Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2015-3209 (GCVE-0-2015-3209)
Vulnerability from cvelistv5
Published
2015-06-15 15:00
Modified
2024-08-06 05:39
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:39:31.977Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-2630-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2630-1" }, { "name": "SUSE-SU-2015:1152", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00027.html" }, { "name": "RHSA-2015:1087", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1087.html" }, { "name": "SUSE-SU-2015:1519", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00015.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kb.juniper.net/JSA10783" }, { "name": "FEDORA-2015-10001", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160669.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10698" }, { "name": "DSA-3286", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3286" }, { "name": "FEDORA-2015-9978", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160677.html" }, { "name": "SUSE-SU-2015:1156", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00029.html" }, { "name": "RHSA-2015:1088", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1088.html" }, { "name": "RHSA-2015:1089", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1089.html" }, { "name": "SUSE-SU-2015:1643", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00027.html" }, { "name": "GLSA-201510-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201510-02" }, { "name": "SUSE-SU-2015:1206", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00014.html" }, { "name": "DSA-3284", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3284" }, { "name": "75123", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/75123" }, { "name": "SUSE-SU-2015:1157", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html" }, { "name": "1032545", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1032545" }, { "name": "SUSE-SU-2015:1045", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://xenbits.xen.org/xsa/advisory-135.html" }, { "name": "SUSE-SU-2015:1426", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00020.html" }, { "name": "GLSA-201604-03", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201604-03" }, { "name": "RHSA-2015:1189", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1189.html" }, { "name": "SUSE-SU-2015:1042", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html" }, { "name": "FEDORA-2015-9965", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160685.html" }, { "name": "DSA-3285", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3285" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1180-security-advisory-13" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-06-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-26T13:58:46", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "USN-2630-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2630-1" }, { "name": "SUSE-SU-2015:1152", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00027.html" }, { "name": "RHSA-2015:1087", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1087.html" }, { "name": "SUSE-SU-2015:1519", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00015.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kb.juniper.net/JSA10783" }, { "name": "FEDORA-2015-10001", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160669.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10698" }, { "name": "DSA-3286", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2015/dsa-3286" }, { "name": "FEDORA-2015-9978", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160677.html" }, { "name": "SUSE-SU-2015:1156", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00029.html" }, { "name": "RHSA-2015:1088", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1088.html" }, { "name": "RHSA-2015:1089", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1089.html" }, { "name": "SUSE-SU-2015:1643", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00027.html" }, { "name": "GLSA-201510-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201510-02" }, { "name": "SUSE-SU-2015:1206", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00014.html" }, { "name": "DSA-3284", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2015/dsa-3284" }, { "name": "75123", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/75123" }, { "name": "SUSE-SU-2015:1157", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html" }, { "name": "1032545", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1032545" }, { "name": "SUSE-SU-2015:1045", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://xenbits.xen.org/xsa/advisory-135.html" }, { "name": "SUSE-SU-2015:1426", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00020.html" }, { "name": "GLSA-201604-03", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201604-03" }, { "name": "RHSA-2015:1189", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1189.html" }, { "name": "SUSE-SU-2015:1042", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html" }, { "name": "FEDORA-2015-9965", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160685.html" }, { "name": "DSA-3285", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2015/dsa-3285" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1180-security-advisory-13" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2015-3209", "datePublished": "2015-06-15T15:00:00", "dateReserved": "2015-04-10T00:00:00", "dateUpdated": "2024-08-06T05:39:31.977Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2015-3209\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2015-06-15T15:59:00.070\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.\"},{\"lang\":\"es\",\"value\":\"Desbordamiento de buffer basado en memoria din\u00e1mica en el controlador PCNET en QEMU permite a atacantes remotos ejecutar c\u00f3digo arbitrario mediante el env\u00edo de un paquete con el juego TXSTATUS_STARTPACKET y posteriormente un paquete manipulado con el juego TXSTATUS_DEVICEOWNS.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.3.1\",\"matchCriteriaId\":\"19E6775C-BA58-4D7E-96AB-9283C99D9641\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:juniper:junos_space:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"15.1\",\"matchCriteriaId\":\"6133CA80-A291-487F-AE06-85D4AA154727\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*\",\"matchCriteriaId\":\"8D305F7A-D159-4716-AB26-5E38BB5CD991\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*\",\"matchCriteriaId\":\"815D70A8-47D3-459C-A32C-9FEACA0659D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49A63F39-30BE-443F-AF10-6245587D3359\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F38D3B7E-8429-473F-BB31-FC3583EE5A5B\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16F59A04-14CF-49E2-9973-645477EA09DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"319EC0C6-94C5-494A-9C5D-DC5124DFC8E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54D669D4-6D7E-449D-80C1-28FA44F06FFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BBCD86A-E6C7-4444-9D74-F861084090F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16E6D998-B41D-4B49-9E00-8336D2E40A4A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13E02156-E748-4820-B76F-7074793837E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0AC5CD5-6E58-433C-9EB3-6DFE5656463E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5ED5807-55B7-47C5-97A6-03233F4FBC3A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B152EDF3-3140-4343-802F-F4F1C329F5C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D86166F9-BBF0-4650-8CCD-0F9C97104D21\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF47C9F0-D8DA-4B55-89EB-9B2C9383ADB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56BDB5A0-0839-4A20-A003-B8CD56F48171\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"253C303A-E577-4488-93E6-68A8DD942C38\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5900A25-FDD7-4900-BF7C-F3ECCB714D2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*\",\"matchCriteriaId\":\"3ED68ADD-BBDA-4485-BC76-58F011D72311\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2DF4815-B8CB-4AD3-B91D-2E09A8E318E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*\",\"matchCriteriaId\":\"35BBD83D-BDC7-4678-BE94-639F59281139\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:*:*:*\",\"matchCriteriaId\":\"67960FB9-13D1-4DEE-8158-31BF31BCBE6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*\",\"matchCriteriaId\":\"CB6476C7-03F2-4939-AB85-69AA524516D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*\",\"matchCriteriaId\":\"E534C201-BCC5-473C-AAA7-AAB97CEB5437\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"15FC9014-BD85-4382-9D04-C0703E901D7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F7F8866-DEAD-44D1-AB10-21EE611AA026\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"1831D45A-EE6E-4220-8F8C-248B69520948\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:4.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDDF9823-D999-41A4-BB7B-A63C00ACE11B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:4.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51F7426A-46F7-4BE0-806F-F4598C8B0426\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:4.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7F71EBA-27AC-464B-8708-4E8971BC75A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:4.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8705CF80-DEFC-4425-8E23-D98FFD678157\"}]}]}],\"references\":[{\"url\":\"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10698\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160669.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160677.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160685.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00027.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00029.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00014.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00020.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00015.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00027.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-1087.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-1088.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-1089.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-1189.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2015/dsa-3284\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2015/dsa-3285\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2015/dsa-3286\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/75123\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1032545\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2630-1\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://xenbits.xen.org/xsa/advisory-135.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://kb.juniper.net/JSA10783\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201510-02\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201604-03\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.arista.com/en/support/advisories-notices/security-advisories/1180-security-advisory-13\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10698\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160669.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160677.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160685.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00027.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00029.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00014.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00020.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00015.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00027.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-1087.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-1088.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-1089.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-1189.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2015/dsa-3284\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2015/dsa-3285\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2015/dsa-3286\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/75123\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1032545\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2630-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://xenbits.xen.org/xsa/advisory-135.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://kb.juniper.net/JSA10783\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201510-02\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201604-03\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.arista.com/en/support/advisories-notices/security-advisories/1180-security-advisory-13\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
rhsa-2015:1087
Vulnerability from csaf_redhat
Published
2015-06-10 14:46
Modified
2024-11-22 09:12
Summary
Red Hat Security Advisory: qemu-kvm security update
Notes
Topic
Updated qemu-kvm packages that fix one security issue are now available for
Red Hat Enterprise Linux 6.
Red Hat Product Security has rated this update as having Important security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.
Details
KVM (Kernel-based Virtual Machine) is a full virtualization solution for
Linux on AMD64 and Intel 64 systems. The qemu-kvm package provides the
user-space component for running virtual machines using KVM.
A flaw was found in the way QEMU's AMD PCnet Ethernet emulation handled
multi-TMD packets with a length above 4096 bytes. A privileged guest user
in a guest with an AMD PCNet ethernet card enabled could potentially use
this flaw to execute arbitrary code on the host with the privileges of the
hosting QEMU process. (CVE-2015-3209)
Red Hat would like to thank Matt Tait of Google's Project Zero security
team for reporting this issue.
All qemu-kvm users are advised to upgrade to these updated packages, which
contain a backported patch to correct this issue. After installing this
update, shut down all running virtual machines. Once all virtual machines
have shut down, start them again for this update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated qemu-kvm packages that fix one security issue are now available for\nRed Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having Important security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", "title": "Topic" }, { "category": "general", "text": "KVM (Kernel-based Virtual Machine) is a full virtualization solution for\nLinux on AMD64 and Intel 64 systems. The qemu-kvm package provides the\nuser-space component for running virtual machines using KVM.\n\nA flaw was found in the way QEMU\u0027s AMD PCnet Ethernet emulation handled\nmulti-TMD packets with a length above 4096 bytes. A privileged guest user\nin a guest with an AMD PCNet ethernet card enabled could potentially use\nthis flaw to execute arbitrary code on the host with the privileges of the\nhosting QEMU process. (CVE-2015-3209)\n\nRed Hat would like to thank Matt Tait of Google\u0027s Project Zero security\nteam for reporting this issue.\n\nAll qemu-kvm users are advised to upgrade to these updated packages, which\ncontain a backported patch to correct this issue. After installing this\nupdate, shut down all running virtual machines. Once all virtual machines\nhave shut down, start them again for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:1087", "url": "https://access.redhat.com/errata/RHSA-2015:1087" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1225882", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1225882" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_1087.json" } ], "title": "Red Hat Security Advisory: qemu-kvm security update", "tracking": { "current_release_date": "2024-11-22T09:12:30+00:00", "generator": { "date": "2024-11-22T09:12:30+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2015:1087", "initial_release_date": "2015-06-10T14:46:59+00:00", "revision_history": [ { "date": "2015-06-10T14:46:59+00:00", "number": "1", "summary": "Initial version" }, { "date": "2015-06-10T14:46:59+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T09:12:30+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "product": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_id": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-debuginfo@0.12.1.2-2.448.el6_6.4?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "product": { "name": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_id": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-guest-agent@0.12.1.2-2.448.el6_6.4?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "product": { "name": "qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_id": "qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-tools@0.12.1.2-2.448.el6_6.4?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "product": { "name": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_id": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm@0.12.1.2-2.448.el6_6.4?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "product": { "name": "qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_id": "qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-img@0.12.1.2-2.448.el6_6.4?arch=x86_64\u0026epoch=2" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "product": { "name": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "product_id": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-guest-agent@0.12.1.2-2.448.el6_6.4?arch=i686\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "product": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "product_id": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-debuginfo@0.12.1.2-2.448.el6_6.4?arch=i686\u0026epoch=2" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "product": { "name": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "product_id": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm@0.12.1.2-2.448.el6_6.4?arch=src\u0026epoch=2" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686" }, "product_reference": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686" }, "product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686" }, "product_reference": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686" }, "product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686" }, "product_reference": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686" }, "product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686" }, "product_reference": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686" }, "product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Workstation-6.6.z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Matt Tait" ], "organization": "Google\u0027s Project Zero security team" } ], "cve": "CVE-2015-3209", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2015-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1225882" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way QEMU\u0027s AMD PCnet Ethernet emulation handled multi-TMD packets with a length above 4096 bytes. A privileged guest user in a guest with an AMD PCNet ethernet card enabled could potentially use this flaw to execute arbitrary code on the host with the privileges of the hosting QEMU process.", "title": "Vulnerability description" }, { "category": "summary", "text": "qemu: pcnet: multi-tmd buffer overflow in the tx path", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of the qemu-kvm packages as shipped with Red Hat Enterprise Linux 7 as they do not enable the pcnet backend driver.\n\nThis issue does not affect the Red Hat Enterprise Linux 7 based versions of the qemu-kvm-rhev packages as shipped with Red Hat Enterprise Virtualization 3.\n\nThis issue affects the versions of the kvm and xen packages as shipped with Red Hat Enterprise Linux 5, the versions of the qemu-kvm packages as shipped with Red Hat Enterprise Linux 6, and the Red Hat Enterprise Linux 6 based versions of qemu-kvm-rhev packages as shipped with Red Hat Enterprise Virtualization 3. Future updates for the respective releases may address this flaw.\n\nPlease note that AMD PCNet adapter has to be explicitly enabled per-guest as it is not enabled in default configuration and is not supported by Red Hat in Red Hat Enterprise Linux 6 (for a list of supported devices please consult https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Virtualization_Administration_Guide/sect-whitelist-device-options.html).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "6Client-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Client-6.6.z:qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Client-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "6Client-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Client-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "6Client-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Client-6.6.z:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "6ComputeNode-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "6ComputeNode-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "6ComputeNode-6.6.z:qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "6ComputeNode-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "6ComputeNode-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "6ComputeNode-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "6ComputeNode-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6ComputeNode-6.6.z:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "6Server-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-6.6.z:qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "6Server-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "6Server-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-6.6.z:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Workstation-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "6Workstation-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Workstation-6.6.z:qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Workstation-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "6Workstation-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Workstation-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "6Workstation-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Workstation-6.6.z:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-3209" }, { "category": "external", "summary": "RHBZ#1225882", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1225882" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-3209", "url": "https://www.cve.org/CVERecord?id=CVE-2015-3209" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-3209", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3209" } ], "release_date": "2015-06-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-06-10T14:46:59+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "6Client-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Client-6.6.z:qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Client-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "6Client-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Client-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "6Client-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Client-6.6.z:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "6ComputeNode-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "6ComputeNode-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "6ComputeNode-6.6.z:qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "6ComputeNode-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "6ComputeNode-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "6ComputeNode-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "6ComputeNode-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6ComputeNode-6.6.z:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "6Server-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-6.6.z:qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "6Server-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "6Server-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-6.6.z:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Workstation-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "6Workstation-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Workstation-6.6.z:qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Workstation-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "6Workstation-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Workstation-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "6Workstation-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Workstation-6.6.z:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1087" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 6.5, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:H/Au:S/C:C/I:C/A:C", "version": "2.0" }, "products": [ "6Client-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "6Client-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Client-6.6.z:qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Client-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "6Client-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Client-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "6Client-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Client-6.6.z:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "6ComputeNode-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "6ComputeNode-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "6ComputeNode-6.6.z:qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "6ComputeNode-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "6ComputeNode-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "6ComputeNode-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "6ComputeNode-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6ComputeNode-6.6.z:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "6Server-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-6.6.z:qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "6Server-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "6Server-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-6.6.z:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Workstation-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.i686", "6Workstation-6.6.z:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Workstation-6.6.z:qemu-img-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Workstation-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.src", "6Workstation-6.6.z:qemu-kvm-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Workstation-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.i686", "6Workstation-6.6.z:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Workstation-6.6.z:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "qemu: pcnet: multi-tmd buffer overflow in the tx path" } ] }
rhsa-2015:1089
Vulnerability from csaf_redhat
Published
2015-06-10 16:23
Modified
2024-11-22 09:12
Summary
Red Hat Security Advisory: qemu-kvm-rhev security update
Notes
Topic
Updated qemu-kvm-rhev packages that fix one security issue are now
available for Red Hat Enterprise Linux OpenStack Platform 5.0 for Red Hat
Enterprise Linux 6.
Red Hat Product Security has rated this update as having Important security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.
Details
KVM (Kernel-based Virtual Machine) is a full virtualization solution for
Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the
user-space component for running virtual machines using KVM.
A flaw was found in the way QEMU's AMD PCnet Ethernet emulation handled
multi-TMD packets with a length above 4096 bytes. A privileged guest user
in a guest with an AMD PCNet ethernet card enabled could potentially use
this flaw to execute arbitrary code on the host with the privileges of the
hosting QEMU process. (CVE-2015-3209)
Red Hat would like to thank Matt Tait of Google's Project Zero security
team for reporting this issue.
All qemu-kvm-rhev users are advised to upgrade to these updated packages,
which contain a backported patch to correct this issue. After installing
this update, shut down all running virtual machines. Once all virtual
machines have shut down, start them again for this update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated qemu-kvm-rhev packages that fix one security issue are now\navailable for Red Hat Enterprise Linux OpenStack Platform 5.0 for Red Hat\nEnterprise Linux 6.\n\nRed Hat Product Security has rated this update as having Important security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", "title": "Topic" }, { "category": "general", "text": "KVM (Kernel-based Virtual Machine) is a full virtualization solution for\nLinux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the\nuser-space component for running virtual machines using KVM.\n\nA flaw was found in the way QEMU\u0027s AMD PCnet Ethernet emulation handled\nmulti-TMD packets with a length above 4096 bytes. A privileged guest user\nin a guest with an AMD PCNet ethernet card enabled could potentially use\nthis flaw to execute arbitrary code on the host with the privileges of the\nhosting QEMU process. (CVE-2015-3209)\n\nRed Hat would like to thank Matt Tait of Google\u0027s Project Zero security\nteam for reporting this issue.\n\nAll qemu-kvm-rhev users are advised to upgrade to these updated packages,\nwhich contain a backported patch to correct this issue. After installing\nthis update, shut down all running virtual machines. Once all virtual\nmachines have shut down, start them again for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:1089", "url": "https://access.redhat.com/errata/RHSA-2015:1089" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1225882", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1225882" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_1089.json" } ], "title": "Red Hat Security Advisory: qemu-kvm-rhev security update", "tracking": { "current_release_date": "2024-11-22T09:12:39+00:00", "generator": { "date": "2024-11-22T09:12:39+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2015:1089", "initial_release_date": "2015-06-10T16:23:09+00:00", "revision_history": [ { "date": "2015-06-10T16:23:09+00:00", "number": "1", "summary": "Initial version" }, { "date": "2015-06-10T16:23:09+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T09:12:39+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6", "product": { "name": "Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6", "product_id": "6Server-RH6-RHOS-5.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:5::el6" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src", "product": { "name": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src", "product_id": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev@0.12.1.2-2.448.el6_6.4?arch=src\u0026epoch=2" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "product": { "name": "qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_id": "qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev-tools@0.12.1.2-2.448.el6_6.4?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "product": { "name": "qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_id": "qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-img-rhev@0.12.1.2-2.448.el6_6.4?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "product": { "name": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_id": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev@0.12.1.2-2.448.el6_6.4?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "product": { "name": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_id": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev-debuginfo@0.12.1.2-2.448.el6_6.4?arch=x86_64\u0026epoch=2" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6", "product_id": "6Server-RH6-RHOS-5.0:qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Server-RH6-RHOS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6", "product_id": "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src" }, "product_reference": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src", "relates_to_product_reference": "6Server-RH6-RHOS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6", "product_id": "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Server-RH6-RHOS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6", "product_id": "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Server-RH6-RHOS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6", "product_id": "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Server-RH6-RHOS-5.0" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Matt Tait" ], "organization": "Google\u0027s Project Zero security team" } ], "cve": "CVE-2015-3209", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2015-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1225882" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way QEMU\u0027s AMD PCnet Ethernet emulation handled multi-TMD packets with a length above 4096 bytes. A privileged guest user in a guest with an AMD PCNet ethernet card enabled could potentially use this flaw to execute arbitrary code on the host with the privileges of the hosting QEMU process.", "title": "Vulnerability description" }, { "category": "summary", "text": "qemu: pcnet: multi-tmd buffer overflow in the tx path", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of the qemu-kvm packages as shipped with Red Hat Enterprise Linux 7 as they do not enable the pcnet backend driver.\n\nThis issue does not affect the Red Hat Enterprise Linux 7 based versions of the qemu-kvm-rhev packages as shipped with Red Hat Enterprise Virtualization 3.\n\nThis issue affects the versions of the kvm and xen packages as shipped with Red Hat Enterprise Linux 5, the versions of the qemu-kvm packages as shipped with Red Hat Enterprise Linux 6, and the Red Hat Enterprise Linux 6 based versions of qemu-kvm-rhev packages as shipped with Red Hat Enterprise Virtualization 3. Future updates for the respective releases may address this flaw.\n\nPlease note that AMD PCNet adapter has to be explicitly enabled per-guest as it is not enabled in default configuration and is not supported by Red Hat in Red Hat Enterprise Linux 6 (for a list of supported devices please consult https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Virtualization_Administration_Guide/sect-whitelist-device-options.html).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RH6-RHOS-5.0:qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src", "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-3209" }, { "category": "external", "summary": "RHBZ#1225882", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1225882" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-3209", "url": "https://www.cve.org/CVERecord?id=CVE-2015-3209" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-3209", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3209" } ], "release_date": "2015-06-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-06-10T16:23:09+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RH6-RHOS-5.0:qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src", "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1089" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 6.5, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:H/Au:S/C:C/I:C/A:C", "version": "2.0" }, "products": [ "6Server-RH6-RHOS-5.0:qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src", "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "qemu: pcnet: multi-tmd buffer overflow in the tx path" } ] }
rhsa-2015:1088
Vulnerability from csaf_redhat
Published
2015-06-10 15:00
Modified
2024-11-22 09:12
Summary
Red Hat Security Advisory: qemu-kvm-rhev security update
Notes
Topic
Updated qemu-kvm-rhev packages that fix one security issue are now
available for Red Hat Enterprise Virtualization 3.5.
Red Hat Product Security has rated this update as having Important security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.
Details
KVM (Kernel-based Virtual Machine) is a full virtualization solution for
Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the
user-space component for running virtual machines using KVM.
A flaw was found in the way QEMU's AMD PCnet Ethernet emulation handled
multi-TMD packets with a length above 4096 bytes. A privileged guest user
in a guest with an AMD PCNet ethernet card enabled could potentially use
this flaw to execute arbitrary code on the host with the privileges of the
hosting QEMU process. (CVE-2015-3209)
Red Hat would like to thank Matt Tait of Google's Project Zero security
team for reporting this issue.
