 3 app-emulation/xen-tools < 4.6.0-r9 >= 4.6.0-r9 >= 4.5.2-r5 4 app-emulation/pvgrub >= 4.6.0 *>= 4.5.2 ------------------------------------------------------------------- NOTE: Certain packages are still vulnerable. Users should migrate to another package if one is available or wait for the existing packages to be marked stable by their architecture maintainers. ------------------------------------------------------------------- 4 affected packages
Description
Multiple vulnerabilities have been discovered in Xen. Please review the CVE identifiers referenced below for details.
Workaround
There is no known workaround at this time.
Resolution
All Xen 4.5 users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=app-emulation/xen-4.5.2-r5"
All Xen 4.6 users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=app-emulation/xen-4.6.0-r9"
All Xen tools 4.5 users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot -v ">=app-emulation/xen-tools-4.5.2-r5"
All Xen tools 4.6 users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot -v ">=app-emulation/xen-tools-4.6.0-r9"
All Xen pvgrub users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=app-emulation/xen-pvgrub-4.6.0"=
References
[ 1 ] CVE-2012-3494 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3494 [ 2 ] CVE-2012-3495 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3495 [ 3 ] CVE-2012-3496 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3496 [ 4 ] CVE-2012-3497 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3497 [ 5 ] CVE-2012-3498 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3498 [ 6 ] CVE-2012-3515 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3515 [ 7 ] CVE-2012-4411 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4411 [ 8 ] CVE-2012-4535 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4535 [ 9 ] CVE-2012-4536 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4536 [ 10 ] CVE-2012-4537 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4537 [ 11 ] CVE-2012-4538 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4538 [ 12 ] CVE-2012-4539 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4539 [ 13 ] CVE-2012-6030 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6030 [ 14 ] CVE-2012-6031 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6031 [ 15 ] CVE-2012-6032 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6032 [ 16 ] CVE-2012-6033 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6033 [ 17 ] CVE-2012-6034 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6034 [ 18 ] CVE-2012-6035 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6035 [ 19 ] CVE-2012-6036 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6036 [ 20 ] CVE-2015-2151 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2151 [ 21 ] CVE-2015-3209 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3209 [ 22 ] CVE-2015-3259 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3259 [ 23 ] CVE-2015-3340 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3340 [ 24 ] CVE-2015-3456 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3456 [ 25 ] CVE-2015-4103 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4103 [ 26 ] CVE-2015-4104 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4104 [ 27 ] CVE-2015-4105 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4105 [ 28 ] CVE-2015-4106 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4106 [ 29 ] CVE-2015-4163 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4163 [ 30 ] CVE-2015-4164 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4164 [ 31 ] CVE-2015-5154 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5154 [ 32 ] CVE-2015-7311 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7311 [ 33 ] CVE-2015-7504 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7504 [ 34 ] CVE-2015-7812 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7812 [ 35 ] CVE-2015-7813 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7813 [ 36 ] CVE-2015-7814 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7814 [ 37 ] CVE-2015-7835 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7835 [ 38 ] CVE-2015-7871 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7871 [ 39 ] CVE-2015-7969 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7969 [ 40 ] CVE-2015-7970 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7970 [ 41 ] CVE-2015-7971 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7971 [ 42 ] CVE-2015-7972 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7972 [ 43 ] CVE-2015-8339 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8339 [ 44 ] CVE-2015-8340 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8340 [ 45 ] CVE-2015-8341 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8341 [ 46 ] CVE-2015-8550 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8550 [ 47 ] CVE-2015-8551 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8551 [ 48 ] CVE-2015-8552 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8552 [ 49 ] CVE-2015-8554 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8554 [ 50 ] CVE-2015-8555 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8555 [ 51 ] CVE-2016-2270 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2270 [ 52 ] CVE-2016-2271 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2271
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
https://security.gentoo.org/glsa/201604-03
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2016 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
--roWGDR0oQEDLX1s6lNAQV7ISgI2Pjo8Pc . ============================================================================ Ubuntu Security Notice USN-2630-1 June 10, 2015
qemu, qemu-kvm vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 15.04
- Ubuntu 14.10
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
Summary:
Several security issues were fixed in QEMU.