All qemu-kvm-rhev users are advised to upgrade to these updated packages,
which contain a backported patch to correct this issue. After installing
this update, shut down all running virtual machines. Once all virtual
machines have shut down, start them again for this update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated qemu-kvm-rhev packages that fix one security issue are now\navailable for Red Hat Enterprise Virtualization 3.5.\n\nRed Hat Product Security has rated this update as having Important security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", "title": "Topic" }, { "category": "general", "text": "KVM (Kernel-based Virtual Machine) is a full virtualization solution for\nLinux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the\nuser-space component for running virtual machines using KVM.\n\nA flaw was found in the way QEMU\u0027s AMD PCnet Ethernet emulation handled\nmulti-TMD packets with a length above 4096 bytes. A privileged guest user\nin a guest with an AMD PCNet ethernet card enabled could potentially use\nthis flaw to execute arbitrary code on the host with the privileges of the\nhosting QEMU process. (CVE-2015-3209)\n\nRed Hat would like to thank Matt Tait of Google\u0027s Project Zero security\nteam for reporting this issue.\n\nAll qemu-kvm-rhev users are advised to upgrade to these updated packages,\nwhich contain a backported patch to correct this issue. After installing\nthis update, shut down all running virtual machines. Once all virtual\nmachines have shut down, start them again for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:1088", "url": "https://access.redhat.com/errata/RHSA-2015:1088" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1225882", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1225882" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_1088.json" } ], "title": "Red Hat Security Advisory: qemu-kvm-rhev security update", "tracking": { "current_release_date": "2024-11-22T09:12:35+00:00", "generator": { "date": "2024-11-22T09:12:35+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2015:1088", "initial_release_date": "2015-06-10T15:00:16+00:00", "revision_history": [ { "date": "2015-06-10T15:00:16+00:00", "number": "1", "summary": "Initial version" }, { "date": "2015-06-10T15:00:16+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T09:12:35+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHEV Agents (vdsm)", "product": { "name": "RHEV Agents (vdsm)", "product_id": "6Server-RHEV-Agents", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:6::hypervisor" } } } ], "category": "product_family", "name": "Red Hat Virtualization" }, { "branches": [ { "category": "product_version", "name": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src", "product": { "name": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src", "product_id": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev@0.12.1.2-2.448.el6_6.4?arch=src\u0026epoch=2" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "product": { "name": "qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_id": "qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev-tools@0.12.1.2-2.448.el6_6.4?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "product": { "name": "qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_id": "qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-img-rhev@0.12.1.2-2.448.el6_6.4?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "product": { "name": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_id": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev@0.12.1.2-2.448.el6_6.4?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "product": { "name": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_id": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev-debuginfo@0.12.1.2-2.448.el6_6.4?arch=x86_64\u0026epoch=2" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of RHEV Agents (vdsm)", "product_id": "6Server-RHEV-Agents:qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Server-RHEV-Agents" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src as a component of RHEV Agents (vdsm)", "product_id": "6Server-RHEV-Agents:qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src" }, "product_reference": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src", "relates_to_product_reference": "6Server-RHEV-Agents" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of RHEV Agents (vdsm)", "product_id": "6Server-RHEV-Agents:qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Server-RHEV-Agents" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of RHEV Agents (vdsm)", "product_id": "6Server-RHEV-Agents:qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Server-RHEV-Agents" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64 as a component of RHEV Agents (vdsm)", "product_id": "6Server-RHEV-Agents:qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64" }, "product_reference": "qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64", "relates_to_product_reference": "6Server-RHEV-Agents" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Matt Tait" ], "organization": "Google\u0027s Project Zero security team" } ], "cve": "CVE-2015-3209", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2015-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1225882" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way QEMU\u0027s AMD PCnet Ethernet emulation handled multi-TMD packets with a length above 4096 bytes. A privileged guest user in a guest with an AMD PCNet ethernet card enabled could potentially use this flaw to execute arbitrary code on the host with the privileges of the hosting QEMU process.", "title": "Vulnerability description" }, { "category": "summary", "text": "qemu: pcnet: multi-tmd buffer overflow in the tx path", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of the qemu-kvm packages as shipped with Red Hat Enterprise Linux 7 as they do not enable the pcnet backend driver.\n\nThis issue does not affect the Red Hat Enterprise Linux 7 based versions of the qemu-kvm-rhev packages as shipped with Red Hat Enterprise Virtualization 3.\n\nThis issue affects the versions of the kvm and xen packages as shipped with Red Hat Enterprise Linux 5, the versions of the qemu-kvm packages as shipped with Red Hat Enterprise Linux 6, and the Red Hat Enterprise Linux 6 based versions of qemu-kvm-rhev packages as shipped with Red Hat Enterprise Virtualization 3. Future updates for the respective releases may address this flaw.\n\nPlease note that AMD PCNet adapter has to be explicitly enabled per-guest as it is not enabled in default configuration and is not supported by Red Hat in Red Hat Enterprise Linux 6 (for a list of supported devices please consult https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Virtualization_Administration_Guide/sect-whitelist-device-options.html).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHEV-Agents:qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src", "6Server-RHEV-Agents:qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-3209" }, { "category": "external", "summary": "RHBZ#1225882", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1225882" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-3209", "url": "https://www.cve.org/CVERecord?id=CVE-2015-3209" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-3209", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3209" } ], "release_date": "2015-06-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-06-10T15:00:16+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RHEV-Agents:qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src", "6Server-RHEV-Agents:qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1088" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 6.5, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:H/Au:S/C:C/I:C/A:C", "version": "2.0" }, "products": [ "6Server-RHEV-Agents:qemu-img-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.src", "6Server-RHEV-Agents:qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.4.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "qemu: pcnet: multi-tmd buffer overflow in the tx path" } ] }
rhsa-2015:1189
Vulnerability from csaf_redhat
Published
2015-06-25 13:27
Modified
2024-11-22 09:12
Summary
Red Hat Security Advisory: kvm security update
Notes
Topic
Updated kvm packages that fix one security issue are now available for Red
Hat Enterprise Linux 5.
Red Hat Product Security has rated this update as having Important security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.
Details
KVM (Kernel-based Virtual Machine) is a full virtualization solution for
Linux on AMD64 and Intel 64 systems.
A flaw was found in the way QEMU's AMD PCnet Ethernet emulation handled
multi-TMD packets with a length above 4096 bytes. A privileged guest user
in a guest with an AMD PCNet ethernet card enabled could potentially use
this flaw to execute arbitrary code on the host with the privileges of the
hosting QEMU process. (CVE-2015-3209)
Red Hat would like to thank Matt Tait of Google's Project Zero security
team for reporting this issue.
All kvm users are advised to upgrade to these updated packages, which
contain a backported patch to correct this issue. Note: The procedure in
the Solution section must be performed before this update will take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kvm packages that fix one security issue are now available for Red\nHat Enterprise Linux 5.\n\nRed Hat Product Security has rated this update as having Important security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", "title": "Topic" }, { "category": "general", "text": "KVM (Kernel-based Virtual Machine) is a full virtualization solution for\nLinux on AMD64 and Intel 64 systems.\n\nA flaw was found in the way QEMU\u0027s AMD PCnet Ethernet emulation handled\nmulti-TMD packets with a length above 4096 bytes. A privileged guest user\nin a guest with an AMD PCNet ethernet card enabled could potentially use\nthis flaw to execute arbitrary code on the host with the privileges of the\nhosting QEMU process. (CVE-2015-3209)\n\nRed Hat would like to thank Matt Tait of Google\u0027s Project Zero security\nteam for reporting this issue.\n\nAll kvm users are advised to upgrade to these updated packages, which\ncontain a backported patch to correct this issue. Note: The procedure in\nthe Solution section must be performed before this update will take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:1189", "url": "https://access.redhat.com/errata/RHSA-2015:1189" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1225882", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1225882" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_1189.json" } ], "title": "Red Hat Security Advisory: kvm security update", "tracking": { "current_release_date": "2024-11-22T09:12:43+00:00", "generator": { "date": "2024-11-22T09:12:43+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2015:1189", "initial_release_date": "2015-06-25T13:27:18+00:00", "revision_history": [ { "date": "2015-06-25T13:27:18+00:00", "number": "1", "summary": "Initial version" }, { "date": "2015-06-25T13:27:18+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T09:12:43+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.11.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_virtualization:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Virtualization (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT-5.11.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_virtualization:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kmod-kvm-0:83-273.el5_11.x86_64", "product": { "name": "kmod-kvm-0:83-273.el5_11.x86_64", "product_id": "kmod-kvm-0:83-273.el5_11.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kmod-kvm@83-273.el5_11?arch=x86_64" } } }, { "category": "product_version", "name": "kvm-0:83-273.el5_11.x86_64", "product": { "name": "kvm-0:83-273.el5_11.x86_64", "product_id": "kvm-0:83-273.el5_11.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kvm@83-273.el5_11?arch=x86_64" } } }, { "category": "product_version", "name": "kmod-kvm-debug-0:83-273.el5_11.x86_64", "product": { "name": "kmod-kvm-debug-0:83-273.el5_11.x86_64", "product_id": "kmod-kvm-debug-0:83-273.el5_11.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kmod-kvm-debug@83-273.el5_11?arch=x86_64" } } }, { "category": "product_version", "name": "kvm-debuginfo-0:83-273.el5_11.x86_64", "product": { "name": "kvm-debuginfo-0:83-273.el5_11.x86_64", "product_id": "kvm-debuginfo-0:83-273.el5_11.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kvm-debuginfo@83-273.el5_11?arch=x86_64" } } }, { "category": "product_version", "name": "kvm-qemu-img-0:83-273.el5_11.x86_64", "product": { "name": "kvm-qemu-img-0:83-273.el5_11.x86_64", "product_id": "kvm-qemu-img-0:83-273.el5_11.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kvm-qemu-img@83-273.el5_11?arch=x86_64" } } }, { "category": "product_version", "name": "kvm-tools-0:83-273.el5_11.x86_64", "product": { "name": "kvm-tools-0:83-273.el5_11.x86_64", "product_id": "kvm-tools-0:83-273.el5_11.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kvm-tools@83-273.el5_11?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kvm-0:83-273.el5_11.src", "product": { "name": "kvm-0:83-273.el5_11.src", "product_id": "kvm-0:83-273.el5_11.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kvm@83-273.el5_11?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kmod-kvm-0:83-273.el5_11.x86_64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.11.Z:kmod-kvm-0:83-273.el5_11.x86_64" }, "product_reference": "kmod-kvm-0:83-273.el5_11.x86_64", "relates_to_product_reference": "5Client-VT-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kmod-kvm-debug-0:83-273.el5_11.x86_64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.11.Z:kmod-kvm-debug-0:83-273.el5_11.x86_64" }, "product_reference": "kmod-kvm-debug-0:83-273.el5_11.x86_64", "relates_to_product_reference": "5Client-VT-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-0:83-273.el5_11.src as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.11.Z:kvm-0:83-273.el5_11.src" }, "product_reference": "kvm-0:83-273.el5_11.src", "relates_to_product_reference": "5Client-VT-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-0:83-273.el5_11.x86_64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.11.Z:kvm-0:83-273.el5_11.x86_64" }, "product_reference": "kvm-0:83-273.el5_11.x86_64", "relates_to_product_reference": "5Client-VT-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-debuginfo-0:83-273.el5_11.x86_64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.11.Z:kvm-debuginfo-0:83-273.el5_11.x86_64" }, "product_reference": "kvm-debuginfo-0:83-273.el5_11.x86_64", "relates_to_product_reference": "5Client-VT-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-qemu-img-0:83-273.el5_11.x86_64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.11.Z:kvm-qemu-img-0:83-273.el5_11.x86_64" }, "product_reference": "kvm-qemu-img-0:83-273.el5_11.x86_64", "relates_to_product_reference": "5Client-VT-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-tools-0:83-273.el5_11.x86_64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.11.Z:kvm-tools-0:83-273.el5_11.x86_64" }, "product_reference": "kvm-tools-0:83-273.el5_11.x86_64", "relates_to_product_reference": "5Client-VT-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kmod-kvm-0:83-273.el5_11.x86_64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT-5.11.Z:kmod-kvm-0:83-273.el5_11.x86_64" }, "product_reference": "kmod-kvm-0:83-273.el5_11.x86_64", "relates_to_product_reference": "5Server-VT-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kmod-kvm-debug-0:83-273.el5_11.x86_64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT-5.11.Z:kmod-kvm-debug-0:83-273.el5_11.x86_64" }, "product_reference": "kmod-kvm-debug-0:83-273.el5_11.x86_64", "relates_to_product_reference": "5Server-VT-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-0:83-273.el5_11.src as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT-5.11.Z:kvm-0:83-273.el5_11.src" }, "product_reference": "kvm-0:83-273.el5_11.src", "relates_to_product_reference": "5Server-VT-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-0:83-273.el5_11.x86_64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT-5.11.Z:kvm-0:83-273.el5_11.x86_64" }, "product_reference": "kvm-0:83-273.el5_11.x86_64", "relates_to_product_reference": "5Server-VT-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-debuginfo-0:83-273.el5_11.x86_64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT-5.11.Z:kvm-debuginfo-0:83-273.el5_11.x86_64" }, "product_reference": "kvm-debuginfo-0:83-273.el5_11.x86_64", "relates_to_product_reference": "5Server-VT-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-qemu-img-0:83-273.el5_11.x86_64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT-5.11.Z:kvm-qemu-img-0:83-273.el5_11.x86_64" }, "product_reference": "kvm-qemu-img-0:83-273.el5_11.x86_64", "relates_to_product_reference": "5Server-VT-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-tools-0:83-273.el5_11.x86_64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT-5.11.Z:kvm-tools-0:83-273.el5_11.x86_64" }, "product_reference": "kvm-tools-0:83-273.el5_11.x86_64", "relates_to_product_reference": "5Server-VT-5.11.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Matt Tait" ], "organization": "Google\u0027s Project Zero security team" } ], "cve": "CVE-2015-3209", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2015-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1225882" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way QEMU\u0027s AMD PCnet Ethernet emulation handled multi-TMD packets with a length above 4096 bytes. A privileged guest user in a guest with an AMD PCNet ethernet card enabled could potentially use this flaw to execute arbitrary code on the host with the privileges of the hosting QEMU process.", "title": "Vulnerability description" }, { "category": "summary", "text": "qemu: pcnet: multi-tmd buffer overflow in the tx path", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of the qemu-kvm packages as shipped with Red Hat Enterprise Linux 7 as they do not enable the pcnet backend driver.\n\nThis issue does not affect the Red Hat Enterprise Linux 7 based versions of the qemu-kvm-rhev packages as shipped with Red Hat Enterprise Virtualization 3.\n\nThis issue affects the versions of the kvm and xen packages as shipped with Red Hat Enterprise Linux 5, the versions of the qemu-kvm packages as shipped with Red Hat Enterprise Linux 6, and the Red Hat Enterprise Linux 6 based versions of qemu-kvm-rhev packages as shipped with Red Hat Enterprise Virtualization 3. Future updates for the respective releases may address this flaw.\n\nPlease note that AMD PCNet adapter has to be explicitly enabled per-guest as it is not enabled in default configuration and is not supported by Red Hat in Red Hat Enterprise Linux 6 (for a list of supported devices please consult https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Virtualization_Administration_Guide/sect-whitelist-device-options.html).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-VT-5.11.Z:kmod-kvm-0:83-273.el5_11.x86_64", "5Client-VT-5.11.Z:kmod-kvm-debug-0:83-273.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-0:83-273.el5_11.src", "5Client-VT-5.11.Z:kvm-0:83-273.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-debuginfo-0:83-273.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-qemu-img-0:83-273.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-tools-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kmod-kvm-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kmod-kvm-debug-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-0:83-273.el5_11.src", "5Server-VT-5.11.Z:kvm-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-debuginfo-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-qemu-img-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-tools-0:83-273.el5_11.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-3209" }, { "category": "external", "summary": "RHBZ#1225882", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1225882" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-3209", "url": "https://www.cve.org/CVERecord?id=CVE-2015-3209" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-3209", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3209" } ], "release_date": "2015-06-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-06-25T13:27:18+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe following procedure must be performed before this update will take\neffect:\n\n1) Stop all KVM guest virtual machines.\n\n2) Either reboot the hypervisor machine or, as the root user, remove (using\n\"modprobe -r [module]\") and reload (using \"modprobe [module]\") all of the\nfollowing modules which are currently running (determined using \"lsmod\"):\nkvm, ksm, kvm-intel or kvm-amd.\n\n3) Restart the KVM guest virtual machines.", "product_ids": [ "5Client-VT-5.11.Z:kmod-kvm-0:83-273.el5_11.x86_64", "5Client-VT-5.11.Z:kmod-kvm-debug-0:83-273.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-0:83-273.el5_11.src", "5Client-VT-5.11.Z:kvm-0:83-273.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-debuginfo-0:83-273.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-qemu-img-0:83-273.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-tools-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kmod-kvm-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kmod-kvm-debug-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-0:83-273.el5_11.src", "5Server-VT-5.11.Z:kvm-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-debuginfo-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-qemu-img-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-tools-0:83-273.el5_11.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1189" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 6.5, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:H/Au:S/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Client-VT-5.11.Z:kmod-kvm-0:83-273.el5_11.x86_64", "5Client-VT-5.11.Z:kmod-kvm-debug-0:83-273.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-0:83-273.el5_11.src", "5Client-VT-5.11.Z:kvm-0:83-273.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-debuginfo-0:83-273.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-qemu-img-0:83-273.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-tools-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kmod-kvm-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kmod-kvm-debug-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-0:83-273.el5_11.src", "5Server-VT-5.11.Z:kvm-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-debuginfo-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-qemu-img-0:83-273.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-tools-0:83-273.el5_11.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "qemu: pcnet: multi-tmd buffer overflow in the tx path" } ] }
suse-su-2015:1045-1
Vulnerability from csaf_suse
Published
2015-06-05 12:53
Modified
2015-06-05 12:53
Summary
Security update for Xen
Notes
Title of the patch
Security update for Xen
Description of the patch
Xen was updated to fix seven security vulnerabilities:
* CVE-2015-4103: Potential unintended writes to host MSI message data
field via qemu. (XSA-128, bnc#931625)
* CVE-2015-4104: PCI MSI mask bits inadvertently exposed to guests.
(XSA-129, bnc#931626)
* CVE-2015-4105: Guest triggerable qemu MSI-X pass-through error
messages. (XSA-130, bnc#931627)
* CVE-2015-4106: Unmediated PCI register access in qemu. (XSA-131,
bnc#931628)
* CVE-2015-4163: GNTTABOP_swap_grant_ref operation misbehavior.
(XSA-134, bnc#932790)
* CVE-2015-3209: Heap overflow in qemu pcnet controller allowing guest
to host escape. (XSA-135, bnc#932770)
* CVE-2015-4164: DoS through iret hypercall handler. (XSA-136,
bnc#932996)
Security Issues:
* CVE-2015-4103
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4103>
* CVE-2015-4104
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4104>
* CVE-2015-4105
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4105>
* CVE-2015-4106
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4106>
* CVE-2015-4163
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4163>
* CVE-2015-4164
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4164>
* CVE-2015-3209
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3209>
Patchnames
sdksp3-xen-201506,sledsp3-xen-201506,slessp3-xen-201506
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Xen", "title": "Title of the patch" }, { "category": "description", "text": "\nXen was updated to fix seven security vulnerabilities:\n\n * CVE-2015-4103: Potential unintended writes to host MSI message data\n field via qemu. (XSA-128, bnc#931625)\n * CVE-2015-4104: PCI MSI mask bits inadvertently exposed to guests.\n (XSA-129, bnc#931626)\n * CVE-2015-4105: Guest triggerable qemu MSI-X pass-through error\n messages. (XSA-130, bnc#931627)\n * CVE-2015-4106: Unmediated PCI register access in qemu. (XSA-131,\n bnc#931628)\n * CVE-2015-4163: GNTTABOP_swap_grant_ref operation misbehavior.\n (XSA-134, bnc#932790)\n * CVE-2015-3209: Heap overflow in qemu pcnet controller allowing guest\n to host escape. (XSA-135, bnc#932770)\n * CVE-2015-4164: DoS through iret hypercall handler. (XSA-136,\n bnc#932996)\n\nSecurity Issues:\n\n * CVE-2015-4103\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4103\u003e\n * CVE-2015-4104\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4104\u003e\n * CVE-2015-4105\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4105\u003e\n * CVE-2015-4106\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4106\u003e\n * CVE-2015-4163\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4163\u003e\n * CVE-2015-4164\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4164\u003e\n * CVE-2015-3209\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3209\u003e\n\n", "title": "Description of the patch" }, { "category": "details", "text": "sdksp3-xen-201506,sledsp3-xen-201506,slessp3-xen-201506", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_1045-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2015:1045-1", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20151045-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2015:1045-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-June/001435.html" }, { "category": "self", "summary": "SUSE Bug 931625", "url": "https://bugzilla.suse.com/931625" }, { "category": "self", "summary": "SUSE Bug 931626", "url": "https://bugzilla.suse.com/931626" }, { "category": "self", "summary": "SUSE Bug 931627", "url": "https://bugzilla.suse.com/931627" }, { "category": "self", "summary": "SUSE Bug 931628", "url": "https://bugzilla.suse.com/931628" }, { "category": "self", "summary": "SUSE Bug 932770", "url": "https://bugzilla.suse.com/932770" }, { "category": "self", "summary": "SUSE Bug 932790", "url": "https://bugzilla.suse.com/932790" }, { "category": "self", "summary": "SUSE Bug 932996", "url": "https://bugzilla.suse.com/932996" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3209 page", "url": "https://www.suse.com/security/cve/CVE-2015-3209/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4103 page", "url": "https://www.suse.com/security/cve/CVE-2015-4103/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4104 page", "url": "https://www.suse.com/security/cve/CVE-2015-4104/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4105 page", "url": "https://www.suse.com/security/cve/CVE-2015-4105/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4106 page", "url": "https://www.suse.com/security/cve/CVE-2015-4106/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4163 page", "url": "https://www.suse.com/security/cve/CVE-2015-4163/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4164 page", "url": "https://www.suse.com/security/cve/CVE-2015-4164/" } ], "title": "Security update for Xen", "tracking": { "current_release_date": "2015-06-05T12:53:19Z", "generator": { "date": "2015-06-05T12:53:19Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2015:1045-1", "initial_release_date": "2015-06-05T12:53:19Z", "revision_history": [ { "date": "2015-06-05T12:53:19Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-devel-4.2.5_08-0.9.1.i586", "product": { "name": "xen-devel-4.2.5_08-0.9.1.i586", "product_id": "xen-devel-4.2.5_08-0.9.1.i586" } }, { "category": "product_version", "name": "xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "product": { "name": "xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "product_id": "xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586" } }, { "category": "product_version", "name": "xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "product": { "name": "xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "product_id": "xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586" } }, { "category": "product_version", "name": "xen-libs-4.2.5_08-0.9.1.i586", "product": { "name": "xen-libs-4.2.5_08-0.9.1.i586", "product_id": "xen-libs-4.2.5_08-0.9.1.i586" } }, { "category": "product_version", "name": "xen-tools-domU-4.2.5_08-0.9.1.i586", "product": { "name": "xen-tools-domU-4.2.5_08-0.9.1.i586", "product_id": "xen-tools-domU-4.2.5_08-0.9.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "xen-devel-4.2.5_08-0.9.1.x86_64", "product": { "name": "xen-devel-4.2.5_08-0.9.1.x86_64", "product_id": "xen-devel-4.2.5_08-0.9.1.x86_64" } }, { "category": "product_version", "name": "xen-4.2.5_08-0.9.1.x86_64", "product": { "name": "xen-4.2.5_08-0.9.1.x86_64", "product_id": "xen-4.2.5_08-0.9.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.2.5_08-0.9.1.x86_64", "product": { "name": "xen-doc-html-4.2.5_08-0.9.1.x86_64", "product_id": "xen-doc-html-4.2.5_08-0.9.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "product": { "name": "xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "product_id": "xen-doc-pdf-4.2.5_08-0.9.1.x86_64" } }, { "category": "product_version", "name": "xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "product": { "name": "xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "product_id": "xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.2.5_08-0.9.1.x86_64", "product": { "name": "xen-libs-4.2.5_08-0.9.1.x86_64", "product_id": "xen-libs-4.2.5_08-0.9.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "product": { "name": "xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "product_id": "xen-libs-32bit-4.2.5_08-0.9.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.2.5_08-0.9.1.x86_64", "product": { "name": "xen-tools-4.2.5_08-0.9.1.x86_64", "product_id": "xen-tools-4.2.5_08-0.9.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.2.5_08-0.9.1.x86_64", "product": { "name": "xen-tools-domU-4.2.5_08-0.9.1.x86_64", "product_id": "xen-tools-domU-4.2.5_08-0.9.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 11 SP3", "product": { "name": "SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3", "product_identification_helper": { "cpe": "cpe:/a:suse:sle-sdk:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 11 SP3", "product": { "name": "SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sled:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3", "product": { "name": "SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product": { "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:11:sp3:teradata" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:11:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.2.5_08-0.9.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.i586" }, "product_reference": "xen-devel-4.2.5_08-0.9.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-devel-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:xen-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-doc-html-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-pdf-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586" }, "product_reference": "xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64" }, "product_reference": "xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586" }, "product_reference": "xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.2.5_08-0.9.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.i586" }, "product_reference": "xen-libs-4.2.5_08-0.9.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-libs-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-tools-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.2.5_08-0.9.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586" }, "product_reference": "xen-tools-domU-4.2.5_08-0.9.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-tools-domU-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:xen-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-doc-html-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-pdf-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586" }, "product_reference": "xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64" }, "product_reference": "xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586" }, "product_reference": "xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.2.5_08-0.9.1.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.i586" }, "product_reference": "xen-libs-4.2.5_08-0.9.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-libs-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-tools-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.2.5_08-0.9.1.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586" }, "product_reference": "xen-tools-domU-4.2.5_08-0.9.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-tools-domU-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-html-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-doc-html-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-pdf-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-pdf-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586" }, "product_reference": "xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64" }, "product_reference": "xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586" }, "product_reference": "xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.2.5_08-0.9.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.i586" }, "product_reference": "xen-libs-4.2.5_08-0.9.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-libs-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-32bit-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-tools-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.2.5_08-0.9.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.i586" }, "product_reference": "xen-tools-domU-4.2.5_08-0.9.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-tools-domU-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-doc-html-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-pdf-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586" }, "product_reference": "xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64" }, "product_reference": "xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586" }, "product_reference": "xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.2.5_08-0.9.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.i586" }, "product_reference": "xen-libs-4.2.5_08-0.9.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-libs-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-tools-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.2.5_08-0.9.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586" }, "product_reference": "xen-tools-domU-4.2.5_08-0.9.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-tools-domU-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-3209", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3209" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3209", "url": "https://www.suse.com/security/cve/CVE-2015-3209" }, { "category": "external", "summary": "SUSE Bug 932267 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932267" }, { "category": "external", "summary": "SUSE Bug 932770 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932770" }, { "category": "external", "summary": "SUSE Bug 932823 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932823" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-05T12:53:19Z", "details": "important" } ], "title": "CVE-2015-3209" }, { "cve": "CVE-2015-4103", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4103" } ], "notes": [ { "category": "general", "text": "Xen 3.3.x through 4.5.x does not properly restrict write access to the host MSI message data field, which allows local x86 HVM guest administrators to cause a denial of service (host interrupt handling confusion) via vectors related to qemu and accessing spanning multiple fields.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4103", "url": "https://www.suse.com/security/cve/CVE-2015-4103" }, { "category": "external", "summary": "SUSE Bug 931625 for CVE-2015-4103", "url": "https://bugzilla.suse.com/931625" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-05T12:53:19Z", "details": "moderate" } ], "title": "CVE-2015-4103" }, { "cve": "CVE-2015-4104", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4104" } ], "notes": [ { "category": "general", "text": "Xen 3.3.x through 4.5.x does not properly restrict access to PCI MSI mask bits, which allows local x86 HVM guest users to cause a denial of service (unexpected interrupt and host crash) via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4104", "url": "https://www.suse.com/security/cve/CVE-2015-4104" }, { "category": "external", "summary": "SUSE Bug 931626 for CVE-2015-4104", "url": "https://bugzilla.suse.com/931626" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-05T12:53:19Z", "details": "important" } ], "title": "CVE-2015-4104" }, { "cve": "CVE-2015-4105", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4105" } ], "notes": [ { "category": "general", "text": "Xen 3.3.x through 4.5.x enables logging for PCI MSI-X pass-through error messages, which allows local x86 HVM guests to cause a denial of service (host disk consumption) via certain invalid operations.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4105", "url": "https://www.suse.com/security/cve/CVE-2015-4105" }, { "category": "external", "summary": "SUSE Bug 931627 for CVE-2015-4105", "url": "https://bugzilla.suse.com/931627" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-05T12:53:19Z", "details": "moderate" } ], "title": "CVE-2015-4105" }, { "cve": "CVE-2015-4106", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4106" } ], "notes": [ { "category": "general", "text": "QEMU does not properly restrict write access to the PCI config space for certain PCI pass-through devices, which might allow local x86 HVM guests to gain privileges, cause a denial of service (host crash), obtain sensitive information, or possibly have other unspecified impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4106", "url": "https://www.suse.com/security/cve/CVE-2015-4106" }, { "category": "external", "summary": "SUSE Bug 931628 for CVE-2015-4106", "url": "https://bugzilla.suse.com/931628" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-05T12:53:19Z", "details": "moderate" } ], "title": "CVE-2015-4106" }, { "cve": "CVE-2015-4163", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4163" } ], "notes": [ { "category": "general", "text": "GNTTABOP_swap_grant_ref in Xen 4.2 through 4.5 does not check the grant table operation version, which allows local guest domains to cause a denial of service (NULL pointer dereference) via a hypercall without a GNTTABOP_setup_table or GNTTABOP_set_version.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4163", "url": "https://www.suse.com/security/cve/CVE-2015-4163" }, { "category": "external", "summary": "SUSE Bug 932790 for CVE-2015-4163", "url": "https://bugzilla.suse.com/932790" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-05T12:53:19Z", "details": "moderate" } ], "title": "CVE-2015-4163" }, { "cve": "CVE-2015-4164", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4164" } ], "notes": [ { "category": "general", "text": "The compat_iret function in Xen 3.1 through 4.5 iterates the wrong way through a loop, which allows local 32-bit PV guest administrators to cause a denial of service (large loop and system hang) via a hypercall_iret call with EFLAGS.VM set.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4164", "url": "https://www.suse.com/security/cve/CVE-2015-4164" }, { "category": "external", "summary": "SUSE Bug 932996 for CVE-2015-4164", "url": "https://bugzilla.suse.com/932996" }, { "category": "external", "summary": "SUSE Bug 950367 for CVE-2015-4164", "url": "https://bugzilla.suse.com/950367" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-05T12:53:19Z", "details": "moderate" } ], "title": "CVE-2015-4164" } ] }
suse-su-2015:0870-1
Vulnerability from csaf_suse
Published
2014-09-19 14:41
Modified
2014-09-19 14:41
Summary
Security update for kvm
Notes
Title of the patch
Security update for kvm
Description of the patch
kvm has been updated to fix issues in the embedded qemu:
*
CVE-2014-0223: An integer overflow flaw was found in the QEMU block
driver for QCOW version 1 disk images. A user able to alter the QEMU
disk image files loaded by a guest could have used this flaw to
corrupt QEMU process memory on the host, which could potentially have
resulted in arbitrary code execution on the host with the privileges
of the QEMU process.
*
CVE-2014-3461: A user able to alter the savevm data (either on the
disk or over the wire during migration) could have used this flaw to
to corrupt QEMU process memory on the (destination) host, which could
have potentially resulted in arbitrary code execution on the host
with the privileges of the QEMU process.
*
CVE-2014-0222: An integer overflow flaw was found in the QEMU block
driver for QCOW version 1 disk images. A user able to alter the QEMU
disk image files loaded by a guest could have used this flaw to
corrupt QEMU process memory on the host, which could have potentially
resulted in arbitrary code execution on the host with the privileges
of the QEMU process.
Non-security bugs fixed:
* Fix exceeding IRQ routes that could have caused freezes of guests.
(bnc#876842)
* Fix CPUID emulation bugs that may have broken Windows guests with
newer -cpu types (bnc#886535)
Security Issues:
* CVE-2014-0222
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0222>
* CVE-2014-0223
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0223>
* CVE-2014-3461
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3461>
Patchnames
sledsp3-kvm,slessp3-kvm
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for kvm", "title": "Title of the patch" }, { "category": "description", "text": "\nkvm has been updated to fix issues in the embedded qemu:\n\n * \n\n CVE-2014-0223: An integer overflow flaw was found in the QEMU block\n driver for QCOW version 1 disk images. A user able to alter the QEMU\n disk image files loaded by a guest could have used this flaw to\n corrupt QEMU process memory on the host, which could potentially have\n resulted in arbitrary code execution on the host with the privileges\n of the QEMU process.\n\n * \n\n CVE-2014-3461: A user able to alter the savevm data (either on the\n disk or over the wire during migration) could have used this flaw to\n to corrupt QEMU process memory on the (destination) host, which could\n have potentially resulted in arbitrary code execution on the host\n with the privileges of the QEMU process.\n\n * \n\n CVE-2014-0222: An integer overflow flaw was found in the QEMU block\n driver for QCOW version 1 disk images. A user able to alter the QEMU\n disk image files loaded by a guest could have used this flaw to\n corrupt QEMU process memory on the host, which could have potentially\n resulted in arbitrary code execution on the host with the privileges\n of the QEMU process.\n\nNon-security bugs fixed:\n\n * Fix exceeding IRQ routes that could have caused freezes of guests.\n (bnc#876842)\n * Fix CPUID emulation bugs that may have broken Windows guests with\n newer -cpu types (bnc#886535)\n\nSecurity Issues:\n\n * CVE-2014-0222\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0222\u003e\n * CVE-2014-0223\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0223\u003e\n * CVE-2014-3461\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3461\u003e\n\n", "title": "Description of the patch" }, { "category": "details", "text": "sledsp3-kvm,slessp3-kvm", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_0870-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2015:0870-1", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20150870-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2015:0870-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-May/001381.html" }, { "category": "self", "summary": "SUSE Bug 812836", "url": "https://bugzilla.suse.com/812836" }, { "category": "self", "summary": "SUSE Bug 812983", "url": "https://bugzilla.suse.com/812983" }, { "category": "self", "summary": "SUSE Bug 817593", "url": "https://bugzilla.suse.com/817593" }, { "category": "self", "summary": "SUSE Bug 821819", "url": "https://bugzilla.suse.com/821819" }, { "category": "self", "summary": "SUSE Bug 824340", "url": "https://bugzilla.suse.com/824340" }, { "category": "self", "summary": "SUSE Bug 829800", "url": "https://bugzilla.suse.com/829800" }, { "category": "self", "summary": "SUSE Bug 841080", "url": "https://bugzilla.suse.com/841080" }, { "category": "self", "summary": "SUSE Bug 842006", "url": "https://bugzilla.suse.com/842006" }, { "category": "self", "summary": "SUSE Bug 842088", "url": "https://bugzilla.suse.com/842088" }, { "category": "self", "summary": "SUSE Bug 858858", "url": "https://bugzilla.suse.com/858858" }, { "category": "self", "summary": "SUSE Bug 864391", "url": "https://bugzilla.suse.com/864391" }, { "category": "self", "summary": "SUSE Bug 864649", "url": "https://bugzilla.suse.com/864649" }, { "category": "self", "summary": "SUSE Bug 864650", "url": "https://bugzilla.suse.com/864650" }, { "category": "self", "summary": "SUSE Bug 864653", "url": "https://bugzilla.suse.com/864653" }, { "category": "self", "summary": "SUSE Bug 864655", "url": "https://bugzilla.suse.com/864655" }, { "category": "self", "summary": "SUSE Bug 864665", "url": "https://bugzilla.suse.com/864665" }, { "category": "self", "summary": "SUSE Bug 864671", "url": "https://bugzilla.suse.com/864671" }, { "category": "self", "summary": "SUSE Bug 864673", "url": "https://bugzilla.suse.com/864673" }, { "category": "self", "summary": "SUSE Bug 864678", "url": "https://bugzilla.suse.com/864678" }, { "category": "self", "summary": "SUSE Bug 864682", "url": "https://bugzilla.suse.com/864682" }, { "category": "self", "summary": "SUSE Bug 864769", "url": "https://bugzilla.suse.com/864769" }, { "category": "self", "summary": "SUSE Bug 864796", "url": "https://bugzilla.suse.com/864796" }, { "category": "self", "summary": "SUSE Bug 864801", "url": "https://bugzilla.suse.com/864801" }, { "category": "self", "summary": "SUSE Bug 864802", "url": "https://bugzilla.suse.com/864802" }, { "category": "self", "summary": "SUSE Bug 864804", "url": "https://bugzilla.suse.com/864804" }, { "category": "self", "summary": "SUSE Bug 864805", "url": "https://bugzilla.suse.com/864805" }, { "category": "self", "summary": "SUSE Bug 864811", "url": "https://bugzilla.suse.com/864811" }, { "category": "self", "summary": "SUSE Bug 864812", "url": "https://bugzilla.suse.com/864812" }, { "category": "self", "summary": "SUSE Bug 864814", "url": "https://bugzilla.suse.com/864814" }, { "category": "self", "summary": "SUSE Bug 870439", "url": "https://bugzilla.suse.com/870439" }, { "category": "self", "summary": "SUSE Bug 873235", "url": "https://bugzilla.suse.com/873235" }, { "category": "self", "summary": "SUSE Bug 874749", "url": "https://bugzilla.suse.com/874749" }, { "category": "self", "summary": "SUSE Bug 874788", "url": "https://bugzilla.suse.com/874788" }, { "category": "self", "summary": "SUSE Bug 876842", "url": "https://bugzilla.suse.com/876842" }, { "category": "self", "summary": "SUSE Bug 877642", "url": "https://bugzilla.suse.com/877642" }, { "category": "self", "summary": "SUSE Bug 877645", "url": "https://bugzilla.suse.com/877645" }, { "category": "self", "summary": "SUSE Bug 878541", "url": "https://bugzilla.suse.com/878541" }, { "category": "self", "summary": "SUSE Bug 886535", "url": "https://bugzilla.suse.com/886535" }, { "category": "self", "summary": "SUSE Bug 920571", "url": "https://bugzilla.suse.com/920571" }, { "category": "self", "summary": "SUSE Bug 924018", "url": "https://bugzilla.suse.com/924018" }, { "category": "self", "summary": "SUSE Bug 929339", "url": "https://bugzilla.suse.com/929339" }, { "category": "self", "summary": "SUSE Bug 932267", "url": "https://bugzilla.suse.com/932267" }, { "category": "self", "summary": "SUSE Bug 932770", "url": "https://bugzilla.suse.com/932770" }, { "category": "self", "summary": "SUSE CVE CVE-2013-2016 page", "url": "https://www.suse.com/security/cve/CVE-2013-2016/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4344 page", "url": "https://www.suse.com/security/cve/CVE-2013-4344/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4541 page", "url": "https://www.suse.com/security/cve/CVE-2013-4541/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0142 page", "url": "https://www.suse.com/security/cve/CVE-2014-0142/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0143 page", "url": "https://www.suse.com/security/cve/CVE-2014-0143/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0144 page", "url": "https://www.suse.com/security/cve/CVE-2014-0144/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0145 page", "url": "https://www.suse.com/security/cve/CVE-2014-0145/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0146 page", "url": "https://www.suse.com/security/cve/CVE-2014-0146/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0147 page", "url": "https://www.suse.com/security/cve/CVE-2014-0147/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0150 page", "url": "https://www.suse.com/security/cve/CVE-2014-0150/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0222 page", "url": "https://www.suse.com/security/cve/CVE-2014-0222/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0223 page", "url": "https://www.suse.com/security/cve/CVE-2014-0223/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-2894 page", "url": "https://www.suse.com/security/cve/CVE-2014-2894/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3461 page", "url": "https://www.suse.com/security/cve/CVE-2014-3461/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1779 page", "url": "https://www.suse.com/security/cve/CVE-2015-1779/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3209 page", "url": "https://www.suse.com/security/cve/CVE-2015-3209/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3456 page", "url": "https://www.suse.com/security/cve/CVE-2015-3456/" } ], "title": "Security update for kvm", "tracking": { "current_release_date": "2014-09-19T14:41:45Z", "generator": { "date": "2014-09-19T14:41:45Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2015:0870-1", "initial_release_date": "2014-09-19T14:41:45Z", "revision_history": [ { "date": "2014-09-19T14:41:45Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kvm-1.4.2-0.17.1.i586", "product": { "name": "kvm-1.4.2-0.17.1.i586", "product_id": "kvm-1.4.2-0.17.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "kvm-1.4.2-0.17.1.s390x", "product": { "name": "kvm-1.4.2-0.17.1.s390x", "product_id": "kvm-1.4.2-0.17.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kvm-1.4.2-0.17.1.x86_64", "product": { "name": "kvm-1.4.2-0.17.1.x86_64", "product_id": "kvm-1.4.2-0.17.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 11 SP3", "product": { "name": "SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sled:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3", "product": { "name": "SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product": { "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:11:sp3:teradata" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:11:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-0.17.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586" }, "product_reference": "kvm-1.4.2-0.17.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-0.17.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64" }, "product_reference": "kvm-1.4.2-0.17.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-0.17.1.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586" }, "product_reference": "kvm-1.4.2-0.17.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-0.17.1.s390x as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x" }, "product_reference": "kvm-1.4.2-0.17.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-0.17.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64" }, "product_reference": "kvm-1.4.2-0.17.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-0.17.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586" }, "product_reference": "kvm-1.4.2-0.17.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-0.17.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x" }, "product_reference": "kvm-1.4.2-0.17.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-0.17.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64" }, "product_reference": "kvm-1.4.2-0.17.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-0.17.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586" }, "product_reference": "kvm-1.4.2-0.17.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-0.17.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x" }, "product_reference": "kvm-1.4.2-0.17.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-0.17.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" }, "product_reference": "kvm-1.4.2-0.17.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-2016", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-2016" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way qemu v1.3.0 and later (virtio-rng) validates addresses when guest accesses the config space of a virtio device. If the virtio device has zero/small sized config space, such as virtio-rng, a privileged guest user could use this flaw to access the matching host\u0027s qemu address space and thus increase their privileges on the host.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-2016", "url": "https://www.suse.com/security/cve/CVE-2013-2016" }, { "category": "external", "summary": "SUSE Bug 817593 for CVE-2013-2016", "url": "https://bugzilla.suse.com/817593" }, { "category": "external", "summary": "SUSE Bug 871442 for CVE-2013-2016", "url": "https://bugzilla.suse.com/871442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "important" } ], "title": "CVE-2013-2016" }, { "cve": "CVE-2013-4344", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4344" } ], "notes": [ { "category": "general", "text": "Buffer overflow in the SCSI implementation in QEMU, as used in Xen, when a SCSI controller has more than 256 attached devices, allows local users to gain privileges via a small transfer buffer in a REPORT LUNS command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4344", "url": "https://www.suse.com/security/cve/CVE-2013-4344" }, { "category": "external", "summary": "SUSE Bug 842006 for CVE-2013-4344", "url": "https://bugzilla.suse.com/842006" }, { "category": "external", "summary": "SUSE Bug 871442 for CVE-2013-4344", "url": "https://bugzilla.suse.com/871442" }, { "category": "external", "summary": "SUSE Bug 880751 for CVE-2013-4344", "url": "https://bugzilla.suse.com/880751" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2013-4344" }, { "cve": "CVE-2013-4541", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4541" } ], "notes": [ { "category": "general", "text": "The usb_device_post_load function in hw/usb/bus.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a crafted savevm image, related to a negative setup_len or setup_index value.