Software Description: - qemu: Machine emulator and virtualizer - qemu-kvm: Machine emulator and virtualizer
Details:
Matt Tait discovered that QEMU incorrectly handled the virtual PCNET driver. In the default installation, when QEMU is used with libvirt, attackers would be isolated by the libvirt AppArmor profile. (CVE-2015-3209)
Kurt Seifried discovered that QEMU incorrectly handled certain temporary files. A local attacker could use this issue to cause a denial of service. (CVE-2015-4037)
Jan Beulich discovered that the QEMU Xen code incorrectly restricted write access to the host MSI message data field. A malicious guest could use this issue to cause a denial of service. This issue only applied to Ubuntu 14.04 LTS, Ubuntu 14.10 and Ubuntu 15.04. (CVE-2015-4103)
Jan Beulich discovered that the QEMU Xen code incorrectly restricted access to the PCI MSI mask bits. A malicious guest could use this issue to cause a denial of service. This issue only applied to Ubuntu 14.04 LTS, Ubuntu 14.10 and Ubuntu 15.04. (CVE-2015-4104)
Jan Beulich discovered that the QEMU Xen code incorrectly handled MSI-X error messages. A malicious guest could use this issue to cause a denial of service. This issue only applied to Ubuntu 14.04 LTS, Ubuntu 14.10 and Ubuntu 15.04. (CVE-2015-4105)
Jan Beulich discovered that the QEMU Xen code incorrectly restricted write access to the PCI config space. A malicious guest could use this issue to cause a denial of service, obtain sensitive information, or possibly execute arbitrary code. This issue only applied to Ubuntu 14.04 LTS, Ubuntu 14.10 and Ubuntu 15.04. (CVE-2015-4106)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 15.04: qemu-system 1:2.2+dfsg-5expubuntu9.2 qemu-system-aarch64 1:2.2+dfsg-5expubuntu9.2 qemu-system-arm 1:2.2+dfsg-5expubuntu9.2 qemu-system-mips 1:2.2+dfsg-5expubuntu9.2 qemu-system-misc 1:2.2+dfsg-5expubuntu9.2 qemu-system-ppc 1:2.2+dfsg-5expubuntu9.2 qemu-system-sparc 1:2.2+dfsg-5expubuntu9.2 qemu-system-x86 1:2.2+dfsg-5expubuntu9.2
Ubuntu 14.10: qemu-system 2.1+dfsg-4ubuntu6.7 qemu-system-aarch64 2.1+dfsg-4ubuntu6.7 qemu-system-arm 2.1+dfsg-4ubuntu6.7 qemu-system-mips 2.1+dfsg-4ubuntu6.7 qemu-system-misc 2.1+dfsg-4ubuntu6.7 qemu-system-ppc 2.1+dfsg-4ubuntu6.7 qemu-system-sparc 2.1+dfsg-4ubuntu6.7 qemu-system-x86 2.1+dfsg-4ubuntu6.7
Ubuntu 14.04 LTS: qemu-system 2.0.0+dfsg-2ubuntu1.13 qemu-system-aarch64 2.0.0+dfsg-2ubuntu1.13 qemu-system-arm 2.0.0+dfsg-2ubuntu1.13 qemu-system-mips 2.0.0+dfsg-2ubuntu1.13 qemu-system-misc 2.0.0+dfsg-2ubuntu1.13 qemu-system-ppc 2.0.0+dfsg-2ubuntu1.13 qemu-system-sparc 2.0.0+dfsg-2ubuntu1.13 qemu-system-x86 2.0.0+dfsg-2ubuntu1.13
Ubuntu 12.04 LTS: qemu-kvm 1.0+noroms-0ubuntu14.23
After a standard system update you need to restart all QEMU virtual machines to make all the necessary changes.
http://creativecommons.org/licenses/by-sa/2.5
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201506-0038", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "enterprise linux server", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "5.0" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "12.04" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.0" }, { "model": "junos space", "scope": "lte", "trust": 1.0, "vendor": "juniper", "version": "15.1" }, { "model": "qemu", "scope": "lte", "trust": 1.0, "vendor": "qemu", "version": "2.3.1" }, { "model": "enterprise linux server", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.0" }, { "model": "eos", "scope": "eq", "trust": 1.0, "vendor": "arista", "version": "4.14" }, { "model": "enterprise linux eus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.6" }, { "model": "fedora", "scope": "eq", "trust": 1.0, "vendor": "fedoraproject", "version": "21" }, { "model": "enterprise linux server tus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.6" }, { "model": "eos", "scope": "eq", "trust": 1.0, "vendor": "arista", "version": "4.15" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "14.10" }, { "model": "openstack", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "5.0" }, { "model": "fedora", "scope": "eq", "trust": 1.0, "vendor": "fedoraproject", "version": "20" }, { "model": "fedora", "scope": "eq", "trust": 1.0, "vendor": "fedoraproject", "version": "22" }, { "model": "linux enterprise debuginfo", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "11" }, { "model": "eos", "scope": "eq", "trust": 1.0, "vendor": "arista", "version": "4.13" }, { "model": "linux enterprise server", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "10" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "7.0" }, { "model": "linux enterprise desktop", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "12" }, { "model": "linux enterprise server", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "12" }, { "model": "virtualization", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "3.0" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.0" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "14.04" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.6" }, { "model": "linux enterprise software development kit", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "12" }, { "model": "linux enterprise server", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "11" }, { "model": "linux enterprise desktop", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "11" }, { "model": "linux enterprise software development kit", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "11" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "8.0" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "15.04" }, { "model": "eos", "scope": "eq", "trust": 1.0, "vendor": "arista", "version": "4.12" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "5.0" }, { "model": "xen", "scope": "eq", "trust": 0.6, "vendor": "xensource", "version": "4.2.x" }, { "model": "xen", "scope": "eq", "trust": 0.6, "vendor": "xensource", "version": "4.3.x" }, { "model": "xen", "scope": "eq", "trust": 0.6, "vendor": "xensource", "version": "4.4.x" }, { "model": "junos space", "scope": "eq", "trust": 0.6, "vendor": "juniper", "version": "15.1" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-03820" }, { "db": "CNNVD", "id": "CNNVD-201506-282" }, { "db": "NVD", "id": "CVE-2015-3209" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Red Hat", "sources": [ { "db": "PACKETSTORM", "id": "132447" }, { "db": "PACKETSTORM", "id": "132242" }, { "db": "PACKETSTORM", "id": "132241" } ], "trust": 0.3 }, "cve": "CVE-2015-3209", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2015-3209", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2015-03820", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-81170", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2015-3209", "trust": 1.0, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2015-03820", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201506-282", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-81170", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-03820" }, { "db": "VULHUB", "id": "VHN-81170" }, { "db": "CNNVD", "id": "CNNVD-201506-282" }, { "db": "NVD", "id": "CVE-2015-3209" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set. Xen is a virtualization technology for the Linux kernel that allows multiple operating systems to run simultaneously. QEMU (also known as Quick Emulator) is a set of analog processor software developed by French programmer Fabrice Bellard. The software has the characteristics of fast speed and cross-platform. 