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4541", "url": "https://www.suse.com/security/cve/CVE-2013-4541" }, { "category": "external", "summary": "SUSE Bug 864802 for CVE-2013-4541", "url": "https://bugzilla.suse.com/864802" }, { "category": "external", "summary": "SUSE Bug 871442 for CVE-2013-4541", "url": "https://bugzilla.suse.com/871442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2013-4541" }, { "cve": "CVE-2014-0142", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0142" } ], "notes": [ { "category": "general", "text": "QEMU, possibly before 2.0.0, allows local users to cause a denial of service (divide-by-zero error and crash) via a zero value in the (1) tracks field to the seek_to_sector function in block/parallels.c or (2) extent_size field in the bochs function in block/bochs.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0142", "url": "https://www.suse.com/security/cve/CVE-2014-0142" }, { "category": "external", "summary": "SUSE Bug 870439 for CVE-2014-0142", "url": "https://bugzilla.suse.com/870439" }, { "category": "external", "summary": "SUSE Bug 871442 for CVE-2014-0142", "url": "https://bugzilla.suse.com/871442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2014-0142" }, { "cve": "CVE-2014-0143", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0143" } ], "notes": [ { "category": "general", "text": "Multiple integer overflows in the block drivers in QEMU, possibly before 2.0.0, allow local users to cause a denial of service (crash) via a crafted catalog size in (1) the parallels_open function in block/parallels.c or (2) bochs_open function in bochs.c, a large L1 table in the (3) qcow2_snapshot_load_tmp in qcow2-snapshot.c or (4) qcow2_grow_l1_table function in qcow2-cluster.c, (5) a large request in the bdrv_check_byte_request function in block.c and other block drivers, (6) crafted cluster indexes in the get_refcount function in qcow2-refcount.c, or (7) a large number of blocks in the cloop_open function in cloop.c, which trigger buffer overflows, memory corruption, large memory allocations and out-of-bounds read and writes.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0143", "url": "https://www.suse.com/security/cve/CVE-2014-0143" }, { "category": "external", "summary": "SUSE Bug 870439 for CVE-2014-0143", "url": "https://bugzilla.suse.com/870439" }, { "category": "external", "summary": "SUSE Bug 871442 for CVE-2014-0143", "url": "https://bugzilla.suse.com/871442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2014-0143" }, { "cve": "CVE-2014-0144", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0144" } ], "notes": [ { "category": "general", "text": "QEMU before 2.0.0 block drivers for CLOOP, QCOW2 version 2 and various other image formats are vulnerable to potential memory corruptions, integer/buffer overflows or crash caused by missing input validations which could allow a remote user to execute arbitrary code on the host with the privileges of the QEMU process.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0144", "url": "https://www.suse.com/security/cve/CVE-2014-0144" }, { "category": "external", "summary": "SUSE Bug 870439 for CVE-2014-0144", "url": "https://bugzilla.suse.com/870439" }, { "category": "external", "summary": "SUSE Bug 871442 for CVE-2014-0144", "url": "https://bugzilla.suse.com/871442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2014-0144" }, { "cve": "CVE-2014-0145", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0145" } ], "notes": [ { "category": "general", "text": "Multiple buffer overflows in QEMU before 1.7.2 and 2.x before 2.0.0, allow local users to cause a denial of service (crash) or possibly execute arbitrary code via a large (1) L1 table in the qcow2_snapshot_load_tmp in the QCOW 2 block driver (block/qcow2-snapshot.c) or (2) uncompressed chunk, (3) chunk length, or (4) number of sectors in the DMG block driver (block/dmg.c).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0145", "url": "https://www.suse.com/security/cve/CVE-2014-0145" }, { "category": "external", "summary": "SUSE Bug 870439 for CVE-2014-0145", "url": "https://bugzilla.suse.com/870439" }, { "category": "external", "summary": "SUSE Bug 871442 for CVE-2014-0145", "url": "https://bugzilla.suse.com/871442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "important" } ], "title": "CVE-2014-0145" }, { "cve": "CVE-2014-0146", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0146" } ], "notes": [ { "category": "general", "text": "The qcow2_open function in the (block/qcow2.c) in QEMU before 1.7.2 and 2.x before 2.0.0 allows local users to cause a denial of service (NULL pointer dereference) via a crafted image which causes an error, related to the initialization of the snapshot_offset and nb_snapshots fields.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0146", "url": "https://www.suse.com/security/cve/CVE-2014-0146" }, { "category": "external", "summary": "SUSE Bug 870439 for CVE-2014-0146", "url": "https://bugzilla.suse.com/870439" }, { "category": "external", "summary": "SUSE Bug 871442 for CVE-2014-0146", "url": "https://bugzilla.suse.com/871442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2014-0146" }, { "cve": "CVE-2014-0147", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0147" } ], "notes": [ { "category": "general", "text": "Qemu before 1.6.2 block diver for the various disk image formats used by Bochs and for the QCOW version 2 format, are vulnerable to a possible crash caused by signed data types or a logic error while creating QCOW2 snapshots, which leads to incorrectly calling update_refcount() routine.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0147", "url": "https://www.suse.com/security/cve/CVE-2014-0147" }, { "category": "external", "summary": "SUSE Bug 870439 for CVE-2014-0147", "url": "https://bugzilla.suse.com/870439" }, { "category": "external", "summary": "SUSE Bug 871442 for CVE-2014-0147", "url": "https://bugzilla.suse.com/871442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2014-0147" }, { "cve": "CVE-2014-0150", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0150" } ], "notes": [ { "category": "general", "text": "Integer overflow in the virtio_net_handle_mac function in hw/net/virtio-net.c in QEMU 2.0 and earlier allows local guest users to execute arbitrary code via a MAC addresses table update request, which triggers a heap-based buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0150", "url": "https://www.suse.com/security/cve/CVE-2014-0150" }, { "category": "external", "summary": "SUSE Bug 873235 for CVE-2014-0150", "url": "https://bugzilla.suse.com/873235" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2014-0150" }, { "cve": "CVE-2014-0222", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0222" } ], "notes": [ { "category": "general", "text": "Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0222", "url": "https://www.suse.com/security/cve/CVE-2014-0222" }, { "category": "external", "summary": "SUSE Bug 1072223 for CVE-2014-0222", "url": "https://bugzilla.suse.com/1072223" }, { "category": "external", "summary": "SUSE Bug 877642 for CVE-2014-0222", "url": "https://bugzilla.suse.com/877642" }, { "category": "external", "summary": "SUSE Bug 950367 for CVE-2014-0222", "url": "https://bugzilla.suse.com/950367" }, { "category": "external", "summary": "SUSE Bug 964925 for CVE-2014-0222", "url": "https://bugzilla.suse.com/964925" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2014-0222" }, { "cve": "CVE-2014-0223", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0223" } ], "notes": [ { "category": "general", "text": "Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a large image size, which triggers a buffer overflow or out-of-bounds read.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0223", "url": "https://www.suse.com/security/cve/CVE-2014-0223" }, { "category": "external", "summary": "SUSE Bug 877645 for CVE-2014-0223", "url": "https://bugzilla.suse.com/877645" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2014-0223" }, { "cve": "CVE-2014-2894", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-2894" } ], "notes": [ { "category": "general", "text": "Off-by-one error in the cmd_smart function in the smart self test in hw/ide/core.c in QEMU before 2.0 allows local users to have unspecified impact via a SMART EXECUTE OFFLINE command that triggers a buffer underflow and memory corruption.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-2894", "url": "https://www.suse.com/security/cve/CVE-2014-2894" }, { "category": "external", "summary": "SUSE Bug 874749 for CVE-2014-2894", "url": "https://bugzilla.suse.com/874749" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2014-2894" }, { "cve": "CVE-2014-3461", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3461" } ], "notes": [ { "category": "general", "text": "hw/usb/bus.c in QEMU 1.6.2 allows remote attackers to execute arbitrary code via crafted savevm data, which triggers a heap-based buffer overflow, related to \"USB post load checks.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3461", "url": "https://www.suse.com/security/cve/CVE-2014-3461" }, { "category": "external", "summary": "SUSE Bug 878541 for CVE-2014-3461", "url": "https://bugzilla.suse.com/878541" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2014-3461" }, { "cve": "CVE-2015-1779", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1779" } ], "notes": [ { "category": "general", "text": "The VNC websocket frame decoder in QEMU allows remote attackers to cause a denial of service (memory and CPU consumption) via a large (1) websocket payload or (2) HTTP headers section.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1779", "url": "https://www.suse.com/security/cve/CVE-2015-1779" }, { "category": "external", "summary": "SUSE Bug 924018 for CVE-2015-1779", "url": "https://bugzilla.suse.com/924018" }, { "category": "external", "summary": "SUSE Bug 962632 for CVE-2015-1779", "url": "https://bugzilla.suse.com/962632" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2015-1779" }, { "cve": "CVE-2015-3209", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3209" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3209", "url": "https://www.suse.com/security/cve/CVE-2015-3209" }, { "category": "external", "summary": "SUSE Bug 932267 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932267" }, { "category": "external", "summary": "SUSE Bug 932770 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932770" }, { "category": "external", "summary": "SUSE Bug 932823 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932823" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "important" } ], "title": "CVE-2015-3209" }, { "cve": "CVE-2015-3456", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3456" } ], "notes": [ { "category": "general", "text": "The Floppy Disk Controller (FDC) in QEMU, as used in Xen 4.5.x and earlier and KVM, allows local guest users to cause a denial of service (out-of-bounds write and guest crash) or possibly execute arbitrary code via the (1) FD_CMD_READ_ID, (2) FD_CMD_DRIVE_SPECIFICATION_COMMAND, or other unspecified commands, aka VENOM.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3456", "url": "https://www.suse.com/security/cve/CVE-2015-3456" }, { "category": "external", "summary": "SUSE Bug 929339 for CVE-2015-3456", "url": "https://bugzilla.suse.com/929339" }, { "category": "external", "summary": "SUSE Bug 932770 for CVE-2015-3456", "url": "https://bugzilla.suse.com/932770" }, { "category": "external", "summary": "SUSE Bug 935900 for CVE-2015-3456", "url": "https://bugzilla.suse.com/935900" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2015-3456" } ] }
suse-su-2015:1157-1
Vulnerability from csaf_suse
Published
2015-06-05 12:47
Modified
2015-06-05 12:47
Summary
Security update for Xen
Notes
Title of the patch
Security update for Xen
Description of the patch
Xen was updated to fix six security issues:
* CVE-2015-4103: Potential unintended writes to host MSI message data
field via qemu. (XSA-128, bsc#931625)
* CVE-2015-4104: PCI MSI mask bits inadvertently exposed to guests.
(XSA-129, bsc#931626)
* CVE-2015-4105: Guest triggerable qemu MSI-X pass-through error
messages. (XSA-130, bsc#931627)
* CVE-2015-4106: Unmediated PCI register access in qemu. (XSA-131,
bsc#931628)
* CVE-2015-3209: Heap overflow in qemu pcnet controller allowing guest
to host escape. (XSA-135, bsc#932770)
* CVE-2015-4164: DoS through iret hypercall handler. (XSA-136,
bsc#932996)
Security Issues:
* CVE-2015-4103
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4103>
* CVE-2015-4104
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4104>
* CVE-2015-4105
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4105>
* CVE-2015-4106
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4106>
* CVE-2015-4163
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4163>
* CVE-2015-4164
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4164>
* CVE-2015-3209
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3209>
Patchnames
slessp2-xen-201506
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Xen", "title": "Title of the patch" }, { "category": "description", "text": "\nXen was updated to fix six security issues:\n\n * CVE-2015-4103: Potential unintended writes to host MSI message data\n field via qemu. (XSA-128, bsc#931625)\n * CVE-2015-4104: PCI MSI mask bits inadvertently exposed to guests.\n (XSA-129, bsc#931626)\n * CVE-2015-4105: Guest triggerable qemu MSI-X pass-through error\n messages. (XSA-130, bsc#931627)\n * CVE-2015-4106: Unmediated PCI register access in qemu. (XSA-131,\n bsc#931628)\n * CVE-2015-3209: Heap overflow in qemu pcnet controller allowing guest\n to host escape. (XSA-135, bsc#932770)\n * CVE-2015-4164: DoS through iret hypercall handler. (XSA-136,\n bsc#932996)\n\nSecurity Issues:\n\n * CVE-2015-4103\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4103\u003e\n * CVE-2015-4104\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4104\u003e\n * CVE-2015-4105\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4105\u003e\n * CVE-2015-4106\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4106\u003e\n * CVE-2015-4163\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4163\u003e\n * CVE-2015-4164\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4164\u003e\n * CVE-2015-3209\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3209\u003e\n\n", "title": "Description of the patch" }, { "category": "details", "text": "slessp2-xen-201506", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_1157-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2015:1157-1", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20151157-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2015:1157-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-June/001468.html" }, { "category": "self", "summary": "SUSE Bug 931625", "url": "https://bugzilla.suse.com/931625" }, { "category": "self", "summary": "SUSE Bug 931626", "url": "https://bugzilla.suse.com/931626" }, { "category": "self", "summary": "SUSE Bug 931627", "url": "https://bugzilla.suse.com/931627" }, { "category": "self", "summary": "SUSE Bug 931628", "url": "https://bugzilla.suse.com/931628" }, { "category": "self", "summary": "SUSE Bug 932770", "url": "https://bugzilla.suse.com/932770" }, { "category": "self", "summary": "SUSE Bug 932996", "url": "https://bugzilla.suse.com/932996" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3209 page", "url": "https://www.suse.com/security/cve/CVE-2015-3209/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4103 page", "url": "https://www.suse.com/security/cve/CVE-2015-4103/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4104 page", "url": "https://www.suse.com/security/cve/CVE-2015-4104/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4105 page", "url": "https://www.suse.com/security/cve/CVE-2015-4105/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4106 page", "url": "https://www.suse.com/security/cve/CVE-2015-4106/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4163 page", "url": "https://www.suse.com/security/cve/CVE-2015-4163/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4164 page", "url": "https://www.suse.com/security/cve/CVE-2015-4164/" } ], "title": "Security update for Xen", "tracking": { "current_release_date": "2015-06-05T12:47:22Z", "generator": { "date": "2015-06-05T12:47:22Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2015:1157-1", "initial_release_date": "2015-06-05T12:47:22Z", "revision_history": [ { "date": "2015-06-05T12:47:22Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-devel-4.1.6_08-0.13.1.i586", "product": { "name": "xen-devel-4.1.6_08-0.13.1.i586", "product_id": "xen-devel-4.1.6_08-0.13.1.i586" } }, { "category": "product_version", "name": "xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "product": { "name": "xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "product_id": "xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.i586" } }, { "category": "product_version", "name": "xen-kmp-pae-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "product": { "name": "xen-kmp-pae-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "product_id": "xen-kmp-pae-4.1.6_08_3.0.101_0.7.29-0.13.1.i586" } }, { "category": "product_version", "name": "xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "product": { "name": "xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "product_id": "xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.i586" } }, { "category": "product_version", "name": "xen-libs-4.1.6_08-0.13.1.i586", "product": { "name": "xen-libs-4.1.6_08-0.13.1.i586", "product_id": "xen-libs-4.1.6_08-0.13.1.i586" } }, { "category": "product_version", "name": "xen-tools-domU-4.1.6_08-0.13.1.i586", "product": { "name": "xen-tools-domU-4.1.6_08-0.13.1.i586", "product_id": "xen-tools-domU-4.1.6_08-0.13.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "xen-4.1.6_08-0.13.1.x86_64", "product": { "name": "xen-4.1.6_08-0.13.1.x86_64", "product_id": "xen-4.1.6_08-0.13.1.x86_64" } }, { "category": "product_version", "name": "xen-devel-4.1.6_08-0.13.1.x86_64", "product": { "name": "xen-devel-4.1.6_08-0.13.1.x86_64", "product_id": "xen-devel-4.1.6_08-0.13.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.1.6_08-0.13.1.x86_64", "product": { "name": "xen-doc-html-4.1.6_08-0.13.1.x86_64", "product_id": "xen-doc-html-4.1.6_08-0.13.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-pdf-4.1.6_08-0.13.1.x86_64", "product": { "name": "xen-doc-pdf-4.1.6_08-0.13.1.x86_64", "product_id": "xen-doc-pdf-4.1.6_08-0.13.1.x86_64" } }, { "category": "product_version", "name": "xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "product": { "name": "xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "product_id": "xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64" } }, { "category": "product_version", "name": "xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "product": { "name": "xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "product_id": "xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.1.6_08-0.13.1.x86_64", "product": { "name": "xen-libs-4.1.6_08-0.13.1.x86_64", "product_id": "xen-libs-4.1.6_08-0.13.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.1.6_08-0.13.1.x86_64", "product": { "name": "xen-libs-32bit-4.1.6_08-0.13.1.x86_64", "product_id": "xen-libs-32bit-4.1.6_08-0.13.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.1.6_08-0.13.1.x86_64", "product": { "name": "xen-tools-4.1.6_08-0.13.1.x86_64", "product_id": "xen-tools-4.1.6_08-0.13.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.1.6_08-0.13.1.x86_64", "product": { "name": "xen-tools-domU-4.1.6_08-0.13.1.x86_64", "product_id": "xen-tools-domU-4.1.6_08-0.13.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles_ltss:11:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-4.1.6_08-0.13.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-0.13.1.x86_64" }, "product_reference": "xen-4.1.6_08-0.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.1.6_08-0.13.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.i586" }, "product_reference": "xen-devel-4.1.6_08-0.13.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.1.6_08-0.13.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.x86_64" }, "product_reference": "xen-devel-4.1.6_08-0.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.1.6_08-0.13.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-0.13.1.x86_64" }, "product_reference": "xen-doc-html-4.1.6_08-0.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-pdf-4.1.6_08-0.13.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-0.13.1.x86_64" }, "product_reference": "xen-doc-pdf-4.1.6_08-0.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.i586" }, "product_reference": "xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64" }, "product_reference": "xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-pae-4.1.6_08_3.0.101_0.7.29-0.13.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.29-0.13.1.i586" }, "product_reference": "xen-kmp-pae-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.i586" }, "product_reference": "xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64" }, "product_reference": "xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.1.6_08-0.13.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.i586" }, "product_reference": "xen-libs-4.1.6_08-0.13.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.1.6_08-0.13.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.x86_64" }, "product_reference": "xen-libs-4.1.6_08-0.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.1.6_08-0.13.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-0.13.1.x86_64" }, "product_reference": "xen-libs-32bit-4.1.6_08-0.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.1.6_08-0.13.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-0.13.1.x86_64" }, "product_reference": "xen-tools-4.1.6_08-0.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.1.6_08-0.13.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.i586" }, "product_reference": "xen-tools-domU-4.1.6_08-0.13.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.1.6_08-0.13.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.x86_64" }, "product_reference": "xen-tools-domU-4.1.6_08-0.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-3209", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3209" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3209", "url": "https://www.suse.com/security/cve/CVE-2015-3209" }, { "category": "external", "summary": "SUSE Bug 932267 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932267" }, { "category": "external", "summary": "SUSE Bug 932770 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932770" }, { "category": "external", "summary": "SUSE Bug 932823 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932823" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-05T12:47:22Z", "details": "important" } ], "title": "CVE-2015-3209" }, { "cve": "CVE-2015-4103", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4103" } ], "notes": [ { "category": "general", "text": "Xen 3.3.x through 4.5.x does not properly restrict write access to the host MSI message data field, which allows local x86 HVM guest administrators to cause a denial of service (host interrupt handling confusion) via vectors related to qemu and accessing spanning multiple fields.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4103", "url": "https://www.suse.com/security/cve/CVE-2015-4103" }, { "category": "external", "summary": "SUSE Bug 931625 for CVE-2015-4103", "url": "https://bugzilla.suse.com/931625" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-05T12:47:22Z", "details": "moderate" } ], "title": "CVE-2015-4103" }, { "cve": "CVE-2015-4104", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4104" } ], "notes": [ { "category": "general", "text": "Xen 3.3.x through 4.5.x does not properly restrict access to PCI MSI mask bits, which allows local x86 HVM guest users to cause a denial of service (unexpected interrupt and host crash) via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4104", "url": "https://www.suse.com/security/cve/CVE-2015-4104" }, { "category": "external", "summary": "SUSE Bug 931626 for CVE-2015-4104", "url": "https://bugzilla.suse.com/931626" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-05T12:47:22Z", "details": "important" } ], "title": "CVE-2015-4104" }, { "cve": "CVE-2015-4105", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4105" } ], "notes": [ { "category": "general", "text": "Xen 3.3.x through 4.5.x enables logging for PCI MSI-X pass-through error messages, which allows local x86 HVM guests to cause a denial of service (host disk consumption) via certain invalid operations.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4105", "url": "https://www.suse.com/security/cve/CVE-2015-4105" }, { "category": "external", "summary": "SUSE Bug 931627 for CVE-2015-4105", "url": "https://bugzilla.suse.com/931627" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-05T12:47:22Z", "details": "moderate" } ], "title": "CVE-2015-4105" }, { "cve": "CVE-2015-4106", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4106" } ], "notes": [ { "category": "general", "text": "QEMU does not properly restrict write access to the PCI config space for certain PCI pass-through devices, which might allow local x86 HVM guests to gain privileges, cause a denial of service (host crash), obtain sensitive information, or possibly have other unspecified impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4106", "url": "https://www.suse.com/security/cve/CVE-2015-4106" }, { "category": "external", "summary": "SUSE Bug 931628 for CVE-2015-4106", "url": "https://bugzilla.suse.com/931628" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-05T12:47:22Z", "details": "moderate" } ], "title": "CVE-2015-4106" }, { "cve": "CVE-2015-4163", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4163" } ], "notes": [ { "category": "general", "text": "GNTTABOP_swap_grant_ref in Xen 4.2 through 4.5 does not check the grant table operation version, which allows local guest domains to cause a denial of service (NULL pointer dereference) via a hypercall without a GNTTABOP_setup_table or GNTTABOP_set_version.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4163", "url": "https://www.suse.com/security/cve/CVE-2015-4163" }, { "category": "external", "summary": "SUSE Bug 932790 for CVE-2015-4163", "url": "https://bugzilla.suse.com/932790" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-05T12:47:22Z", "details": "moderate" } ], "title": "CVE-2015-4163" }, { "cve": "CVE-2015-4164", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4164" } ], "notes": [ { "category": "general", "text": "The compat_iret function in Xen 3.1 through 4.5 iterates the wrong way through a loop, which allows local 32-bit PV guest administrators to cause a denial of service (large loop and system hang) via a hypercall_iret call with EFLAGS.VM set.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4164", "url": "https://www.suse.com/security/cve/CVE-2015-4164" }, { "category": "external", "summary": "SUSE Bug 932996 for CVE-2015-4164", "url": "https://bugzilla.suse.com/932996" }, { "category": "external", "summary": "SUSE Bug 950367 for CVE-2015-4164", "url": "https://bugzilla.suse.com/950367" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-05T12:47:22Z", "details": "moderate" } ], "title": "CVE-2015-4164" } ] }
suse-su-2015:1426-1
Vulnerability from csaf_suse
Published
2015-08-07 17:46
Modified
2015-08-07 17:46
Summary
Security update for kvm
Notes
Title of the patch
Security update for kvm
Description of the patch
kvm was updated to fix two security issues.
The following vulnerabilities were fixed:
- CVE-2015-5154: Host code execution via IDE subsystem CD-ROM (bsc#938344).
- CVE-2015-3209: Fix buffer overflow in pcnet emulation (bsc#932770).
Patchnames
slessp2-kvm-12041
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for kvm", "title": "Title of the patch" }, { "category": "description", "text": "kvm was updated to fix two security issues.\n\nThe following vulnerabilities were fixed:\n\n- CVE-2015-5154: Host code execution via IDE subsystem CD-ROM (bsc#938344).\n- CVE-2015-3209: Fix buffer overflow in pcnet emulation (bsc#932770).\n", "title": "Description of the patch" }, { "category": "details", "text": "slessp2-kvm-12041", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_1426-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2015:1426-1", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20151426-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2015:1426-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-August/001550.html" }, { "category": "self", "summary": "SUSE Bug 932770", "url": "https://bugzilla.suse.com/932770" }, { "category": "self", "summary": "SUSE Bug 938344", "url": "https://bugzilla.suse.com/938344" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3209 page", "url": "https://www.suse.com/security/cve/CVE-2015-3209/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5154 page", "url": "https://www.suse.com/security/cve/CVE-2015-5154/" } ], "title": "Security update for kvm", "tracking": { "current_release_date": "2015-08-07T17:46:18Z", "generator": { "date": "2015-08-07T17:46:18Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2015:1426-1", "initial_release_date": "2015-08-07T17:46:18Z", "revision_history": [ { "date": "2015-08-07T17:46:18Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kvm-0.15.1-0.32.2.i586", "product": { "name": "kvm-0.15.1-0.32.2.i586", "product_id": "kvm-0.15.1-0.32.2.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "kvm-0.15.1-0.32.2.x86_64", "product": { "name": "kvm-0.15.1-0.32.2.x86_64", "product_id": "kvm-0.15.1-0.32.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles_ltss:11:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kvm-0.15.1-0.32.2.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kvm-0.15.1-0.32.2.i586" }, "product_reference": "kvm-0.15.1-0.32.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-0.15.1-0.32.2.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kvm-0.15.1-0.32.2.x86_64" }, "product_reference": "kvm-0.15.1-0.32.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-3209", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3209" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kvm-0.15.1-0.32.2.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kvm-0.15.1-0.32.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3209", "url": "https://www.suse.com/security/cve/CVE-2015-3209" }, { "category": "external", "summary": "SUSE Bug 932267 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932267" }, { "category": "external", "summary": "SUSE Bug 932770 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932770" }, { "category": "external", "summary": "SUSE Bug 932823 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932823" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kvm-0.15.1-0.32.2.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kvm-0.15.1-0.32.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-08-07T17:46:18Z", "details": "important" } ], "title": "CVE-2015-3209" }, { "cve": "CVE-2015-5154", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5154" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the IDE subsystem in QEMU, as used in Xen 4.5.x and earlier, when the container has a CDROM drive enabled, allows local guest users to execute arbitrary code on the host via unspecified ATAPI commands.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kvm-0.15.1-0.32.2.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kvm-0.15.1-0.32.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5154", "url": "https://www.suse.com/security/cve/CVE-2015-5154" }, { "category": "external", "summary": "SUSE Bug 938344 for CVE-2015-5154", "url": "https://bugzilla.suse.com/938344" }, { "category": "external", "summary": "SUSE Bug 950367 for CVE-2015-5154", "url": "https://bugzilla.suse.com/950367" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kvm-0.15.1-0.32.2.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kvm-0.15.1-0.32.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-08-07T17:46:18Z", "details": "important" } ], "title": "CVE-2015-5154" } ] }
suse-su-2015:1042-1
Vulnerability from csaf_suse
Published
2015-06-03 12:47
Modified
2015-06-03 12:47
Summary
Security update for xen
Notes
Title of the patch
Security update for xen
Description of the patch
Xen was updated to fix seven security issues and one non-security bug.