5 client) - x86_64\nRHEL Virtualization (v. 5 server) - x86_64\n\n3. Note: The procedure in\nthe Solution section must be performed before this update will take effect. \n\n2) Either reboot the hypervisor machine or, as the root user, remove (using\n\"modprobe -r [module]\") and reload (using \"modprobe [module]\") all of the\nfollowing modules which are currently running (determined using \"lsmod\"):\nkvm, ksm, kvm-intel or kvm-amd. 5 client):\n\nSource:\nkvm-83-273.el5_11.src.rpm\n\nx86_64:\nkmod-kvm-83-273.el5_11.x86_64.rpm\nkmod-kvm-debug-83-273.el5_11.x86_64.rpm\nkvm-83-273.el5_11.x86_64.rpm\nkvm-debuginfo-83-273.el5_11.x86_64.rpm\nkvm-qemu-img-83-273.el5_11.x86_64.rpm\nkvm-tools-83-273.el5_11.x86_64.rpm\n\nRHEL Virtualization (v. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Important: qemu-kvm security update\nAdvisory ID: RHSA-2015:1087-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://rhn.redhat.com/errata/RHSA-2015-1087.html\nIssue date: 2015-06-10\nCVE Names: CVE-2015-3209 \n=====================================================================\n\n1. Summary:\n\nUpdated qemu-kvm packages that fix one security issue are now available for\nRed Hat Enterprise Linux 6. \n\nRed Hat Product Security has rated this update as having Important security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Desktop (v. 6) - i386, x86_64\nRed Hat Enterprise Linux HPC Node (v. 6) - x86_64\nRed Hat Enterprise Linux Server (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Workstation (v. 6) - i386, x86_64\n\n3. Description:\n\nKVM (Kernel-based Virtual Machine) is a full virtualization solution for\nLinux on AMD64 and Intel 64 systems. The qemu-kvm package provides the\nuser-space component for running virtual machines using KVM. \n\nA flaw was found in the way QEMU\u0027s AMD PCnet Ethernet emulation handled\nmulti-TMD packets with a length above 4096 bytes. (CVE-2015-3209)\n\nRed Hat would like to thank Matt Tait of Google\u0027s Project Zero security\nteam for reporting this issue. \n\nAll qemu-kvm users are advised to upgrade to these updated packages, which\ncontain a backported patch to correct this issue. After installing this\nupdate, shut down all running virtual machines. Once all virtual machines\nhave shut down, start them again for this update to take effect. \n\n4. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1225882 - CVE-2015-3209 qemu: pcnet: multi-tmd buffer overflow in the tx path\n\n6. Package List:\n\nRed Hat Enterprise Linux Desktop (v. 6):\n\nSource:\nqemu-kvm-0.12.1.2-2.448.el6_6.4.src.rpm\n\ni386:\nqemu-guest-agent-0.12.1.2-2.448.el6_6.4.i686.rpm\nqemu-kvm-debuginfo-0.12.1.2-2.448.el6_6.4.i686.rpm\n\nx86_64:\nqemu-guest-agent-0.12.1.2-2.448.el6_6.4.x86_64.rpm\nqemu-img-0.12.1.2-2.448.el6_6.4.x86_64.rpm\nqemu-kvm-0.12.1.2-2.448.el6_6.4.x86_64.rpm\nqemu-kvm-debuginfo-0.12.1.2-2.448.el6_6.4.x86_64.rpm\nqemu-kvm-tools-0.12.1.2-2.448.el6_6.4.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node (v. 6):\n\nSource:\nqemu-kvm-0.12.1.2-2.448.el6_6.4.src.rpm\n\nx86_64:\nqemu-guest-agent-0.12.1.2-2.448.el6_6.4.x86_64.rpm\nqemu-img-0.12.1.2-2.448.el6_6.4.x86_64.rpm\nqemu-kvm-0.12.1.2-2.448.el6_6.4.x86_64.rpm\nqemu-kvm-debuginfo-0.12.1.2-2.448.el6_6.4.x86_64.rpm\nqemu-kvm-tools-0.12.1.2-2.448.el6_6.4.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 6):\n\nSource:\nqemu-kvm-0.12.1.2-2.448.el6_6.4.src.rpm\n\ni386:\nqemu-guest-agent-0.12.1.2-2.448.el6_6.4.i686.rpm\nqemu-kvm-debuginfo-0.12.1.2-2.448.el6_6.4.i686.rpm\n\nx86_64:\nqemu-guest-agent-0.12.1.2-2.448.el6_6.4.x86_64.rpm\nqemu-img-0.12.1.2-2.448.el6_6.4.x86_64.rpm\nqemu-kvm-0.12.1.2-2.448.el6_6.4.x86_64.rpm\nqemu-kvm-debuginfo-0.12.1.2-2.448.el6_6.4.x86_64.rpm\nqemu-kvm-tools-0.12.1.2-2.448.el6_6.4.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 6):\n\nSource:\nqemu-kvm-0.12.1.2-2.448.el6_6.4.src.rpm\n\ni386:\nqemu-guest-agent-0.12.1.2-2.448.el6_6.4.i686.rpm\nqemu-kvm-debuginfo-0.12.1.2-2.448.el6_6.4.i686.rpm\n\nx86_64:\nqemu-guest-agent-0.12.1.2-2.448.el6_6.4.x86_64.rpm\nqemu-img-0.12.1.2-2.448.el6_6.4.x86_64.rpm\nqemu-kvm-0.12.1.2-2.448.el6_6.4.x86_64.rpm\nqemu-kvm-debuginfo-0.12.1.2-2.448.el6_6.4.x86_64.rpm\nqemu-kvm-tools-0.12.1.2-2.448.el6_6.4.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2015-3209\nhttps://access.redhat.com/security/updates/classification/#important\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2015 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niD8DBQFVeHRmXlSAg2UNWIIRAkq5AKCeYGr9MG7Kdic1FVJZw2avAhO6eACdFG0W\nVCkW3jIuuaxOqeYM0s8u6ss=\n=+WsT\n-----END PGP SIGNATURE-----\n\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. \n\nCVE-2015-4037\n\n Kurt Seifried of Red Hat Product Security discovered that QEMU\u0027s\n user mode networking stack uses predictable temporary file names\n when the -smb option is used. \n\nCVE-2015-4163\n\n Jan Beulich discovered that a missing version check in the\n GNTTABOP_swap_grant_ref hypercall handler may result in denial of service. \n This only applies to Debian stable/jessie. \n\nCVE-2015-4164\n\n Andrew Cooper discovered a vulnerability in the iret hypercall handler,\n which may result in denial of service. \n\nFor the oldstable distribution (wheezy), these problems have been fixed\nin version 4.1.4-3+deb7u8. \n\nFor the stable distribution (jessie), these problems have been fixed in\nversion 4.4.1-9+deb8u1. CVE-2015-3209, CVE-2015-4103, CVE-2015-4104,\nCVE-2015-4105 and CVE-2015-4106 don\u0027t affect the Xen package in stable\njessie, it uses the standard qemu package and has already been fixed in\nDSA-3284-1. \n\nFor the unstable distribution (sid), these problems will be fixed soon. \n\nWe recommend that you upgrade your xen packages. From: Yury German \u003cblueknight@gentoo.org\u003e\nTo: gentoo-announce@lists.gentoo.org\nMessage-ID: \u003c57035F2D.8090108@gentoo.org\u003e\nSubject: [ GLSA 201604-03 ] Xen: Multiple vulnerabilities\n\n\n\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201604-03\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n https://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: Xen: Multiple vulnerabilities\n Date: April 05, 2016\n Bugs: #445254, #513832, #547202, #549200, #549950, #550658,\n #553664, #553718, #555532, #556304, #561110, #564472,\n #564932, #566798, #566838, #566842, #567962, #571552,\n #571556, #574012\n ID: 201604-03\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in Xen, the worst of which\ncause a Denial of Service. \n\nBackground\n==========\n\nXen is a bare-metal hypervisor. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 app-emulation/xen \u003c 4.6.0-r9 \u003e= 4.6.0-r9\n *\u003e= 4.5.2-r5\n 2 app-emulation/xen-pvgrub\n \u003c 4.6.0 Vulnerable!\n 3 app-emulation/xen-tools \u003c 4.6.0-r9 \u003e= 4.6.0-r9\n *\u003e= 4.5.2-r5\n 4 app-emulation/pvgrub \u003e= 4.6.0\n *\u003e= 4.5.2\n -------------------------------------------------------------------\n NOTE: Certain packages are still vulnerable. Users should migrate\n to another package if one is available or wait for the\n existing packages to be marked stable by their\n architecture maintainers. \n -------------------------------------------------------------------\n 4 affected packages\n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in Xen. Please review the\nCVE identifiers referenced below for details. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Xen 4.5 users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=app-emulation/xen-4.5.2-r5\"\n\nAll Xen 4.6 users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=app-emulation/xen-4.6.0-r9\"\n\nAll Xen tools 4.5 users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot -v \"\u003e=app-emulation/xen-tools-4.5.2-r5\"\n\nAll Xen tools 4.6 users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot -v \"\u003e=app-emulation/xen-tools-4.6.0-r9\"\n\nAll Xen pvgrub users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=app-emulation/xen-pvgrub-4.6.0\"=\n\n\nReferences\n==========\n\n[ 1 ] CVE-2012-3494\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3494\n[ 2 ] CVE-2012-3495\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3495\n[ 3 ] CVE-2012-3496\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3496\n[ 4 ] CVE-2012-3497\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3497\n[ 5 ] CVE-2012-3498\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3498\n[ 6 ] CVE-2012-3515\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3515\n[ 7 ] CVE-2012-4411\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4411\n[ 8 ] CVE-2012-4535\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4535\n[ 9 ] CVE-2012-4536\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4536\n[ 10 ] CVE-2012-4537\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4537\n[ 11 ] CVE-2012-4538\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4538\n[ 12 ] CVE-2012-4539\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4539\n[ 13 ] CVE-2012-6030\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6030\n[ 14 ] CVE-2012-6031\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6031\n[ 15 ] CVE-2012-6032\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6032\n[ 16 ] CVE-2012-6033\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6033\n[ 17 ] CVE-2012-6034\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6034\n[ 18 ] CVE-2012-6035\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6035\n[ 19 ] CVE-2012-6036\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6036\n[ 20 ] CVE-2015-2151\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2151\n[ 21 ] CVE-2015-3209\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3209\n[ 22 ] CVE-2015-3259\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3259\n[ 23 ] CVE-2015-3340\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3340\n[ 24 ] CVE-2015-3456\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3456\n[ 25 ] CVE-2015-4103\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4103\n[ 26 ] CVE-2015-4104\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4104\n[ 27 ] CVE-2015-4105\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4105\n[ 28 ] CVE-2015-4106\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4106\n[ 29 ] CVE-2015-4163\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4163\n[ 30 ] CVE-2015-4164\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4164\n[ 31 ] CVE-2015-5154\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5154\n[ 32 ] CVE-2015-7311\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7311\n[ 33 ] CVE-2015-7504\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7504\n[ 34 ] CVE-2015-7812\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7812\n[ 35 ] CVE-2015-7813\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7813\n[ 36 ] CVE-2015-7814\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7814\n[ 37 ] CVE-2015-7835\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7835\n[ 38 ] CVE-2015-7871\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7871\n[ 39 ] CVE-2015-7969\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7969\n[ 40 ] CVE-2015-7970\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7970\n[ 41 ] CVE-2015-7971\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7971\n[ 42 ] CVE-2015-7972\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7972\n[ 43 ] CVE-2015-8339\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8339\n[ 44 ] CVE-2015-8340\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8340\n[ 45 ] CVE-2015-8341\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8341\n[ 46 ] CVE-2015-8550\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8550\n[ 47 ] CVE-2015-8551\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8551\n[ 48 ] CVE-2015-8552\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8552\n[ 49 ] CVE-2015-8554\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8554\n[ 50 ] CVE-2015-8555\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8555\n[ 51 ] CVE-2016-2270\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2270\n[ 52 ] CVE-2016-2271\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2271\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n https://security.gentoo.org/glsa/201604-03\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2016 