The following vulnerabilities were fixed:
* CVE-2015-4103: Potential unintended writes to host MSI message data field via qemu (XSA-128) (bnc#931625)
* CVE-2015-4104: PCI MSI mask bits inadvertently exposed to guests (XSA-129) (bnc#931626)
* CVE-2015-4105: Guest triggerable qemu MSI-X pass-through error messages (XSA-130) (bnc#931627)
* CVE-2015-4106: Unmediated PCI register access in qemu (XSA-131) (bnc#931628)
* CVE-2015-4163: GNTTABOP_swap_grant_ref operation misbehavior (XSA-134) (bnc#932790)
* CVE-2015-3209: heap overflow in qemu pcnet controller allowing guest to host escape (XSA-135) (bnc#932770)
* CVE-2015-4164: DoS through iret hypercall handler (XSA-136) (bnc#932996)
The following non-security bug was fixed:
* bnc#906689: let systemd schedule xencommons after network-online.target and remote-fs.target so that xendomains has access to remote shares
Patchnames
SUSE-SLE-DESKTOP-12-2015-262,SUSE-SLE-SDK-12-2015-262,SUSE-SLE-SERVER-12-2015-262
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "Xen was updated to fix seven security issues and one non-security bug.\n\nThe following vulnerabilities were fixed:\n\n* CVE-2015-4103: Potential unintended writes to host MSI message data field via qemu (XSA-128) (bnc#931625)\n* CVE-2015-4104: PCI MSI mask bits inadvertently exposed to guests (XSA-129) (bnc#931626)\n* CVE-2015-4105: Guest triggerable qemu MSI-X pass-through error messages (XSA-130) (bnc#931627)\n* CVE-2015-4106: Unmediated PCI register access in qemu (XSA-131) (bnc#931628)\n* CVE-2015-4163: GNTTABOP_swap_grant_ref operation misbehavior (XSA-134) (bnc#932790)\n* CVE-2015-3209: heap overflow in qemu pcnet controller allowing guest to host escape (XSA-135) (bnc#932770)\n* CVE-2015-4164: DoS through iret hypercall handler (XSA-136) (bnc#932996)\n\nThe following non-security bug was fixed:\n\n* bnc#906689: let systemd schedule xencommons after network-online.target and remote-fs.target so that xendomains has access to remote shares\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-DESKTOP-12-2015-262,SUSE-SLE-SDK-12-2015-262,SUSE-SLE-SERVER-12-2015-262", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_1042-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2015:1042-1", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20151042-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2015:1042-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-June/001432.html" }, { "category": "self", "summary": "SUSE Bug 906689", "url": "https://bugzilla.suse.com/906689" }, { "category": "self", "summary": "SUSE Bug 931625", "url": "https://bugzilla.suse.com/931625" }, { "category": "self", "summary": "SUSE Bug 931626", "url": "https://bugzilla.suse.com/931626" }, { "category": "self", "summary": "SUSE Bug 931627", "url": "https://bugzilla.suse.com/931627" }, { "category": "self", "summary": "SUSE Bug 931628", "url": "https://bugzilla.suse.com/931628" }, { "category": "self", "summary": "SUSE Bug 932770", "url": "https://bugzilla.suse.com/932770" }, { "category": "self", "summary": "SUSE Bug 932790", "url": "https://bugzilla.suse.com/932790" }, { "category": "self", "summary": "SUSE Bug 932996", "url": "https://bugzilla.suse.com/932996" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3209 page", "url": "https://www.suse.com/security/cve/CVE-2015-3209/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4103 page", "url": "https://www.suse.com/security/cve/CVE-2015-4103/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4104 page", "url": "https://www.suse.com/security/cve/CVE-2015-4104/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4105 page", "url": "https://www.suse.com/security/cve/CVE-2015-4105/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4106 page", "url": "https://www.suse.com/security/cve/CVE-2015-4106/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4163 page", "url": "https://www.suse.com/security/cve/CVE-2015-4163/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4164 page", "url": "https://www.suse.com/security/cve/CVE-2015-4164/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2015-06-03T12:47:57Z", "generator": { "date": "2015-06-03T12:47:57Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2015:1042-1", "initial_release_date": "2015-06-03T12:47:57Z", "revision_history": [ { "date": "2015-06-03T12:47:57Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-4.4.2_06-21.1.x86_64", "product": { "name": "xen-4.4.2_06-21.1.x86_64", "product_id": "xen-4.4.2_06-21.1.x86_64" } }, { "category": "product_version", "name": "xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "product": { "name": "xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "product_id": "xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.4.2_06-21.1.x86_64", "product": { "name": "xen-libs-4.4.2_06-21.1.x86_64", "product_id": "xen-libs-4.4.2_06-21.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.4.2_06-21.1.x86_64", "product": { "name": "xen-libs-32bit-4.4.2_06-21.1.x86_64", "product_id": "xen-libs-32bit-4.4.2_06-21.1.x86_64" } }, { "category": "product_version", "name": "xen-devel-4.4.2_06-21.1.x86_64", "product": { "name": "xen-devel-4.4.2_06-21.1.x86_64", "product_id": "xen-devel-4.4.2_06-21.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.4.2_06-21.1.x86_64", "product": { "name": "xen-doc-html-4.4.2_06-21.1.x86_64", "product_id": "xen-doc-html-4.4.2_06-21.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.4.2_06-21.1.x86_64", "product": { "name": "xen-tools-4.4.2_06-21.1.x86_64", "product_id": "xen-tools-4.4.2_06-21.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.4.2_06-21.1.x86_64", "product": { "name": "xen-tools-domU-4.4.2_06-21.1.x86_64", "product_id": "xen-tools-domU-4.4.2_06-21.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12", "product": { "name": "SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12", "product_id": "SUSE Linux Enterprise Software Development Kit 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12", "product": { "name": "SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-4.4.2_06-21.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:xen-4.4.2_06-21.1.x86_64" }, "product_reference": "xen-4.4.2_06-21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64" }, "product_reference": "xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.4.2_06-21.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:xen-libs-4.4.2_06-21.1.x86_64" }, "product_reference": "xen-libs-4.4.2_06-21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.4.2_06-21.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:xen-libs-32bit-4.4.2_06-21.1.x86_64" }, "product_reference": "xen-libs-32bit-4.4.2_06-21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.4.2_06-21.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12", "product_id": "SUSE Linux Enterprise Software Development Kit 12:xen-devel-4.4.2_06-21.1.x86_64" }, "product_reference": "xen-devel-4.4.2_06-21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.4.2_06-21.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:xen-4.4.2_06-21.1.x86_64" }, "product_reference": "xen-4.4.2_06-21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.4.2_06-21.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:xen-doc-html-4.4.2_06-21.1.x86_64" }, "product_reference": "xen-doc-html-4.4.2_06-21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64" }, "product_reference": "xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.4.2_06-21.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:xen-libs-4.4.2_06-21.1.x86_64" }, "product_reference": "xen-libs-4.4.2_06-21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.4.2_06-21.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:xen-libs-32bit-4.4.2_06-21.1.x86_64" }, "product_reference": "xen-libs-32bit-4.4.2_06-21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.4.2_06-21.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:xen-tools-4.4.2_06-21.1.x86_64" }, "product_reference": "xen-tools-4.4.2_06-21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.4.2_06-21.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:xen-tools-domU-4.4.2_06-21.1.x86_64" }, "product_reference": "xen-tools-domU-4.4.2_06-21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.4.2_06-21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.2_06-21.1.x86_64" }, "product_reference": "xen-4.4.2_06-21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.4.2_06-21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.2_06-21.1.x86_64" }, "product_reference": "xen-doc-html-4.4.2_06-21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64" }, "product_reference": "xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.4.2_06-21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.2_06-21.1.x86_64" }, "product_reference": "xen-libs-4.4.2_06-21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.4.2_06-21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.2_06-21.1.x86_64" }, "product_reference": "xen-libs-32bit-4.4.2_06-21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.4.2_06-21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.2_06-21.1.x86_64" }, "product_reference": "xen-tools-4.4.2_06-21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.4.2_06-21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.2_06-21.1.x86_64" }, "product_reference": "xen-tools-domU-4.4.2_06-21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-3209", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3209" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:xen-devel-4.4.2_06-21.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3209", "url": "https://www.suse.com/security/cve/CVE-2015-3209" }, { "category": "external", "summary": "SUSE Bug 932267 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932267" }, { "category": "external", "summary": "SUSE Bug 932770 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932770" }, { "category": "external", "summary": "SUSE Bug 932823 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932823" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:xen-devel-4.4.2_06-21.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-03T12:47:57Z", "details": "important" } ], "title": "CVE-2015-3209" }, { "cve": "CVE-2015-4103", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4103" } ], "notes": [ { "category": "general", "text": "Xen 3.3.x through 4.5.x does not properly restrict write access to the host MSI message data field, which allows local x86 HVM guest administrators to cause a denial of service (host interrupt handling confusion) via vectors related to qemu and accessing spanning multiple fields.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:xen-devel-4.4.2_06-21.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4103", "url": "https://www.suse.com/security/cve/CVE-2015-4103" }, { "category": "external", "summary": "SUSE Bug 931625 for CVE-2015-4103", "url": "https://bugzilla.suse.com/931625" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:xen-devel-4.4.2_06-21.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-03T12:47:57Z", "details": "moderate" } ], "title": "CVE-2015-4103" }, { "cve": "CVE-2015-4104", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4104" } ], "notes": [ { "category": "general", "text": "Xen 3.3.x through 4.5.x does not properly restrict access to PCI MSI mask bits, which allows local x86 HVM guest users to cause a denial of service (unexpected interrupt and host crash) via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:xen-devel-4.4.2_06-21.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4104", "url": "https://www.suse.com/security/cve/CVE-2015-4104" }, { "category": "external", "summary": "SUSE Bug 931626 for CVE-2015-4104", "url": "https://bugzilla.suse.com/931626" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:xen-devel-4.4.2_06-21.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-03T12:47:57Z", "details": "important" } ], "title": "CVE-2015-4104" }, { "cve": "CVE-2015-4105", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4105" } ], "notes": [ { "category": "general", "text": "Xen 3.3.x through 4.5.x enables logging for PCI MSI-X pass-through error messages, which allows local x86 HVM guests to cause a denial of service (host disk consumption) via certain invalid operations.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:xen-devel-4.4.2_06-21.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4105", "url": "https://www.suse.com/security/cve/CVE-2015-4105" }, { "category": "external", "summary": "SUSE Bug 931627 for CVE-2015-4105", "url": "https://bugzilla.suse.com/931627" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:xen-devel-4.4.2_06-21.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-03T12:47:57Z", "details": "moderate" } ], "title": "CVE-2015-4105" }, { "cve": "CVE-2015-4106", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4106" } ], "notes": [ { "category": "general", "text": "QEMU does not properly restrict write access to the PCI config space for certain PCI pass-through devices, which might allow local x86 HVM guests to gain privileges, cause a denial of service (host crash), obtain sensitive information, or possibly have other unspecified impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:xen-devel-4.4.2_06-21.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4106", "url": "https://www.suse.com/security/cve/CVE-2015-4106" }, { "category": "external", "summary": "SUSE Bug 931628 for CVE-2015-4106", "url": "https://bugzilla.suse.com/931628" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:xen-devel-4.4.2_06-21.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-03T12:47:57Z", "details": "moderate" } ], "title": "CVE-2015-4106" }, { "cve": "CVE-2015-4163", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4163" } ], "notes": [ { "category": "general", "text": "GNTTABOP_swap_grant_ref in Xen 4.2 through 4.5 does not check the grant table operation version, which allows local guest domains to cause a denial of service (NULL pointer dereference) via a hypercall without a GNTTABOP_setup_table or GNTTABOP_set_version.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:xen-devel-4.4.2_06-21.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4163", "url": "https://www.suse.com/security/cve/CVE-2015-4163" }, { "category": "external", "summary": "SUSE Bug 932790 for CVE-2015-4163", "url": "https://bugzilla.suse.com/932790" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:xen-devel-4.4.2_06-21.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-03T12:47:57Z", "details": "moderate" } ], "title": "CVE-2015-4163" }, { "cve": "CVE-2015-4164", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4164" } ], "notes": [ { "category": "general", "text": "The compat_iret function in Xen 3.1 through 4.5 iterates the wrong way through a loop, which allows local 32-bit PV guest administrators to cause a denial of service (large loop and system hang) via a hypercall_iret call with EFLAGS.VM set.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:xen-devel-4.4.2_06-21.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4164", "url": "https://www.suse.com/security/cve/CVE-2015-4164" }, { "category": "external", "summary": "SUSE Bug 932996 for CVE-2015-4164", "url": "https://bugzilla.suse.com/932996" }, { "category": "external", "summary": "SUSE Bug 950367 for CVE-2015-4164", "url": "https://bugzilla.suse.com/950367" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:xen-devel-4.4.2_06-21.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-03T12:47:57Z", "details": "moderate" } ], "title": "CVE-2015-4164" } ] }
suse-su-2015:1519-1
Vulnerability from csaf_suse
Published
2015-06-08 14:28
Modified
2015-06-08 14:28
Summary
Security update for qemu
Notes
Title of the patch
Security update for qemu
Description of the patch
qemu was updated to fix two security issues and augments one non-security bug fix.
The following vulnerabilities were fixed:
* CVE-2015-3209: heap overflow in qemu pcnet controller allowing guest to host escape (XSA-135) (bsc#932770)
* CVE-2015-4037: Avoid predictable directory name for smb config (bsc#932267)
The fix for the following non-security bug was improved:
* bsc#893892: Use improved upstream patch for display issue affecting installs of SLES 11 VMs on SLES 12
Patchnames
SUSE-SLE-DESKTOP-12-2015-509,SUSE-SLE-SERVER-12-2015-509
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for qemu", "title": "Title of the patch" }, { "category": "description", "text": "qemu was updated to fix two security issues and augments one non-security bug fix.\n\nThe following vulnerabilities were fixed:\n\n* CVE-2015-3209: heap overflow in qemu pcnet controller allowing guest to host escape (XSA-135) (bsc#932770)\n* CVE-2015-4037: Avoid predictable directory name for smb config (bsc#932267)\n\nThe fix for the following non-security bug was improved:\n\n* bsc#893892: Use improved upstream patch for display issue affecting installs of SLES 11 VMs on SLES 12\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-DESKTOP-12-2015-509,SUSE-SLE-SERVER-12-2015-509", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_1519-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2015:1519-1", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20151519-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2015:1519-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-September/001583.html" }, { "category": "self", "summary": "SUSE Bug 893892", "url": "https://bugzilla.suse.com/893892" }, { "category": "self", "summary": "SUSE Bug 932267", "url": "https://bugzilla.suse.com/932267" }, { "category": "self", "summary": "SUSE Bug 932770", "url": "https://bugzilla.suse.com/932770" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3209 page", "url": "https://www.suse.com/security/cve/CVE-2015-3209/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4037 page", "url": "https://www.suse.com/security/cve/CVE-2015-4037/" } ], "title": "Security update for qemu", "tracking": { "current_release_date": "2015-06-08T14:28:12Z", "generator": { "date": "2015-06-08T14:28:12Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2015:1519-1", "initial_release_date": "2015-06-08T14:28:12Z", "revision_history": [ { "date": "2015-06-08T14:28:12Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "qemu-ipxe-1.0.0-48.4.1.noarch", "product": { "name": "qemu-ipxe-1.0.0-48.4.1.noarch", "product_id": "qemu-ipxe-1.0.0-48.4.1.noarch" } }, { "category": "product_version", "name": "qemu-seabios-1.7.4-48.4.1.noarch", "product": { "name": "qemu-seabios-1.7.4-48.4.1.noarch", "product_id": "qemu-seabios-1.7.4-48.4.1.noarch" } }, { "category": "product_version", "name": "qemu-sgabios-8-48.4.1.noarch", "product": { "name": "qemu-sgabios-8-48.4.1.noarch", "product_id": "qemu-sgabios-8-48.4.1.noarch" } }, { "category": "product_version", "name": "qemu-vgabios-1.7.4-48.4.1.noarch", "product": { "name": "qemu-vgabios-1.7.4-48.4.1.noarch", "product_id": "qemu-vgabios-1.7.4-48.4.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "qemu-2.0.2-48.4.1.ppc64le", "product": { "name": "qemu-2.0.2-48.4.1.ppc64le", "product_id": "qemu-2.0.2-48.4.1.ppc64le" } }, { "category": "product_version", "name": "qemu-block-curl-2.0.2-48.4.1.ppc64le", "product": { "name": "qemu-block-curl-2.0.2-48.4.1.ppc64le", "product_id": "qemu-block-curl-2.0.2-48.4.1.ppc64le" } }, { "category": "product_version", "name": "qemu-guest-agent-2.0.2-48.4.1.ppc64le", "product": { "name": "qemu-guest-agent-2.0.2-48.4.1.ppc64le", "product_id": "qemu-guest-agent-2.0.2-48.4.1.ppc64le" } }, { "category": "product_version", "name": "qemu-lang-2.0.2-48.4.1.ppc64le", "product": { "name": "qemu-lang-2.0.2-48.4.1.ppc64le", "product_id": "qemu-lang-2.0.2-48.4.1.ppc64le" } }, { "category": "product_version", "name": "qemu-ppc-2.0.2-48.4.1.ppc64le", "product": { "name": "qemu-ppc-2.0.2-48.4.1.ppc64le", "product_id": "qemu-ppc-2.0.2-48.4.1.ppc64le" } }, { "category": "product_version", "name": "qemu-tools-2.0.2-48.4.1.ppc64le", "product": { "name": "qemu-tools-2.0.2-48.4.1.ppc64le", "product_id": "qemu-tools-2.0.2-48.4.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "qemu-2.0.2-48.4.1.s390x", "product": { "name": "qemu-2.0.2-48.4.1.s390x", "product_id": "qemu-2.0.2-48.4.1.s390x" } }, { "category": "product_version", "name": "qemu-block-curl-2.0.2-48.4.1.s390x", "product": { "name": "qemu-block-curl-2.0.2-48.4.1.s390x", "product_id": "qemu-block-curl-2.0.2-48.4.1.s390x" } }, { "category": "product_version", "name": "qemu-guest-agent-2.0.2-48.4.1.s390x", "product": { "name": "qemu-guest-agent-2.0.2-48.4.1.s390x", "product_id": "qemu-guest-agent-2.0.2-48.4.1.s390x" } }, { "category": "product_version", "name": "qemu-kvm-2.0.2-48.4.1.s390x", "product": { "name": "qemu-kvm-2.0.2-48.4.1.s390x", "product_id": "qemu-kvm-2.0.2-48.4.1.s390x" } }, { "category": "product_version", "name": "qemu-lang-2.0.2-48.4.1.s390x", "product": { "name": "qemu-lang-2.0.2-48.4.1.s390x", "product_id": "qemu-lang-2.0.2-48.4.1.s390x" } }, { "category": "product_version", "name": "qemu-s390-2.0.2-48.4.1.s390x", "product": { "name": "qemu-s390-2.0.2-48.4.1.s390x", "product_id": "qemu-s390-2.0.2-48.4.1.s390x" } }, { "category": "product_version", "name": "qemu-tools-2.0.2-48.4.1.s390x", "product": { "name": "qemu-tools-2.0.2-48.4.1.s390x", "product_id": "qemu-tools-2.0.2-48.4.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "qemu-2.0.2-48.4.1.x86_64", "product": { "name": "qemu-2.0.2-48.4.1.x86_64", "product_id": "qemu-2.0.2-48.4.1.x86_64" } }, { "category": "product_version", "name": "qemu-block-curl-2.0.2-48.4.1.x86_64", "product": { "name": "qemu-block-curl-2.0.2-48.4.1.x86_64", "product_id": "qemu-block-curl-2.0.2-48.4.1.x86_64" } }, { "category": "product_version", "name": "qemu-kvm-2.0.2-48.4.1.x86_64", "product": { "name": "qemu-kvm-2.0.2-48.4.1.x86_64", "product_id": "qemu-kvm-2.0.2-48.4.1.x86_64" } }, { "category": "product_version", "name": "qemu-tools-2.0.2-48.4.1.x86_64", "product": { "name": "qemu-tools-2.0.2-48.4.1.x86_64", "product_id": "qemu-tools-2.0.2-48.4.1.x86_64" } }, { "category": "product_version", "name": "qemu-x86-2.0.2-48.4.1.x86_64", "product": { "name": "qemu-x86-2.0.2-48.4.1.x86_64", "product_id": "qemu-x86-2.0.2-48.4.1.x86_64" } }, { "category": "product_version", "name": "qemu-block-rbd-2.0.2-48.4.1.x86_64", "product": { "name": "qemu-block-rbd-2.0.2-48.4.1.x86_64", "product_id": "qemu-block-rbd-2.0.2-48.4.1.x86_64" } }, { "category": "product_version", "name": "qemu-guest-agent-2.0.2-48.4.1.x86_64", "product": { "name": "qemu-guest-agent-2.0.2-48.4.1.x86_64", "product_id": "qemu-guest-agent-2.0.2-48.4.1.x86_64" } }, { "category": "product_version", "name": "qemu-lang-2.0.2-48.4.1.x86_64", "product": { "name": "qemu-lang-2.0.2-48.4.1.x86_64", "product_id": "qemu-lang-2.0.2-48.4.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12", "product": { "name": "SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12", "product": { "name": "SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "qemu-2.0.2-48.4.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.4.1.x86_64" }, "product_reference": "qemu-2.0.2-48.4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-block-curl-2.0.2-48.4.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.4.1.x86_64" }, "product_reference": "qemu-block-curl-2.0.2-48.4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-ipxe-1.0.0-48.4.1.noarch as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.4.1.noarch" }, "product_reference": "qemu-ipxe-1.0.0-48.4.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2.0.2-48.4.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.4.1.x86_64" }, "product_reference": "qemu-kvm-2.0.2-48.4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-seabios-1.7.4-48.4.1.noarch as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.4.1.noarch" }, "product_reference": "qemu-seabios-1.7.4-48.4.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-sgabios-8-48.4.1.noarch as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.4.1.noarch" }, "product_reference": "qemu-sgabios-8-48.4.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-tools-2.0.2-48.4.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.4.1.x86_64" }, "product_reference": "qemu-tools-2.0.2-48.4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-vgabios-1.7.4-48.4.1.noarch as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.4.1.noarch" }, "product_reference": "qemu-vgabios-1.7.4-48.4.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-x86-2.0.2-48.4.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.4.1.x86_64" }, "product_reference": "qemu-x86-2.0.2-48.4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-2.0.2-48.4.1.ppc64le as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.4.1.ppc64le" }, "product_reference": "qemu-2.0.2-48.4.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-2.0.2-48.4.1.s390x as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.4.1.s390x" }, "product_reference": "qemu-2.0.2-48.4.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-2.0.2-48.4.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.4.1.x86_64" }, "product_reference": "qemu-2.0.2-48.4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-block-curl-2.0.2-48.4.1.ppc64le as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.4.1.ppc64le" }, "product_reference": "qemu-block-curl-2.0.2-48.4.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-block-curl-2.0.2-48.4.1.s390x as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.4.1.s390x" }, "product_reference": "qemu-block-curl-2.0.2-48.4.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-block-curl-2.0.2-48.4.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.4.1.x86_64" }, "product_reference": "qemu-block-curl-2.0.2-48.4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-block-rbd-2.0.2-48.4.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.4.1.x86_64" }, "product_reference": "qemu-block-rbd-2.0.2-48.4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2.0.2-48.4.1.ppc64le as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.4.1.ppc64le" }, "product_reference": "qemu-guest-agent-2.0.2-48.4.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2.0.2-48.4.1.s390x as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.4.1.s390x" }, "product_reference": "qemu-guest-agent-2.0.2-48.4.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2.0.2-48.4.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.4.1.x86_64" }, "product_reference": "qemu-guest-agent-2.0.2-48.4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-ipxe-1.0.0-48.4.1.noarch as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.4.1.noarch" }, "product_reference": "qemu-ipxe-1.0.0-48.4.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2.0.2-48.4.1.s390x as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.4.1.s390x" }, "product_reference": "qemu-kvm-2.0.2-48.4.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2.0.2-48.4.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.4.1.x86_64" }, "product_reference": "qemu-kvm-2.0.2-48.4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-lang-2.0.2-48.4.1.ppc64le as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.4.1.ppc64le" }, "product_reference": "qemu-lang-2.0.2-48.4.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-lang-2.0.2-48.4.1.s390x as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.4.1.s390x" }, "product_reference": "qemu-lang-2.0.2-48.4.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-lang-2.0.2-48.4.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.4.1.x86_64" }, "product_reference": "qemu-lang-2.0.2-48.4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-ppc-2.0.2-48.4.1.ppc64le as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.4.1.ppc64le" }, "product_reference": "qemu-ppc-2.0.2-48.4.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-s390-2.0.2-48.4.1.s390x as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.4.1.s390x" }, "product_reference": "qemu-s390-2.0.2-48.4.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-seabios-1.7.4-48.4.1.noarch as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.4.1.noarch" }, "product_reference": "qemu-seabios-1.7.4-48.4.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-sgabios-8-48.4.1.noarch as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.4.1.noarch" }, "product_reference": "qemu-sgabios-8-48.4.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-tools-2.0.2-48.4.1.ppc64le as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.4.1.ppc64le" }, "product_reference": "qemu-tools-2.0.2-48.4.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-tools-2.0.2-48.4.1.s390x as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.4.1.s390x" }, "product_reference": "qemu-tools-2.0.2-48.4.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-tools-2.0.2-48.4.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.4.1.x86_64" }, "product_reference": "qemu-tools-2.0.2-48.4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-vgabios-1.7.4-48.4.1.noarch as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.4.1.noarch" }, "product_reference": "qemu-vgabios-1.7.4-48.4.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-x86-2.0.2-48.4.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.4.1.x86_64" }, "product_reference": "qemu-x86-2.0.2-48.4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-2.0.2-48.4.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.4.1.ppc64le" }, "product_reference": "qemu-2.0.2-48.4.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-2.0.2-48.4.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.4.1.s390x" }, "product_reference": "qemu-2.0.2-48.4.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-2.0.2-48.4.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.4.1.x86_64" }, "product_reference": "qemu-2.0.2-48.4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-block-curl-2.0.2-48.4.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.4.1.ppc64le" }, "product_reference": "qemu-block-curl-2.0.2-48.4.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-block-curl-2.0.2-48.4.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.4.1.s390x" }, "product_reference": "qemu-block-curl-2.0.2-48.4.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-block-curl-2.0.2-48.4.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.4.1.x86_64" }, "product_reference": "qemu-block-curl-2.0.2-48.4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-block-rbd-2.0.2-48.4.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.4.1.x86_64" }, "product_reference": "qemu-block-rbd-2.0.2-48.4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2.0.2-48.4.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.4.1.ppc64le" }, "product_reference": "qemu-guest-agent-2.0.2-48.4.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2.0.2-48.4.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.4.1.s390x" }, "product_reference": "qemu-guest-agent-2.0.2-48.4.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2.0.2-48.4.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.4.1.x86_64" }, "product_reference": "qemu-guest-agent-2.0.2-48.4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-ipxe-1.0.0-48.4.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.4.1.noarch" }, "product_reference": "qemu-ipxe-1.0.0-48.4.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2.0.2-48.4.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.4.1.s390x" }, "product_reference": "qemu-kvm-2.0.2-48.4.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2.0.2-48.4.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.4.1.x86_64" }, "product_reference": "qemu-kvm-2.0.2-48.4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-lang-2.0.2-48.4.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.4.1.ppc64le" }, "product_reference": "qemu-lang-2.0.2-48.4.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-lang-2.0.2-48.4.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.4.1.s390x" }, "product_reference": "qemu-lang-2.0.2-48.4.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-lang-2.0.2-48.4.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.4.1.x86_64" }, "product_reference": "qemu-lang-2.0.2-48.4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-ppc-2.0.2-48.4.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.4.1.ppc64le" }, "product_reference": "qemu-ppc-2.0.2-48.4.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-s390-2.0.2-48.4.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.4.1.s390x" }, "product_reference": "qemu-s390-2.0.2-48.4.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-seabios-1.7.4-48.4.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.4.1.noarch" }, "product_reference": "qemu-seabios-1.7.4-48.4.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-sgabios-8-48.4.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.4.1.noarch" }, "product_reference": "qemu-sgabios-8-48.4.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-tools-2.0.2-48.4.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.4.1.ppc64le" }, "product_reference": "qemu-tools-2.0.2-48.4.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-tools-2.0.2-48.4.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.4.1.s390x" }, "product_reference": "qemu-tools-2.0.2-48.4.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-tools-2.0.2-48.4.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.4.1.x86_64" }, "product_reference": "qemu-tools-2.0.2-48.4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-vgabios-1.7.4-48.4.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.4.1.noarch" }, "product_reference": "qemu-vgabios-1.7.4-48.4.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-x86-2.0.2-48.4.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.4.1.x86_64" }, "product_reference": "qemu-x86-2.0.2-48.4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-3209", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3209" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.4.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.4.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.4.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.4.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.4.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.4.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.4.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.4.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3209", "url": "https://www.suse.com/security/cve/CVE-2015-3209" }, { "category": "external", "summary": "SUSE Bug 932267 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932267" }, { "category": "external", "summary": "SUSE Bug 932770 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932770" }, { "category": "external", "summary": "SUSE Bug 932823 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932823" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.4.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.4.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.4.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.4.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.4.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.4.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.4.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.4.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-08T14:28:12Z", "details": "important" } ], "title": "CVE-2015-3209" }, { "cve": "CVE-2015-4037", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4037" } ], "notes": [ { "category": "general", "text": "The slirp_smb function in net/slirp.c in QEMU 2.3.0 and earlier creates temporary files with predictable names, which allows local users to cause a denial of service (instantiation failure) by creating /tmp/qemu-smb.*-* files before the program.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.4.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.4.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.4.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.4.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.4.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.4.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.4.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.4.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4037", "url": "https://www.suse.com/security/cve/CVE-2015-4037" }, { "category": "external", "summary": "SUSE Bug 932267 for CVE-2015-4037", "url": "https://bugzilla.suse.com/932267" }, { "category": "external", "summary": "SUSE Bug 950367 for CVE-2015-4037", "url": "https://bugzilla.suse.com/950367" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.4.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.4.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.4.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.4.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.4.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.4.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.4.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.4.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.4.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-08T14:28:12Z", "details": "low" } ], "title": "CVE-2015-4037" } ] }
suse-su-2015:0889-1
Vulnerability from csaf_suse
Published
2014-09-19 14:41
Modified
2014-09-19 14:41
Summary
Security update for kvm
Notes
Title of the patch
Security update for kvm
Description of the patch
kvm has been updated to fix issues in the embedded qemu:
*
CVE-2014-0223: An integer overflow flaw was found in the QEMU block
driver for QCOW version 1 disk images. A user able to alter the QEMU
disk image files loaded by a guest could have used this flaw to
corrupt QEMU process memory on the host, which could potentially have
resulted in arbitrary code execution on the host with the privileges
of the QEMU process.
*
CVE-2014-3461: A user able to alter the savevm data (either on the
disk or over the wire during migration) could have used this flaw to
to corrupt QEMU process memory on the (destination) host, which could
have potentially resulted in arbitrary code execution on the host
with the privileges of the QEMU process.
*
CVE-2014-0222: An integer overflow flaw was found in the QEMU block
driver for QCOW version 1 disk images. A user able to alter the QEMU
disk image files loaded by a guest could have used this flaw to
corrupt QEMU process memory on the host, which could have potentially
resulted in arbitrary code execution on the host with the privileges
of the QEMU process.
Non-security bugs fixed:
* Fix exceeding IRQ routes that could have caused freezes of guests.
(bnc#876842)
* Fix CPUID emulation bugs that may have broken Windows guests with
newer -cpu types (bnc#886535)
Security Issues:
* CVE-2014-0222
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0222>
* CVE-2014-0223
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0223>
* CVE-2014-3461
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3461>
Patchnames
sledsp3-kvm,slessp3-kvm
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for kvm", "title": "Title of the patch" }, { "category": "description", "text": "\nkvm has been updated to fix issues in the embedded qemu:\n\n * \n\n CVE-2014-0223: An integer overflow flaw was found in the QEMU block\n driver for QCOW version 1 disk images. A user able to alter the QEMU\n disk image files loaded by a guest could have used this flaw to\n corrupt QEMU process memory on the host, which could potentially have\n resulted in arbitrary code execution on the host with the privileges\n of the QEMU process.\n\n * \n\n CVE-2014-3461: A user able to alter the savevm data (either on the\n disk or over the wire during migration) could have used this flaw to\n to corrupt QEMU process memory on the (destination) host, which could\n have potentially resulted in arbitrary code execution on the host\n with the privileges of the QEMU process.\n\n * \n\n CVE-2014-0222: An integer overflow flaw was found in the QEMU block\n driver for QCOW version 1 disk images. A user able to alter the QEMU\n disk image files loaded by a guest could have used this flaw to\n corrupt QEMU process memory on the host, which could have potentially\n resulted in arbitrary code execution on the host with the privileges\n of the QEMU process.\n\nNon-security bugs fixed:\n\n * Fix exceeding IRQ routes that could have caused freezes of guests.\n (bnc#876842)\n * Fix CPUID emulation bugs that may have broken Windows guests with\n newer -cpu types (bnc#886535)\n\nSecurity Issues:\n\n * CVE-2014-0222\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0222\u003e\n * CVE-2014-0223\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0223\u003e\n * CVE-2014-3461\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3461\u003e\n\n", "title": "Description of the patch" }, { "category": "details", "text": "sledsp3-kvm,slessp3-kvm", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_0889-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2015:0889-1", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20150889-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2015:0889-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-May/001390.html" }, { "category": "self", "summary": "SUSE Bug 812836", "url": "https://bugzilla.suse.com/812836" }, { "category": "self", "summary": "SUSE Bug 812983", "url": "https://bugzilla.suse.com/812983" }, { "category": "self", "summary": "SUSE Bug 817593", "url": "https://bugzilla.suse.com/817593" }, { "category": "self", "summary": "SUSE Bug 821819", "url": "https://bugzilla.suse.com/821819" }, { "category": "self", "summary": "SUSE Bug 824340", "url": "https://bugzilla.suse.com/824340" }, { "category": "self", "summary": "SUSE Bug 829800", "url": "https://bugzilla.suse.com/829800" }, { "category": "self", "summary": "SUSE Bug 841080", "url": "https://bugzilla.suse.com/841080" }, { "category": "self", "summary": "SUSE Bug 842006", "url": "https://bugzilla.suse.com/842006" }, { "category": "self", "summary": "SUSE Bug 842088", "url": "https://bugzilla.suse.com/842088" }, { "category": "self", "summary": "SUSE Bug 858858", "url": "https://bugzilla.suse.com/858858" }, { "category": "self", "summary": "SUSE Bug 864391", "url": "https://bugzilla.suse.com/864391" }, { "category": "self", "summary": "SUSE Bug 864649", "url": "https://bugzilla.suse.com/864649" }, { "category": "self", "summary": "SUSE Bug 864650", "url": "https://bugzilla.suse.com/864650" }, { "category": "self", "summary": "SUSE Bug 864653", "url": "https://bugzilla.suse.com/864653" }, { "category": "self", "summary": "SUSE Bug 864655", "url": "https://bugzilla.suse.com/864655" }, { "category": "self", "summary": "SUSE Bug 864665", "url": "https://bugzilla.suse.com/864665" }, { "category": "self", "summary": "SUSE Bug 864671", "url": "https://bugzilla.suse.com/864671" }, { "category": "self", "summary": "SUSE Bug 864673", "url": "https://bugzilla.suse.com/864673" }, { "category": "self", "summary": "SUSE Bug 864678", "url": "https://bugzilla.suse.com/864678" }, { "category": "self", "summary": "SUSE Bug 864682", "url": "https://bugzilla.suse.com/864682" }, { "category": "self", "summary": "SUSE Bug 864769", "url": "https://bugzilla.suse.com/864769" }, { "category": "self", "summary": "SUSE Bug 864796", "url": "https://bugzilla.suse.com/864796" }, { "category": "self", "summary": "SUSE Bug 864801", "url": "https://bugzilla.suse.com/864801" }, { "category": "self", "summary": "SUSE Bug 864802", "url": "https://bugzilla.suse.com/864802" }, { "category": "self", "summary": "SUSE Bug 864804", "url": "https://bugzilla.suse.com/864804" }, { "category": "self", "summary": "SUSE Bug 864805", "url": "https://bugzilla.suse.com/864805" }, { "category": "self", "summary": "SUSE Bug 864811", "url": "https://bugzilla.suse.com/864811" }, { "category": "self", "summary": "SUSE Bug 864812", "url": "https://bugzilla.suse.com/864812" }, { "category": "self", "summary": "SUSE Bug 864814", "url": "https://bugzilla.suse.com/864814" }, { "category": "self", "summary": "SUSE Bug 870439", "url": "https://bugzilla.suse.com/870439" }, { "category": "self", "summary": "SUSE Bug 873235", "url": "https://bugzilla.suse.com/873235" }, { "category": "self", "summary": "SUSE Bug 874749", "url": "https://bugzilla.suse.com/874749" }, { "category": "self", "summary": "SUSE Bug 874788", "url": "https://bugzilla.suse.com/874788" }, { "category": "self", "summary": "SUSE Bug 876842", "url": "https://bugzilla.suse.com/876842" }, { "category": "self", "summary": "SUSE Bug 877642", "url": "https://bugzilla.suse.com/877642" }, { "category": "self", "summary": "SUSE Bug 877645", "url": "https://bugzilla.suse.com/877645" }, { "category": "self", "summary": "SUSE Bug 878541", "url": "https://bugzilla.suse.com/878541" }, { "category": "self", "summary": "SUSE Bug 886535", "url": "https://bugzilla.suse.com/886535" }, { "category": "self", "summary": "SUSE Bug 920571", "url": "https://bugzilla.suse.com/920571" }, { "category": "self", "summary": "SUSE Bug 924018", "url": "https://bugzilla.suse.com/924018" }, { "category": "self", "summary": "SUSE Bug 929339", "url": "https://bugzilla.suse.com/929339" }, { "category": "self", "summary": "SUSE Bug 932267", "url": "https://bugzilla.suse.com/932267" }, { "category": "self", "summary": "SUSE Bug 932770", "url": "https://bugzilla.suse.com/932770" }, { "category": "self", "summary": "SUSE CVE CVE-2013-2016 page", "url": "https://www.suse.com/security/cve/CVE-2013-2016/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4344 page", "url": "https://www.suse.com/security/cve/CVE-2013-4344/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4541 page", "url": "https://www.suse.com/security/cve/CVE-2013-4541/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0142 page", "url": "https://www.suse.com/security/cve/CVE-2014-0142/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0143 page", "url": "https://www.suse.com/security/cve/CVE-2014-0143/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0144 page", "url": "https://www.suse.com/security/cve/CVE-2014-0144/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0145 page", "url": "https://www.suse.com/security/cve/CVE-2014-0145/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0146 page", "url": "https://www.suse.com/security/cve/CVE-2014-0146/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0147 page", "url": "https://www.suse.com/security/cve/CVE-2014-0147/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0150 page", "url": "https://www.suse.com/security/cve/CVE-2014-0150/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0222 page", "url": "https://www.suse.com/security/cve/CVE-2014-0222/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0223 page", "url": "https://www.suse.com/security/cve/CVE-2014-0223/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-2894 page", "url": "https://www.suse.com/security/cve/CVE-2014-2894/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3461 page", "url": "https://www.suse.com/security/cve/CVE-2014-3461/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1779 page", "url": "https://www.suse.com/security/cve/CVE-2015-1779/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3209 page", "url": "https://www.suse.com/security/cve/CVE-2015-3209/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3456 page", "url": "https://www.suse.com/security/cve/CVE-2015-3456/" } ], "title": "Security update for kvm", "tracking": { "current_release_date": "2014-09-19T14:41:45Z", "generator": { "date": "2014-09-19T14:41:45Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2015:0889-1", "initial_release_date": "2014-09-19T14:41:45Z", "revision_history": [ { "date": "2014-09-19T14:41:45Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kvm-1.4.2-0.17.1.i586", "product": { "name": "kvm-1.4.2-0.17.1.i586", "product_id": "kvm-1.4.2-0.17.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "kvm-1.4.2-0.17.1.s390x", "product": { "name": "kvm-1.4.2-0.17.1.s390x", "product_id": "kvm-1.4.2-0.17.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kvm-1.4.2-0.17.1.x86_64", "product": { "name": "kvm-1.4.2-0.17.1.x86_64", "product_id": "kvm-1.4.2-0.17.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 11 SP3", "product": { "name": "SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sled:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3", "product": { "name": "SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product": { "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:11:sp3:teradata" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:11:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-0.17.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586" }, "product_reference": "kvm-1.4.2-0.17.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-0.17.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64" }, "product_reference": "kvm-1.4.2-0.17.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-0.17.1.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586" }, "product_reference": "kvm-1.4.2-0.17.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-0.17.1.s390x as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x" }, "product_reference": "kvm-1.4.2-0.17.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-0.17.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64" }, "product_reference": "kvm-1.4.2-0.17.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-0.17.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586" }, "product_reference": "kvm-1.4.2-0.17.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-0.17.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x" }, "product_reference": "kvm-1.4.2-0.17.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-0.17.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64" }, "product_reference": "kvm-1.4.2-0.17.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-0.17.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586" }, "product_reference": "kvm-1.4.2-0.17.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-0.17.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x" }, "product_reference": "kvm-1.4.2-0.17.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-0.17.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" }, "product_reference": "kvm-1.4.2-0.17.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-2016", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-2016" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way qemu v1.3.0 and later (virtio-rng) validates addresses when guest accesses the config space of a virtio device. If the virtio device has zero/small sized config space, such as virtio-rng, a privileged guest user could use this flaw to access the matching host\u0027s qemu address space and thus increase their privileges on the host.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-2016", "url": "https://www.suse.com/security/cve/CVE-2013-2016" }, { "category": "external", "summary": "SUSE Bug 817593 for CVE-2013-2016", "url": "https://bugzilla.suse.com/817593" }, { "category": "external", "summary": "SUSE Bug 871442 for CVE-2013-2016", "url": "https://bugzilla.suse.com/871442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "important" } ], "title": "CVE-2013-2016" }, { "cve": "CVE-2013-4344", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4344" } ], "notes": [ { "category": "general", "text": "Buffer overflow in the SCSI implementation in QEMU, as used in Xen, when a SCSI controller has more than 256 attached devices, allows local users to gain privileges via a small transfer buffer in a REPORT LUNS command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4344", "url": "https://www.suse.com/security/cve/CVE-2013-4344" }, { "category": "external", "summary": "SUSE Bug 842006 for CVE-2013-4344", "url": "https://bugzilla.suse.com/842006" }, { "category": "external", "summary": "SUSE Bug 871442 for CVE-2013-4344", "url": "https://bugzilla.suse.com/871442" }, { "category": "external", "summary": "SUSE Bug 880751 for CVE-2013-4344", "url": "https://bugzilla.suse.com/880751" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2013-4344" }, { "cve": "CVE-2013-4541", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4541" } ], "notes": [ { "category": "general", "text": "The usb_device_post_load function in hw/usb/bus.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a crafted savevm image, related to a negative setup_len or setup_index value.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4541", "url": "https://www.suse.com/security/cve/CVE-2013-4541" }, { "category": "external", "summary": "SUSE Bug 864802 for CVE-2013-4541", "url": "https://bugzilla.suse.com/864802" }, { "category": "external", "summary": "SUSE Bug 871442 for CVE-2013-4541", "url": "https://bugzilla.suse.com/871442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2013-4541" }, { "cve": "CVE-2014-0142", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0142" } ], "notes": [ { "category": "general", "text": "QEMU, possibly before 2.0.0, allows local users to cause a denial of service (divide-by-zero error and crash) via a zero value in the (1) tracks field to the seek_to_sector function in block/parallels.c or (2) extent_size field in the bochs function in block/bochs.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0142", "url": "https://www.suse.com/security/cve/CVE-2014-0142" }, { "category": "external", "summary": "SUSE Bug 870439 for CVE-2014-0142", "url": "https://bugzilla.suse.com/870439" }, { "category": "external", "summary": "SUSE Bug 871442 for CVE-2014-0142", "url": "https://bugzilla.suse.com/871442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2014-0142" }, { "cve": "CVE-2014-0143", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0143" } ], "notes": [ { "category": "general", "text": "Multiple integer overflows in the block drivers in QEMU, possibly before 2.0.0, allow local users to cause a denial of service (crash) via a crafted catalog size in (1) the parallels_open function in block/parallels.c or (2) bochs_open function in bochs.c, a large L1 table in the (3) qcow2_snapshot_load_tmp in qcow2-snapshot.c or (4) qcow2_grow_l1_table function in qcow2-cluster.c, (5) a large request in the bdrv_check_byte_request function in block.c and other block drivers, (6) crafted cluster indexes in the get_refcount function in qcow2-refcount.c, or (7) a large number of blocks in the cloop_open function in cloop.c, which trigger buffer overflows, memory corruption, large memory allocations and out-of-bounds read and writes.