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n\n\n\n--roWGDR0oQEDLX1s6lNAQV7ISgI2Pjo8Pc\n. ============================================================================\nUbuntu Security Notice USN-2630-1\nJune 10, 2015\n\nqemu, qemu-kvm vulnerabilities\n============================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 15.04\n- Ubuntu 14.10\n- Ubuntu 14.04 LTS\n- Ubuntu 12.04 LTS\n\nSummary:\n\nSeveral security issues were fixed in QEMU. \n\nSoftware Description:\n- qemu: Machine emulator and virtualizer\n- qemu-kvm: Machine emulator and virtualizer\n\nDetails:\n\nMatt Tait discovered that QEMU incorrectly handled the virtual PCNET\ndriver. In the default installation, when QEMU is used with\nlibvirt, attackers would be isolated by the libvirt AppArmor profile. \n(CVE-2015-3209)\n\nKurt Seifried discovered that QEMU incorrectly handled certain temporary\nfiles. A local attacker could use this issue to cause a denial of service. \n(CVE-2015-4037)\n\nJan Beulich discovered that the QEMU Xen code incorrectly restricted write\naccess to the host MSI message data field. A malicious guest could use this\nissue to cause a denial of service. This issue only applied to Ubuntu 14.04\nLTS, Ubuntu 14.10 and Ubuntu 15.04. (CVE-2015-4103)\n\nJan Beulich discovered that the QEMU Xen code incorrectly restricted access\nto the PCI MSI mask bits. A malicious guest could use this issue to cause a\ndenial of service. This issue only applied to Ubuntu 14.04 LTS, Ubuntu\n14.10 and Ubuntu 15.04. (CVE-2015-4104)\n\nJan Beulich discovered that the QEMU Xen code incorrectly handled MSI-X\nerror messages. A malicious guest could use this issue to cause a denial of\nservice. This issue only applied to Ubuntu 14.04 LTS, Ubuntu 14.10 and\nUbuntu 15.04. (CVE-2015-4105)\n\nJan Beulich discovered that the QEMU Xen code incorrectly restricted write\naccess to the PCI config space. A malicious guest could use this issue to\ncause a denial of service, obtain sensitive information, or possibly\nexecute arbitrary code. This issue only applied to Ubuntu 14.04 LTS,\nUbuntu 14.10 and Ubuntu 15.04. (CVE-2015-4106)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 15.04:\n qemu-system 1:2.2+dfsg-5expubuntu9.2\n qemu-system-aarch64 1:2.2+dfsg-5expubuntu9.2\n qemu-system-arm 1:2.2+dfsg-5expubuntu9.2\n qemu-system-mips 1:2.2+dfsg-5expubuntu9.2\n qemu-system-misc 1:2.2+dfsg-5expubuntu9.2\n qemu-system-ppc 1:2.2+dfsg-5expubuntu9.2\n qemu-system-sparc 1:2.2+dfsg-5expubuntu9.2\n qemu-system-x86 1:2.2+dfsg-5expubuntu9.2\n\nUbuntu 14.10:\n qemu-system 2.1+dfsg-4ubuntu6.7\n qemu-system-aarch64 2.1+dfsg-4ubuntu6.7\n qemu-system-arm 2.1+dfsg-4ubuntu6.7\n qemu-system-mips 2.1+dfsg-4ubuntu6.7\n qemu-system-misc 2.1+dfsg-4ubuntu6.7\n qemu-system-ppc 2.1+dfsg-4ubuntu6.7\n qemu-system-sparc 2.1+dfsg-4ubuntu6.7\n qemu-system-x86 2.1+dfsg-4ubuntu6.7\n\nUbuntu 14.04 LTS:\n qemu-system 2.0.0+dfsg-2ubuntu1.13\n qemu-system-aarch64 2.0.0+dfsg-2ubuntu1.13\n qemu-system-arm 2.0.0+dfsg-2ubuntu1.13\n qemu-system-mips 2.0.0+dfsg-2ubuntu1.13\n qemu-system-misc 2.0.0+dfsg-2ubuntu1.13\n qemu-system-ppc 2.0.0+dfsg-2ubuntu1.13\n qemu-system-sparc 2.0.0+dfsg-2ubuntu1.13\n qemu-system-x86 2.0.0+dfsg-2ubuntu1.13\n\nUbuntu 12.04 LTS:\n qemu-kvm 1.0+noroms-0ubuntu14.23\n\nAfter a standard system update you need to restart all QEMU virtual\nmachines to make all the necessary changes. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n", "sources": [ { "db": "NVD", "id": "CVE-2015-3209" }, { "db": "CNVD", "id": "CNVD-2015-03820" }, { "db": "VULHUB", "id": "VHN-81170" }, { "db": "PACKETSTORM", "id": "132447" }, { "db": "PACKETSTORM", "id": "132242" }, { "db": "PACKETSTORM", "id": "132289" }, { "db": "PACKETSTORM", "id": "132290" }, { "db": "PACKETSTORM", "id": "136587" }, { "db": "PACKETSTORM", "id": "132241" }, { "db": "PACKETSTORM", "id": "132251" }, { "db": "PACKETSTORM", "id": "134165" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2015-3209", "trust": 3.1 }, { "db": "BID", "id": "75123", "trust": 2.3 }, { "db": "SECTRACK", "id": "1032545", "trust": 1.7 }, { "db": "JUNIPER", "id": "JSA10783", "trust": 1.7 }, { "db": "JUNIPER", "id": "JSA10698", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-201506-282", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2015-03820", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "132290", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "134165", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "132289", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "132447", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "132242", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "132241", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "132251", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "132240", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-81170", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "136587", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-03820" }, { "db": "VULHUB", "id": "VHN-81170" }, { "db": "PACKETSTORM", "id": "132447" }, { "db": "PACKETSTORM", "id": "132242" }, { "db": "PACKETSTORM", "id": "132289" }, { "db": "PACKETSTORM", "id": "132290" }, { "db": "PACKETSTORM", "id": "136587" }, { "db": "PACKETSTORM", "id": "132241" }, { "db": "PACKETSTORM", "id": "132251" }, { "db": "PACKETSTORM", "id": "134165" }, { "db": "CNNVD", "id": "CNNVD-201506-282" }, { "db": "NVD", "id": "CVE-2015-3209" } ] }, "id": "VAR-201506-0038", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2015-03820" }, { "db": "VULHUB", "id": "VHN-81170" } ], "trust": 0.06999999999999999 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-03820" } ] }, "last_update_date": "2024-11-29T21:58:46.854000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Xen QEMU PCNET Controller Heap Overflow Vulnerability Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/59683" }, { "title": "xsa135-qemut-1", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=56387" }, { "title": "xsa135-qemuu-4.2-2", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=56391" }, { "title": "xsa135-qemuu-4.5-2", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=56395" }, { "title": "xsa135-qemuu-4.2-1", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=56390" }, { "title": "xsa135-qemuu-4.5-1", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=56394" }, { "title": "xsa135-qemuu-unstable", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=56389" }, { "title": "xsa135-qemuu-4.3-2", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=56393" }, { "title": "xsa135-qemut-2", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=56388" }, { "title": "xsa135-qemuu-4.3-1", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=56392" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-03820" }, { "db": "CNNVD", "id": "CNNVD-201506-282" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "CWE-119", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-81170" }, { "db": "NVD", "id": "CVE-2015-3209" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "http://xenbits.xen.org/xsa/advisory-135.html" }, { "trust": 