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0143", "url": "https://www.suse.com/security/cve/CVE-2014-0143" }, { "category": "external", "summary": "SUSE Bug 870439 for CVE-2014-0143", "url": "https://bugzilla.suse.com/870439" }, { "category": "external", "summary": "SUSE Bug 871442 for CVE-2014-0143", "url": "https://bugzilla.suse.com/871442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2014-0143" }, { "cve": "CVE-2014-0144", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0144" } ], "notes": [ { "category": "general", "text": "QEMU before 2.0.0 block drivers for CLOOP, QCOW2 version 2 and various other image formats are vulnerable to potential memory corruptions, integer/buffer overflows or crash caused by missing input validations which could allow a remote user to execute arbitrary code on the host with the privileges of the QEMU process.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0144", "url": "https://www.suse.com/security/cve/CVE-2014-0144" }, { "category": "external", "summary": "SUSE Bug 870439 for CVE-2014-0144", "url": "https://bugzilla.suse.com/870439" }, { "category": "external", "summary": "SUSE Bug 871442 for CVE-2014-0144", "url": "https://bugzilla.suse.com/871442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2014-0144" }, { "cve": "CVE-2014-0145", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0145" } ], "notes": [ { "category": "general", "text": "Multiple buffer overflows in QEMU before 1.7.2 and 2.x before 2.0.0, allow local users to cause a denial of service (crash) or possibly execute arbitrary code via a large (1) L1 table in the qcow2_snapshot_load_tmp in the QCOW 2 block driver (block/qcow2-snapshot.c) or (2) uncompressed chunk, (3) chunk length, or (4) number of sectors in the DMG block driver (block/dmg.c).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0145", "url": "https://www.suse.com/security/cve/CVE-2014-0145" }, { "category": "external", "summary": "SUSE Bug 870439 for CVE-2014-0145", "url": "https://bugzilla.suse.com/870439" }, { "category": "external", "summary": "SUSE Bug 871442 for CVE-2014-0145", "url": "https://bugzilla.suse.com/871442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "important" } ], "title": "CVE-2014-0145" }, { "cve": "CVE-2014-0146", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0146" } ], "notes": [ { "category": "general", "text": "The qcow2_open function in the (block/qcow2.c) in QEMU before 1.7.2 and 2.x before 2.0.0 allows local users to cause a denial of service (NULL pointer dereference) via a crafted image which causes an error, related to the initialization of the snapshot_offset and nb_snapshots fields.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0146", "url": "https://www.suse.com/security/cve/CVE-2014-0146" }, { "category": "external", "summary": "SUSE Bug 870439 for CVE-2014-0146", "url": "https://bugzilla.suse.com/870439" }, { "category": "external", "summary": "SUSE Bug 871442 for CVE-2014-0146", "url": "https://bugzilla.suse.com/871442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2014-0146" }, { "cve": "CVE-2014-0147", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0147" } ], "notes": [ { "category": "general", "text": "Qemu before 1.6.2 block diver for the various disk image formats used by Bochs and for the QCOW version 2 format, are vulnerable to a possible crash caused by signed data types or a logic error while creating QCOW2 snapshots, which leads to incorrectly calling update_refcount() routine.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0147", "url": "https://www.suse.com/security/cve/CVE-2014-0147" }, { "category": "external", "summary": "SUSE Bug 870439 for CVE-2014-0147", "url": "https://bugzilla.suse.com/870439" }, { "category": "external", "summary": "SUSE Bug 871442 for CVE-2014-0147", "url": "https://bugzilla.suse.com/871442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2014-0147" }, { "cve": "CVE-2014-0150", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0150" } ], "notes": [ { "category": "general", "text": "Integer overflow in the virtio_net_handle_mac function in hw/net/virtio-net.c in QEMU 2.0 and earlier allows local guest users to execute arbitrary code via a MAC addresses table update request, which triggers a heap-based buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0150", "url": "https://www.suse.com/security/cve/CVE-2014-0150" }, { "category": "external", "summary": "SUSE Bug 873235 for CVE-2014-0150", "url": "https://bugzilla.suse.com/873235" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2014-0150" }, { "cve": "CVE-2014-0222", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0222" } ], "notes": [ { "category": "general", "text": "Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0222", "url": "https://www.suse.com/security/cve/CVE-2014-0222" }, { "category": "external", "summary": "SUSE Bug 1072223 for CVE-2014-0222", "url": "https://bugzilla.suse.com/1072223" }, { "category": "external", "summary": "SUSE Bug 877642 for CVE-2014-0222", "url": "https://bugzilla.suse.com/877642" }, { "category": "external", "summary": "SUSE Bug 950367 for CVE-2014-0222", "url": "https://bugzilla.suse.com/950367" }, { "category": "external", "summary": "SUSE Bug 964925 for CVE-2014-0222", "url": "https://bugzilla.suse.com/964925" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2014-0222" }, { "cve": "CVE-2014-0223", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0223" } ], "notes": [ { "category": "general", "text": "Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a large image size, which triggers a buffer overflow or out-of-bounds read.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0223", "url": "https://www.suse.com/security/cve/CVE-2014-0223" }, { "category": "external", "summary": "SUSE Bug 877645 for CVE-2014-0223", "url": "https://bugzilla.suse.com/877645" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2014-0223" }, { "cve": "CVE-2014-2894", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-2894" } ], "notes": [ { "category": "general", "text": "Off-by-one error in the cmd_smart function in the smart self test in hw/ide/core.c in QEMU before 2.0 allows local users to have unspecified impact via a SMART EXECUTE OFFLINE command that triggers a buffer underflow and memory corruption.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-2894", "url": "https://www.suse.com/security/cve/CVE-2014-2894" }, { "category": "external", "summary": "SUSE Bug 874749 for CVE-2014-2894", "url": "https://bugzilla.suse.com/874749" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2014-2894" }, { "cve": "CVE-2014-3461", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3461" } ], "notes": [ { "category": "general", "text": "hw/usb/bus.c in QEMU 1.6.2 allows remote attackers to execute arbitrary code via crafted savevm data, which triggers a heap-based buffer overflow, related to \"USB post load checks.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3461", "url": "https://www.suse.com/security/cve/CVE-2014-3461" }, { "category": "external", "summary": "SUSE Bug 878541 for CVE-2014-3461", "url": "https://bugzilla.suse.com/878541" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2014-3461" }, { "cve": "CVE-2015-1779", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1779" } ], "notes": [ { "category": "general", "text": "The VNC websocket frame decoder in QEMU allows remote attackers to cause a denial of service (memory and CPU consumption) via a large (1) websocket payload or (2) HTTP headers section.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1779", "url": "https://www.suse.com/security/cve/CVE-2015-1779" }, { "category": "external", "summary": "SUSE Bug 924018 for CVE-2015-1779", "url": "https://bugzilla.suse.com/924018" }, { "category": "external", "summary": "SUSE Bug 962632 for CVE-2015-1779", "url": "https://bugzilla.suse.com/962632" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2015-1779" }, { "cve": "CVE-2015-3209", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3209" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3209", "url": "https://www.suse.com/security/cve/CVE-2015-3209" }, { "category": "external", "summary": "SUSE Bug 932267 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932267" }, { "category": "external", "summary": "SUSE Bug 932770 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932770" }, { "category": "external", "summary": "SUSE Bug 932823 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932823" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "important" } ], "title": "CVE-2015-3209" }, { "cve": "CVE-2015-3456", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3456" } ], "notes": [ { "category": "general", "text": "The Floppy Disk Controller (FDC) in QEMU, as used in Xen 4.5.x and earlier and KVM, allows local guest users to cause a denial of service (out-of-bounds write and guest crash) or possibly execute arbitrary code via the (1) FD_CMD_READ_ID, (2) FD_CMD_DRIVE_SPECIFICATION_COMMAND, or other unspecified commands, aka VENOM.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3456", "url": "https://www.suse.com/security/cve/CVE-2015-3456" }, { "category": "external", "summary": "SUSE Bug 929339 for CVE-2015-3456", "url": "https://bugzilla.suse.com/929339" }, { "category": "external", "summary": "SUSE Bug 932770 for CVE-2015-3456", "url": "https://bugzilla.suse.com/932770" }, { "category": "external", "summary": "SUSE Bug 935900 for CVE-2015-3456", "url": "https://bugzilla.suse.com/935900" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2015-3456" } ] }
suse-su-2015:0929-1
Vulnerability from csaf_suse
Published
2012-08-31 14:36
Modified
2012-08-31 14:36
Summary
Security update for kvm
Notes
Title of the patch
Security update for kvm
Description of the patch
The kvm qemu vt100 emulation was affected by a problem where specific vt100
sequences could have been used by guest users to affect the host.
(CVE-2012-3515 aka XSA-17).
Also a temp file race was fixed. (CVE-2012-2652)
Security Issue reference:
* CVE-2012-3515
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3515>
* CVE-2012-2652
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2652>
Patchnames
slessp1-kvm
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for kvm", "title": "Title of the patch" }, { "category": "description", "text": "\nThe kvm qemu vt100 emulation was affected by a problem where specific vt100 \nsequences could have been used by guest users to affect the host. \n(CVE-2012-3515 aka XSA-17).\n\nAlso a temp file race was fixed. (CVE-2012-2652)\n\nSecurity Issue reference:\n\n * CVE-2012-3515\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3515\u003e\n * CVE-2012-2652\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2652\u003e\n\n", "title": "Description of the patch" }, { "category": "details", "text": "slessp1-kvm", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_0929-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2015:0929-1", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20150929-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2015:0929-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-May/001402.html" }, { "category": "self", "summary": "SUSE Bug 598271", "url": "https://bugzilla.suse.com/598271" }, { "category": "self", "summary": "SUSE Bug 598298", "url": "https://bugzilla.suse.com/598298" }, { "category": "self", "summary": "SUSE Bug 599095", "url": "https://bugzilla.suse.com/599095" }, { "category": "self", "summary": "SUSE Bug 603161", "url": "https://bugzilla.suse.com/603161" }, { "category": "self", "summary": "SUSE Bug 603179", "url": "https://bugzilla.suse.com/603179" }, { "category": "self", "summary": "SUSE Bug 610682", "url": "https://bugzilla.suse.com/610682" }, { "category": "self", "summary": "SUSE Bug 619991", "url": "https://bugzilla.suse.com/619991" }, { "category": "self", "summary": "SUSE Bug 621793", "url": "https://bugzilla.suse.com/621793" }, { "category": "self", "summary": "SUSE Bug 626654", "url": "https://bugzilla.suse.com/626654" }, { "category": "self", "summary": "SUSE Bug 637297", "url": "https://bugzilla.suse.com/637297" }, { "category": "self", "summary": "SUSE Bug 689895", "url": "https://bugzilla.suse.com/689895" }, { "category": "self", "summary": "SUSE Bug 690781", "url": "https://bugzilla.suse.com/690781" }, { "category": "self", "summary": "SUSE Bug 695510", "url": "https://bugzilla.suse.com/695510" }, { "category": "self", "summary": "SUSE Bug 695766", "url": "https://bugzilla.suse.com/695766" }, { "category": "self", "summary": "SUSE Bug 698237", "url": "https://bugzilla.suse.com/698237" }, { "category": "self", "summary": "SUSE Bug 701161", "url": "https://bugzilla.suse.com/701161" }, { "category": "self", "summary": "SUSE Bug 702823", "url": "https://bugzilla.suse.com/702823" }, { "category": "self", "summary": "SUSE Bug 704933", "url": "https://bugzilla.suse.com/704933" }, { "category": "self", "summary": "SUSE Bug 705095", "url": "https://bugzilla.suse.com/705095" }, { "category": "self", "summary": "SUSE Bug 705304", "url": "https://bugzilla.suse.com/705304" }, { "category": "self", "summary": "SUSE Bug 740165", "url": "https://bugzilla.suse.com/740165" }, { "category": "self", "summary": "SUSE Bug 764526", "url": "https://bugzilla.suse.com/764526" }, { "category": "self", "summary": "SUSE Bug 777084", "url": "https://bugzilla.suse.com/777084" }, { "category": "self", "summary": "SUSE Bug 877642", "url": "https://bugzilla.suse.com/877642" }, { "category": "self", "summary": "SUSE Bug 877645", "url": "https://bugzilla.suse.com/877645" }, { "category": "self", "summary": "SUSE Bug 929339", "url": "https://bugzilla.suse.com/929339" }, { "category": "self", "summary": "SUSE Bug 932770", "url": "https://bugzilla.suse.com/932770" }, { "category": "self", "summary": "SUSE CVE CVE-2011-1750 page", "url": "https://www.suse.com/security/cve/CVE-2011-1750/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-1751 page", "url": "https://www.suse.com/security/cve/CVE-2011-1751/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-2212 page", "url": "https://www.suse.com/security/cve/CVE-2011-2212/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-2512 page", "url": "https://www.suse.com/security/cve/CVE-2011-2512/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-2527 page", "url": "https://www.suse.com/security/cve/CVE-2011-2527/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-0029 page", "url": "https://www.suse.com/security/cve/CVE-2012-0029/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-2652 page", "url": "https://www.suse.com/security/cve/CVE-2012-2652/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-3515 page", "url": "https://www.suse.com/security/cve/CVE-2012-3515/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0222 page", "url": "https://www.suse.com/security/cve/CVE-2014-0222/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0223 page", "url": "https://www.suse.com/security/cve/CVE-2014-0223/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3209 page", "url": "https://www.suse.com/security/cve/CVE-2015-3209/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3456 page", "url": "https://www.suse.com/security/cve/CVE-2015-3456/" } ], "title": "Security update for kvm", "tracking": { "current_release_date": "2012-08-31T14:36:20Z", "generator": { "date": "2012-08-31T14:36:20Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2015:0929-1", "initial_release_date": "2012-08-31T14:36:20Z", "revision_history": [ { "date": "2012-08-31T14:36:20Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kvm-0.12.5-1.24.1.i586", "product": { "name": "kvm-0.12.5-1.24.1.i586", "product_id": "kvm-0.12.5-1.24.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "kvm-0.12.5-1.24.1.x86_64", "product": { "name": "kvm-0.12.5-1.24.1.x86_64", "product_id": "kvm-0.12.5-1.24.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 11 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles_ltss:11:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP1-TERADATA", "product": { "name": "SUSE Linux Enterprise Server 11 SP1-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP1-TERADATA", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:11:sp1:teradata" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kvm-0.12.5-1.24.1.i586 as component of SUSE Linux Enterprise Server 11 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586" }, "product_reference": "kvm-0.12.5-1.24.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-0.12.5-1.24.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64" }, "product_reference": "kvm-0.12.5-1.24.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-0.12.5-1.24.1.i586 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586" }, "product_reference": "kvm-0.12.5-1.24.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-0.12.5-1.24.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" }, "product_reference": "kvm-0.12.5-1.24.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-TERADATA" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-1750", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-1750" } ], "notes": [ { "category": "general", "text": "Multiple heap-based buffer overflows in the virtio-blk driver (hw/virtio-blk.c) in qemu-kvm 0.14.0 allow local guest users to cause a denial of service (guest crash) and possibly gain privileges via a (1) write request to the virtio_blk_handle_write function or (2) read request to the virtio_blk_handle_read function that is not properly aligned.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-1750", "url": "https://www.suse.com/security/cve/CVE-2011-1750" }, { "category": "external", "summary": "SUSE Bug 689895 for CVE-2011-1750", "url": "https://bugzilla.suse.com/689895" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2012-08-31T14:36:20Z", "details": "important" } ], "title": "CVE-2011-1750" }, { "cve": "CVE-2011-1751", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-1751" } ], "notes": [ { "category": "general", "text": "The pciej_write function in hw/acpi_piix4.c in the PIIX4 Power Management emulation in qemu-kvm does not check if a device is hotpluggable before unplugging the PCI-ISA bridge, which allows privileged guest users to cause a denial of service (guest crash) and possibly execute arbitrary code by sending a crafted value to the 0xae08 (PCI_EJ_BASE) I/O port, which leads to a use-after-free related to \"active qemu timers.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-1751", "url": "https://www.suse.com/security/cve/CVE-2011-1751" }, { "category": "external", "summary": "SUSE Bug 690781 for CVE-2011-1751", "url": "https://bugzilla.suse.com/690781" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2012-08-31T14:36:20Z", "details": "important" } ], "title": "CVE-2011-1751" }, { "cve": "CVE-2011-2212", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-2212" } ], "notes": [ { "category": "general", "text": "Buffer overflow in the virtio subsystem in qemu-kvm 0.14.0 and earlier allows privileged guest users to cause a denial of service (guest crash) or gain privileges via a crafted indirect descriptor related to \"virtqueue in and out requests.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-2212", "url": "https://www.suse.com/security/cve/CVE-2011-2212" }, { "category": "external", "summary": "SUSE Bug 701161 for CVE-2011-2212", "url": "https://bugzilla.suse.com/701161" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2012-08-31T14:36:20Z", "details": "important" } ], "title": "CVE-2011-2212" }, { "cve": "CVE-2011-2512", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-2512" } ], "notes": [ { "category": "general", "text": "The virtio_queue_notify in qemu-kvm 0.14.0 and earlier does not properly validate the virtqueue number, which allows guest users to cause a denial of service (guest crash) and possibly execute arbitrary code via a negative number in the Queue Notify field of the Virtio Header, which bypasses a signed comparison.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-2512", "url": "https://www.suse.com/security/cve/CVE-2011-2512" }, { "category": "external", "summary": "SUSE Bug 702823 for CVE-2011-2512", "url": "https://bugzilla.suse.com/702823" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2012-08-31T14:36:20Z", "details": "moderate" } ], "title": "CVE-2011-2512" }, { "cve": "CVE-2011-2527", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-2527" } ], "notes": [ { "category": "general", "text": "The change_process_uid function in os-posix.c in Qemu 0.14.0 and earlier does not properly drop group privileges when the -runas option is used, which allows local guest users to access restricted files on the host.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-2527", "url": "https://www.suse.com/security/cve/CVE-2011-2527" }, { "category": "external", "summary": "SUSE Bug 705304 for CVE-2011-2527", "url": "https://bugzilla.suse.com/705304" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2012-08-31T14:36:20Z", "details": "low" } ], "title": "CVE-2011-2527" }, { "cve": "CVE-2012-0029", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-0029" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-0029", "url": "https://www.suse.com/security/cve/CVE-2012-0029" }, { "category": "external", "summary": "SUSE Bug 740165 for CVE-2012-0029", "url": "https://bugzilla.suse.com/740165" }, { "category": "external", "summary": "SUSE Bug 747331 for CVE-2012-0029", "url": "https://bugzilla.suse.com/747331" }, { "category": "external", "summary": "SUSE Bug 757537 for CVE-2012-0029", "url": "https://bugzilla.suse.com/757537" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2012-08-31T14:36:20Z", "details": "important" } ], "title": "CVE-2012-0029" }, { "cve": "CVE-2012-2652", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-2652" } ], "notes": [ { "category": "general", "text": "The bdrv_open function in Qemu 1.0 does not properly handle the failure of the mkstemp function, when in snapshot node, which allows local users to overwrite or read arbitrary files via a symlink attack on an unspecified temporary file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-2652", "url": "https://www.suse.com/security/cve/CVE-2012-2652" }, { "category": "external", "summary": "SUSE Bug 764526 for CVE-2012-2652", "url": "https://bugzilla.suse.com/764526" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2012-08-31T14:36:20Z", "details": "moderate" } ], "title": "CVE-2012-2652" }, { "cve": "CVE-2012-3515", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-3515" } ], "notes": [ { "category": "general", "text": "Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a \"device model\u0027s address space.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-3515", "url": "https://www.suse.com/security/cve/CVE-2012-3515" }, { "category": "external", "summary": "SUSE Bug 777084 for CVE-2012-3515", "url": "https://bugzilla.suse.com/777084" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2012-08-31T14:36:20Z", "details": "important" } ], "title": "CVE-2012-3515" }, { "cve": "CVE-2014-0222", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0222" } ], "notes": [ { "category": "general", "text": "Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0222", "url": "https://www.suse.com/security/cve/CVE-2014-0222" }, { "category": "external", "summary": "SUSE Bug 1072223 for CVE-2014-0222", "url": "https://bugzilla.suse.com/1072223" }, { "category": "external", "summary": "SUSE Bug 877642 for CVE-2014-0222", "url": "https://bugzilla.suse.com/877642" }, { "category": "external", "summary": "SUSE Bug 950367 for CVE-2014-0222", "url": "https://bugzilla.suse.com/950367" }, { "category": "external", "summary": "SUSE Bug 964925 for CVE-2014-0222", "url": "https://bugzilla.suse.com/964925" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2012-08-31T14:36:20Z", "details": "moderate" } ], "title": "CVE-2014-0222" }, { "cve": "CVE-2014-0223", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0223" } ], "notes": [ { "category": "general", "text": "Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a large image size, which triggers a buffer overflow or out-of-bounds read.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0223", "url": "https://www.suse.com/security/cve/CVE-2014-0223" }, { "category": "external", "summary": "SUSE Bug 877645 for CVE-2014-0223", "url": "https://bugzilla.suse.com/877645" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2012-08-31T14:36:20Z", "details": "moderate" } ], "title": "CVE-2014-0223" }, { "cve": "CVE-2015-3209", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3209" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3209", "url": "https://www.suse.com/security/cve/CVE-2015-3209" }, { "category": "external", "summary": "SUSE Bug 932267 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932267" }, { "category": "external", "summary": "SUSE Bug 932770 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932770" }, { "category": "external", "summary": "SUSE Bug 932823 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932823" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2012-08-31T14:36:20Z", "details": "important" } ], "title": "CVE-2015-3209" }, { "cve": "CVE-2015-3456", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3456" } ], "notes": [ { "category": "general", "text": "The Floppy Disk Controller (FDC) in QEMU, as used in Xen 4.5.x and earlier and KVM, allows local guest users to cause a denial of service (out-of-bounds write and guest crash) or possibly execute arbitrary code via the (1) FD_CMD_READ_ID, (2) FD_CMD_DRIVE_SPECIFICATION_COMMAND, or other unspecified commands, aka VENOM.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3456", "url": "https://www.suse.com/security/cve/CVE-2015-3456" }, { "category": "external", "summary": "SUSE Bug 929339 for CVE-2015-3456", "url": "https://bugzilla.suse.com/929339" }, { "category": "external", "summary": "SUSE Bug 932770 for CVE-2015-3456", "url": "https://bugzilla.suse.com/932770" }, { "category": "external", "summary": "SUSE Bug 935900 for CVE-2015-3456", "url": "https://bugzilla.suse.com/935900" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2012-08-31T14:36:20Z", "details": "moderate" } ], "title": "CVE-2015-3456" } ] }
suse-su-2015:1156-1
Vulnerability from csaf_suse
Published
2015-06-05 12:39
Modified
2015-06-05 12:39
Summary
Security update for Xen
Notes
Title of the patch
Security update for Xen
Description of the patch
Xen was updated to fix six security issues:
* CVE-2015-4103: Potential unintended writes to host MSI message data
field via qemu. (XSA-128, bsc#931625)
* CVE-2015-4104: PCI MSI mask bits inadvertently exposed to guests.