1.8, "url": "https://security.gentoo.org/glsa/201510-02" }, { "trust": 1.8, "url": "https://security.gentoo.org/glsa/201604-03" }, { "trust": 1.8, "url": "http://rhn.redhat.com/errata/rhsa-2015-1087.html" }, { "trust": 1.8, "url": "http://rhn.redhat.com/errata/rhsa-2015-1089.html" }, { "trust": 1.8, "url": "http://rhn.redhat.com/errata/rhsa-2015-1189.html" }, { "trust": 1.8, "url": "http://www.ubuntu.com/usn/usn-2630-1" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id/1032545" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/75123" }, { "trust": 1.7, "url": "http://www.debian.org/security/2015/dsa-3284" }, { "trust": 1.7, "url": "http://www.debian.org/security/2015/dsa-3285" }, { "trust": 1.7, "url": "http://www.debian.org/security/2015/dsa-3286" }, { "trust": 1.7, "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-june/160669.html" }, { "trust": 1.7, "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-june/160685.html" }, { "trust": 1.7, "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-june/160677.html" }, { "trust": 1.7, "url": "http://rhn.redhat.com/errata/rhsa-2015-1088.html" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00027.html" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00029.html" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00014.html" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00020.html" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00015.html" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00027.html" }, { "trust": 1.7, "url": "https://kb.juniper.net/jsa10783" }, { "trust": 1.7, "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1180-security-advisory-13" }, { "trust": 1.6, "url": "http://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10698" }, { "trust": 0.9, "url": "https://access.redhat.com/security/cve/cve-2015-3209" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3209" }, { "trust": 0.6, "url": "https://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-3209" }, { "trust": 0.6, "url": "https://access.redhat.com/errata/rhsa-2015:1189" }, { "trust": 0.6, "url": "https://access.redhat.com/errata/rhsa-2015:1088" }, { "trust": 0.6, "url": "https://access.redhat.com/errata/rhsa-2015:1089" }, { "trust": 0.6, "url": "https://access.redhat.com/errata/rhsa-2015:1087" }, { "trust": 0.6, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1225882" }, { "trust": 0.3, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.3, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.3, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.3, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.3, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.3, "url": "https://access.redhat.com/security/updates/classification/#important" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4105" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4103" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4106" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4104" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4037" }, { "trust": 0.2, "url": "https://www.debian.org/security/" }, { "trust": 0.2, "url": "https://www.debian.org/security/faq" }, { "trust": 0.2, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5154" }, { "trust": 0.2, "url": "https://security.gentoo.org/" }, { "trust": 0.2, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.2, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-3209" }, { "trust": 0.2, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "http://kb.juniper.net/infocenter/index?page=content\u0026amp;id=jsa10698" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4164" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4163" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4536" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7504" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-4535" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4105" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4535" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-6030" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7835" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-8551" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4538" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-8552" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-6036" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-6036" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7814" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4106" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7970" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-8550" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3456" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3497" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-4536" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3495" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-6031" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-4537" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-6034" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3259" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-3340" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2151" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-4411" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7972" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-4538" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-6035" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3495" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4539" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3494" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7871" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-6033" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-6032" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4537" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-6035" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-6032" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7813" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3515" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7971" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3498" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-2270" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-6031" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-6030" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3498" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3497" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3494" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-8555" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4163" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-8340" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7311" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-3259" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2151" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-8339" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-6033" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-8554" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4411" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-6034" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-8341" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-4539" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3340" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4164" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3515" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4103" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3496" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-3456" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7969" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4104" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3496" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-2271" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7812" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/qemu/2.1+dfsg-4ubuntu6.7" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/qemu-kvm/1.0+noroms-0ubuntu14.23" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/qemu/2.0.0+dfsg-2ubuntu1.13" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/qemu/1:2.2+dfsg-5expubuntu9.2" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-3214" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-5154" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3214" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5158" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-5158" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-03820" }, { "db": "VULHUB", "id": "VHN-81170" }, { "db": "PACKETSTORM", "id": "132447" }, { "db": "PACKETSTORM", "id": "132242" }, { "db": "PACKETSTORM", "id": "132289" }, { "db": "PACKETSTORM", "id": "132290" }, { "db": "PACKETSTORM", "id": "136587" }, { "db": "PACKETSTORM", "id": "132241" }, { "db": "PACKETSTORM", "id": "132251" }, { "db": "PACKETSTORM", "id": "134165" }, { "db": "CNNVD", "id": "CNNVD-201506-282" }, { "db": "NVD", "id": "CVE-2015-3209" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2015-03820" }, { "db": "VULHUB", "id": "VHN-81170" }, { "db": "PACKETSTORM", "id": "132447" }, { "db": "PACKETSTORM", "id": "132242" }, { "db": "PACKETSTORM", "id": "132289" }, { "db": "PACKETSTORM", "id": "132290" }, { "db": "PACKETSTORM", "id": "136587" }, { "db": "PACKETSTORM", "id": "132241" }, { "db": "PACKETSTORM", "id": "132251" }, { "db": "PACKETSTORM", "id": "134165" }, { "db": "CNNVD", "id": "CNNVD-201506-282" }, { "db": "NVD", "id": "CVE-2015-3209" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-06-17T00:00:00", "db": "CNVD", "id": "CNVD-2015-03820" }, { "date": "2015-06-15T00:00:00", "db": "VULHUB", "id": "VHN-81170" }, { "date": "2015-06-25T14:19:06", "db": "PACKETSTORM", "id": "132447" }, { "date": "2015-06-10T23:39:22", "db": "PACKETSTORM", "id": "132242" }, { "date": "2015-06-15T15:43:00", "db": "PACKETSTORM", "id": "132289" }, { "date": "2015-06-15T15:43:07", "db": "PACKETSTORM", "id": "132290" }, { "date": "2016-04-06T13:30:13", "db": "PACKETSTORM", "id": "136587" }, { "date": "2015-06-10T23:39:14", "db": "PACKETSTORM", "id": "132241" }, { "date": "2015-06-10T23:41:07", "db": "PACKETSTORM", "id": "132251" }, { "date": "2015-11-02T16:49:11", "db": "PACKETSTORM", "id": "134165" }, { "date": "2015-06-16T00:00:00", "db": "CNNVD", "id": "CNNVD-201506-282" }, { "date": "2015-06-15T15:59:00.070000", "db": "NVD", "id": "CVE-2015-3209" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-06-17T00:00:00", "db": "CNVD", "id": "CNVD-2015-03820" }, { "date": "2023-02-13T00:00:00", "db": "VULHUB", "id": "VHN-81170" }, { "date": "2023-04-10T00:00:00", "db": "CNNVD", "id": "CNNVD-201506-282" }, { "date": "2024-11-21T02:28:54.573000", "db": "NVD", "id": "CVE-2015-3209" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201506-282" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Xen QEMU PCNET Controller Heap Overflow Vulnerability", "sources": [ { "db": "CNVD", "id": "CNVD-2015-03820" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201506-282" } ], "trust": 0.6 } }
gsd-2015-3209
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2015-3209", "description": "Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.", "id": "GSD-2015-3209", "references": [ "https://www.suse.com/security/cve/CVE-2015-3209.html", "https://www.debian.org/security/2015/dsa-3286", "https://www.debian.org/security/2015/dsa-3285", "https://www.debian.org/security/2015/dsa-3284", "https://access.redhat.com/errata/RHSA-2015:1189", "https://access.redhat.com/errata/RHSA-2015:1089", "https://access.redhat.com/errata/RHSA-2015:1088", "https://access.redhat.com/errata/RHSA-2015:1087", "https://ubuntu.com/security/CVE-2015-3209", "https://advisories.mageia.org/CVE-2015-3209.html", "https://linux.oracle.com/cve/CVE-2015-3209.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2015-3209" ], "details": "Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.", "id": "GSD-2015-3209", "modified": "2023-12-13T01:20:07.384150Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-3209", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_affected": "=", "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://security.gentoo.org/glsa/201604-03", "refsource": "MISC", "url": "https://security.gentoo.org/glsa/201604-03" }, { "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10698", "refsource": "MISC", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10698" }, { "name": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160669.html", "refsource": "MISC", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160669.html" }, { "name": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160677.html", "refsource": "MISC", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160677.html" }, { "name": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160685.html", "refsource": "MISC", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160685.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00027.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00027.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00029.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00029.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00014.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00014.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00020.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00020.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00015.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00015.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00027.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00027.html" }, { "name": "http://rhn.redhat.com/errata/RHSA-2015-1087.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2015-1087.html" }, { "name": "http://rhn.redhat.com/errata/RHSA-2015-1088.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2015-1088.html" }, { "name": "http://rhn.redhat.com/errata/RHSA-2015-1089.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2015-1089.html" }, { "name": "http://rhn.redhat.com/errata/RHSA-2015-1189.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2015-1189.html" }, { "name": "http://www.debian.org/security/2015/dsa-3284", "refsource": "MISC", "url": "http://www.debian.org/security/2015/dsa-3284" }, { "name": "http://www.debian.org/security/2015/dsa-3285", "refsource": "MISC", "url": "http://www.debian.org/security/2015/dsa-3285" }, { "name": "http://www.debian.org/security/2015/dsa-3286", "refsource": "MISC", "url": "http://www.debian.org/security/2015/dsa-3286" }, { "name": "http://www.securityfocus.com/bid/75123", "refsource": "MISC", "url": "http://www.securityfocus.com/bid/75123" }, { "name": "http://www.securitytracker.com/id/1032545", "refsource": "MISC", "url": "http://www.securitytracker.com/id/1032545" }, { "name": "http://www.ubuntu.com/usn/USN-2630-1", "refsource": "MISC", "url": "http://www.ubuntu.com/usn/USN-2630-1" }, { "name": "http://xenbits.xen.org/xsa/advisory-135.html", "refsource": "MISC", "url": "http://xenbits.xen.org/xsa/advisory-135.html" }, { "name": "https://kb.juniper.net/JSA10783", "refsource": "MISC", "url": "https://kb.juniper.net/JSA10783" }, { "name": "https://security.gentoo.org/glsa/201510-02", "refsource": "MISC", "url": "https://security.gentoo.org/glsa/201510-02" }, { "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1180-security-advisory-13", "refsource": "MISC", "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1180-security-advisory-13" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.3.1", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:juniper:junos_space:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "15.1", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:6.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:arista:eos:4.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:arista:eos:4.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:arista:eos:4.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:arista:eos:4.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-3209" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-787" } ] } ] }, "references": { "reference_data": [ { "name": "http://xenbits.xen.org/xsa/advisory-135.html", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://xenbits.xen.org/xsa/advisory-135.html" }, { "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10698", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10698" }, { "name": "GLSA-201510-02", "refsource": "GENTOO", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201510-02" }, { "name": "75123", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/75123" }, { "name": "USN-2630-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2630-1" }, { "name": "SUSE-SU-2015:1643", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00027.html" }, { "name": "SUSE-SU-2015:1519", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00015.html" }, { "name": "SUSE-SU-2015:1426", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00020.html" }, { "name": "SUSE-SU-2015:1152", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00027.html" }, { "name": "SUSE-SU-2015:1206", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00014.html" }, { "name": "FEDORA-2015-9965", "refsource": "FEDORA", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160685.html" }, { "name": "FEDORA-2015-9978", "refsource": "FEDORA", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160677.html" }, { "name": "FEDORA-2015-10001", "refsource": "FEDORA", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160669.html" }, { "name": "1032545", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1032545" }, { "name": "DSA-3286", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2015/dsa-3286" }, { "name": "RHSA-2015:1089", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1089.html" }, { "name": "RHSA-2015:1088", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1088.html" }, { "name": "RHSA-2015:1087", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1087.html" }, { "name": "SUSE-SU-2015:1157", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html" }, { "name": "SUSE-SU-2015:1156", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00029.html" }, { "name": "SUSE-SU-2015:1045", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html" }, { "name": "SUSE-SU-2015:1042", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html" }, { "name": "https://kb.juniper.net/JSA10783", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://kb.juniper.net/JSA10783" }, { "name": "GLSA-201604-03", "refsource": "GENTOO", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201604-03" }, { "name": "DSA-3285", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2015/dsa-3285" }, { "name": "DSA-3284", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2015/dsa-3284" }, { "name": "RHSA-2015:1189", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1189.html" }, { "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1180-security-advisory-13", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1180-security-advisory-13" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false } }, "lastModifiedDate": "2023-02-13T00:48Z", "publishedDate": "2015-06-15T15:59Z" } } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.