(XSA-129, bsc#931626)
* CVE-2015-4105: Guest triggerable qemu MSI-X pass-through error
messages. (XSA-130, bsc#931627)
* CVE-2015-4106: Unmediated PCI register access in qemu. (XSA-131,
bsc#931628)
* CVE-2015-3209: heap overflow in qemu pcnet controller allowing guest
to host escape. (XSA-135, bsc#932770)
* CVE-2015-4164: DoS through iret hypercall handler. (XSA-136,
bsc#932996)
Security Issues:
* CVE-2015-4103
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4103>
* CVE-2015-4104
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4104>
* CVE-2015-4105
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4105>
* CVE-2015-4106
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4106>
* CVE-2015-4164
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4164>
* CVE-2015-3209
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3209>
Patchnames
slessp1-xen-201506
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Xen", "title": "Title of the patch" }, { "category": "description", "text": "\nXen was updated to fix six security issues:\n\n * CVE-2015-4103: Potential unintended writes to host MSI message data\n field via qemu. (XSA-128, bsc#931625)\n * CVE-2015-4104: PCI MSI mask bits inadvertently exposed to guests.\n (XSA-129, bsc#931626)\n * CVE-2015-4105: Guest triggerable qemu MSI-X pass-through error\n messages. (XSA-130, bsc#931627)\n * CVE-2015-4106: Unmediated PCI register access in qemu. (XSA-131,\n bsc#931628)\n * CVE-2015-3209: heap overflow in qemu pcnet controller allowing guest\n to host escape. (XSA-135, bsc#932770)\n * CVE-2015-4164: DoS through iret hypercall handler. (XSA-136,\n bsc#932996)\n\nSecurity Issues:\n\n * CVE-2015-4103\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4103\u003e\n * CVE-2015-4104\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4104\u003e\n * CVE-2015-4105\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4105\u003e\n * CVE-2015-4106\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4106\u003e\n * CVE-2015-4164\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4164\u003e\n * CVE-2015-3209\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3209\u003e\n\n", "title": "Description of the patch" }, { "category": "details", "text": "slessp1-xen-201506", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_1156-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2015:1156-1", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20151156-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2015:1156-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-June/001467.html" }, { "category": "self", "summary": "SUSE Bug 931625", "url": "https://bugzilla.suse.com/931625" }, { "category": "self", "summary": "SUSE Bug 931626", "url": "https://bugzilla.suse.com/931626" }, { "category": "self", "summary": "SUSE Bug 931627", "url": "https://bugzilla.suse.com/931627" }, { "category": "self", "summary": "SUSE Bug 931628", "url": "https://bugzilla.suse.com/931628" }, { "category": "self", "summary": "SUSE Bug 932770", "url": "https://bugzilla.suse.com/932770" }, { "category": "self", "summary": "SUSE Bug 932996", "url": "https://bugzilla.suse.com/932996" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3209 page", "url": "https://www.suse.com/security/cve/CVE-2015-3209/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4103 page", "url": "https://www.suse.com/security/cve/CVE-2015-4103/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4104 page", "url": "https://www.suse.com/security/cve/CVE-2015-4104/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4105 page", "url": "https://www.suse.com/security/cve/CVE-2015-4105/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4106 page", "url": "https://www.suse.com/security/cve/CVE-2015-4106/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4164 page", "url": "https://www.suse.com/security/cve/CVE-2015-4164/" } ], "title": "Security update for Xen", "tracking": { "current_release_date": "2015-06-05T12:39:39Z", "generator": { "date": "2015-06-05T12:39:39Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2015:1156-1", "initial_release_date": "2015-06-05T12:39:39Z", "revision_history": [ { "date": "2015-06-05T12:39:39Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-4.0.3_21548_18-0.23.1.i586", "product": { "name": "xen-4.0.3_21548_18-0.23.1.i586", "product_id": "xen-4.0.3_21548_18-0.23.1.i586" } }, { "category": "product_version", "name": "xen-doc-html-4.0.3_21548_18-0.23.1.i586", "product": { "name": "xen-doc-html-4.0.3_21548_18-0.23.1.i586", "product_id": "xen-doc-html-4.0.3_21548_18-0.23.1.i586" } }, { "category": "product_version", "name": "xen-doc-pdf-4.0.3_21548_18-0.23.1.i586", "product": { "name": "xen-doc-pdf-4.0.3_21548_18-0.23.1.i586", "product_id": "xen-doc-pdf-4.0.3_21548_18-0.23.1.i586" } }, { "category": "product_version", "name": "xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "product": { "name": "xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "product_id": "xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586" } }, { "category": "product_version", "name": "xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1.i586", "product": { "name": "xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1.i586", "product_id": "xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1.i586" } }, { "category": "product_version", "name": "xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "product": { "name": "xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "product_id": "xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586" } }, { "category": "product_version", "name": "xen-libs-4.0.3_21548_18-0.23.1.i586", "product": { "name": "xen-libs-4.0.3_21548_18-0.23.1.i586", "product_id": "xen-libs-4.0.3_21548_18-0.23.1.i586" } }, { "category": "product_version", "name": "xen-tools-4.0.3_21548_18-0.23.1.i586", "product": { "name": "xen-tools-4.0.3_21548_18-0.23.1.i586", "product_id": "xen-tools-4.0.3_21548_18-0.23.1.i586" } }, { "category": "product_version", "name": "xen-tools-domU-4.0.3_21548_18-0.23.1.i586", "product": { "name": "xen-tools-domU-4.0.3_21548_18-0.23.1.i586", "product_id": "xen-tools-domU-4.0.3_21548_18-0.23.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "xen-4.0.3_21548_18-0.23.1.x86_64", "product": { "name": "xen-4.0.3_21548_18-0.23.1.x86_64", "product_id": "xen-4.0.3_21548_18-0.23.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.0.3_21548_18-0.23.1.x86_64", "product": { "name": "xen-doc-html-4.0.3_21548_18-0.23.1.x86_64", "product_id": "xen-doc-html-4.0.3_21548_18-0.23.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-pdf-4.0.3_21548_18-0.23.1.x86_64", "product": { "name": "xen-doc-pdf-4.0.3_21548_18-0.23.1.x86_64", "product_id": "xen-doc-pdf-4.0.3_21548_18-0.23.1.x86_64" } }, { "category": "product_version", "name": "xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "product": { "name": "xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "product_id": "xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64" } }, { "category": "product_version", "name": "xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "product": { "name": "xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "product_id": "xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.0.3_21548_18-0.23.1.x86_64", "product": { "name": "xen-libs-4.0.3_21548_18-0.23.1.x86_64", "product_id": "xen-libs-4.0.3_21548_18-0.23.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.0.3_21548_18-0.23.1.x86_64", "product": { "name": "xen-tools-4.0.3_21548_18-0.23.1.x86_64", "product_id": "xen-tools-4.0.3_21548_18-0.23.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.0.3_21548_18-0.23.1.x86_64", "product": { "name": "xen-tools-domU-4.0.3_21548_18-0.23.1.x86_64", "product_id": "xen-tools-domU-4.0.3_21548_18-0.23.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 11 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles_ltss:11:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP1-TERADATA", "product": { "name": "SUSE Linux Enterprise Server 11 SP1-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP1-TERADATA", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:11:sp1:teradata" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-4.0.3_21548_18-0.23.1.i586 as component of SUSE Linux Enterprise Server 11 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-4.0.3_21548_18-0.23.1.i586" }, "product_reference": "xen-4.0.3_21548_18-0.23.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.0.3_21548_18-0.23.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-4.0.3_21548_18-0.23.1.x86_64" }, "product_reference": "xen-4.0.3_21548_18-0.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.0.3_21548_18-0.23.1.i586 as component of SUSE Linux Enterprise Server 11 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-html-4.0.3_21548_18-0.23.1.i586" }, "product_reference": "xen-doc-html-4.0.3_21548_18-0.23.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.0.3_21548_18-0.23.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-html-4.0.3_21548_18-0.23.1.x86_64" }, "product_reference": "xen-doc-html-4.0.3_21548_18-0.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-pdf-4.0.3_21548_18-0.23.1.i586 as component of SUSE Linux Enterprise Server 11 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-pdf-4.0.3_21548_18-0.23.1.i586" }, "product_reference": "xen-doc-pdf-4.0.3_21548_18-0.23.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-pdf-4.0.3_21548_18-0.23.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-pdf-4.0.3_21548_18-0.23.1.x86_64" }, "product_reference": "xen-doc-pdf-4.0.3_21548_18-0.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586 as component of SUSE Linux Enterprise Server 11 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586" }, "product_reference": "xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64" }, "product_reference": "xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1.i586 as component of SUSE Linux Enterprise Server 11 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1.i586" }, "product_reference": "xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586 as component of SUSE Linux Enterprise Server 11 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586" }, "product_reference": "xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64" }, "product_reference": "xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.0.3_21548_18-0.23.1.i586 as component of SUSE Linux Enterprise Server 11 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-libs-4.0.3_21548_18-0.23.1.i586" }, "product_reference": "xen-libs-4.0.3_21548_18-0.23.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.0.3_21548_18-0.23.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-libs-4.0.3_21548_18-0.23.1.x86_64" }, "product_reference": "xen-libs-4.0.3_21548_18-0.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.0.3_21548_18-0.23.1.i586 as component of SUSE Linux Enterprise Server 11 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-4.0.3_21548_18-0.23.1.i586" }, "product_reference": "xen-tools-4.0.3_21548_18-0.23.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.0.3_21548_18-0.23.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-4.0.3_21548_18-0.23.1.x86_64" }, "product_reference": "xen-tools-4.0.3_21548_18-0.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.0.3_21548_18-0.23.1.i586 as component of SUSE Linux Enterprise Server 11 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-domU-4.0.3_21548_18-0.23.1.i586" }, "product_reference": "xen-tools-domU-4.0.3_21548_18-0.23.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.0.3_21548_18-0.23.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-domU-4.0.3_21548_18-0.23.1.x86_64" }, "product_reference": "xen-tools-domU-4.0.3_21548_18-0.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.0.3_21548_18-0.23.1.i586 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-4.0.3_21548_18-0.23.1.i586" }, "product_reference": "xen-4.0.3_21548_18-0.23.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.0.3_21548_18-0.23.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-4.0.3_21548_18-0.23.1.x86_64" }, "product_reference": "xen-4.0.3_21548_18-0.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.0.3_21548_18-0.23.1.i586 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-html-4.0.3_21548_18-0.23.1.i586" }, "product_reference": "xen-doc-html-4.0.3_21548_18-0.23.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.0.3_21548_18-0.23.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-html-4.0.3_21548_18-0.23.1.x86_64" }, "product_reference": "xen-doc-html-4.0.3_21548_18-0.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-pdf-4.0.3_21548_18-0.23.1.i586 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-pdf-4.0.3_21548_18-0.23.1.i586" }, "product_reference": "xen-doc-pdf-4.0.3_21548_18-0.23.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-pdf-4.0.3_21548_18-0.23.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-pdf-4.0.3_21548_18-0.23.1.x86_64" }, "product_reference": "xen-doc-pdf-4.0.3_21548_18-0.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586" }, "product_reference": "xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64" }, "product_reference": "xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1.i586 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1.i586" }, "product_reference": "xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586" }, "product_reference": "xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64" }, "product_reference": "xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.0.3_21548_18-0.23.1.i586 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-libs-4.0.3_21548_18-0.23.1.i586" }, "product_reference": "xen-libs-4.0.3_21548_18-0.23.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.0.3_21548_18-0.23.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-libs-4.0.3_21548_18-0.23.1.x86_64" }, "product_reference": "xen-libs-4.0.3_21548_18-0.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.0.3_21548_18-0.23.1.i586 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-4.0.3_21548_18-0.23.1.i586" }, "product_reference": "xen-tools-4.0.3_21548_18-0.23.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.0.3_21548_18-0.23.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-4.0.3_21548_18-0.23.1.x86_64" }, "product_reference": "xen-tools-4.0.3_21548_18-0.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.0.3_21548_18-0.23.1.i586 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-domU-4.0.3_21548_18-0.23.1.i586" }, "product_reference": "xen-tools-domU-4.0.3_21548_18-0.23.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.0.3_21548_18-0.23.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-domU-4.0.3_21548_18-0.23.1.x86_64" }, "product_reference": "xen-tools-domU-4.0.3_21548_18-0.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-TERADATA" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-3209", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3209" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-html-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-html-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-pdf-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-pdf-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-libs-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-libs-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-domU-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-domU-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-html-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-html-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-pdf-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-pdf-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-libs-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-libs-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-domU-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-domU-4.0.3_21548_18-0.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3209", "url": "https://www.suse.com/security/cve/CVE-2015-3209" }, { "category": "external", "summary": "SUSE Bug 932267 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932267" }, { "category": "external", "summary": "SUSE Bug 932770 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932770" }, { "category": "external", "summary": "SUSE Bug 932823 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932823" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-html-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-html-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-pdf-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-pdf-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-libs-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-libs-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-domU-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-domU-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-html-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-html-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-pdf-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-pdf-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-libs-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-libs-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-domU-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-domU-4.0.3_21548_18-0.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-05T12:39:39Z", "details": "important" } ], "title": "CVE-2015-3209" }, { "cve": "CVE-2015-4103", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4103" } ], "notes": [ { "category": "general", "text": "Xen 3.3.x through 4.5.x does not properly restrict write access to the host MSI message data field, which allows local x86 HVM guest administrators to cause a denial of service (host interrupt handling confusion) via vectors related to qemu and accessing spanning multiple fields.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-html-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-html-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-pdf-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-pdf-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-libs-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-libs-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-domU-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-domU-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-html-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-html-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-pdf-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-pdf-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-libs-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-libs-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-domU-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-domU-4.0.3_21548_18-0.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4103", "url": "https://www.suse.com/security/cve/CVE-2015-4103" }, { "category": "external", "summary": "SUSE Bug 931625 for CVE-2015-4103", "url": "https://bugzilla.suse.com/931625" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-html-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-html-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-pdf-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-pdf-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-libs-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-libs-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-domU-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-domU-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-html-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-html-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-pdf-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-pdf-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-libs-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-libs-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-domU-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-domU-4.0.3_21548_18-0.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-05T12:39:39Z", "details": "moderate" } ], "title": "CVE-2015-4103" }, { "cve": "CVE-2015-4104", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4104" } ], "notes": [ { "category": "general", "text": "Xen 3.3.x through 4.5.x does not properly restrict access to PCI MSI mask bits, which allows local x86 HVM guest users to cause a denial of service (unexpected interrupt and host crash) via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-html-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-html-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-pdf-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-pdf-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-libs-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-libs-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-domU-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-domU-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-html-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-html-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-pdf-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-pdf-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-libs-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-libs-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-domU-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-domU-4.0.3_21548_18-0.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4104", "url": "https://www.suse.com/security/cve/CVE-2015-4104" }, { "category": "external", "summary": "SUSE Bug 931626 for CVE-2015-4104", "url": "https://bugzilla.suse.com/931626" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-html-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-html-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-pdf-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-pdf-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-libs-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-libs-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-domU-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-domU-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-html-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-html-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-pdf-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-pdf-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-libs-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-libs-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-domU-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-domU-4.0.3_21548_18-0.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-05T12:39:39Z", "details": "important" } ], "title": "CVE-2015-4104" }, { "cve": "CVE-2015-4105", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4105" } ], "notes": [ { "category": "general", "text": "Xen 3.3.x through 4.5.x enables logging for PCI MSI-X pass-through error messages, which allows local x86 HVM guests to cause a denial of service (host disk consumption) via certain invalid operations.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-html-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-html-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-pdf-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-pdf-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-libs-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-libs-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-domU-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-domU-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-html-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-html-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-pdf-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-pdf-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-libs-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-libs-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-domU-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-domU-4.0.3_21548_18-0.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4105", "url": "https://www.suse.com/security/cve/CVE-2015-4105" }, { "category": "external", "summary": "SUSE Bug 931627 for CVE-2015-4105", "url": "https://bugzilla.suse.com/931627" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-html-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-html-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-pdf-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-pdf-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-libs-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-libs-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-domU-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-domU-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-html-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-html-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-pdf-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-pdf-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-libs-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-libs-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-domU-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-domU-4.0.3_21548_18-0.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-05T12:39:39Z", "details": "moderate" } ], "title": "CVE-2015-4105" }, { "cve": "CVE-2015-4106", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4106" } ], "notes": [ { "category": "general", "text": "QEMU does not properly restrict write access to the PCI config space for certain PCI pass-through devices, which might allow local x86 HVM guests to gain privileges, cause a denial of service (host crash), obtain sensitive information, or possibly have other unspecified impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-html-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-html-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-pdf-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-pdf-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-libs-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-libs-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-domU-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-domU-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-html-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-html-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-pdf-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-pdf-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-libs-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-libs-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-domU-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-domU-4.0.3_21548_18-0.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4106", "url": "https://www.suse.com/security/cve/CVE-2015-4106" }, { "category": "external", "summary": "SUSE Bug 931628 for CVE-2015-4106", "url": "https://bugzilla.suse.com/931628" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-html-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-html-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-pdf-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-pdf-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-libs-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-libs-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-domU-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-domU-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-html-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-html-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-pdf-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-pdf-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-libs-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-libs-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-domU-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-domU-4.0.3_21548_18-0.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-05T12:39:39Z", "details": "moderate" } ], "title": "CVE-2015-4106" }, { "cve": "CVE-2015-4164", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4164" } ], "notes": [ { "category": "general", "text": "The compat_iret function in Xen 3.1 through 4.5 iterates the wrong way through a loop, which allows local 32-bit PV guest administrators to cause a denial of service (large loop and system hang) via a hypercall_iret call with EFLAGS.VM set.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-html-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-html-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-pdf-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-pdf-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-libs-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-libs-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-domU-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-domU-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-html-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-html-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-pdf-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-pdf-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-libs-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-libs-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-domU-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-domU-4.0.3_21548_18-0.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4164", "url": "https://www.suse.com/security/cve/CVE-2015-4164" }, { "category": "external", "summary": "SUSE Bug 932996 for CVE-2015-4164", "url": "https://bugzilla.suse.com/932996" }, { "category": "external", "summary": "SUSE Bug 950367 for CVE-2015-4164", "url": "https://bugzilla.suse.com/950367" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-html-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-html-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-pdf-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-doc-pdf-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-libs-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-libs-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-domU-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:xen-tools-domU-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-html-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-html-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-pdf-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-doc-pdf-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-libs-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-libs-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-4.0.3_21548_18-0.23.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-domU-4.0.3_21548_18-0.23.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-tools-domU-4.0.3_21548_18-0.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-05T12:39:39Z", "details": "moderate" } ], "title": "CVE-2015-4164" } ] }
suse-su-2015:1152-1
Vulnerability from csaf_suse
Published
2014-09-19 14:41
Modified
2014-09-19 14:41
Summary
Security update for kvm
Notes
Title of the patch
Security update for kvm
Description of the patch
kvm has been updated to fix issues in the embedded qemu:
*
CVE-2014-0223: An integer overflow flaw was found in the QEMU block
driver for QCOW version 1 disk images. A user able to alter the QEMU
disk image files loaded by a guest could have used this flaw to
corrupt QEMU process memory on the host, which could potentially have
resulted in arbitrary code execution on the host with the privileges
of the QEMU process.
*
CVE-2014-3461: A user able to alter the savevm data (either on the
disk or over the wire during migration) could have used this flaw to
to corrupt QEMU process memory on the (destination) host, which could
have potentially resulted in arbitrary code execution on the host
with the privileges of the QEMU process.
*
CVE-2014-0222: An integer overflow flaw was found in the QEMU block
driver for QCOW version 1 disk images. A user able to alter the QEMU
disk image files loaded by a guest could have used this flaw to
corrupt QEMU process memory on the host, which could have potentially
resulted in arbitrary code execution on the host with the privileges
of the QEMU process.
Non-security bugs fixed:
* Fix exceeding IRQ routes that could have caused freezes of guests.
(bnc#876842)
* Fix CPUID emulation bugs that may have broken Windows guests with
newer -cpu types (bnc#886535)
Security Issues:
* CVE-2014-0222
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0222>
* CVE-2014-0223
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0223>
* CVE-2014-3461
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3461>
Patchnames
sledsp3-kvm,slessp3-kvm
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for kvm", "title": "Title of the patch" }, { "category": "description", "text": "\nkvm has been updated to fix issues in the embedded qemu:\n\n * \n\n CVE-2014-0223: An integer overflow flaw was found in the QEMU block\n driver for QCOW version 1 disk images. A user able to alter the QEMU\n disk image files loaded by a guest could have used this flaw to\n corrupt QEMU process memory on the host, which could potentially have\n resulted in arbitrary code execution on the host with the privileges\n of the QEMU process.\n\n * \n\n CVE-2014-3461: A user able to alter the savevm data (either on the\n disk or over the wire during migration) could have used this flaw to\n to corrupt QEMU process memory on the (destination) host, which could\n have potentially resulted in arbitrary code execution on the host\n with the privileges of the QEMU process.\n\n * \n\n CVE-2014-0222: An integer overflow flaw was found in the QEMU block\n driver for QCOW version 1 disk images. A user able to alter the QEMU\n disk image files loaded by a guest could have used this flaw to\n corrupt QEMU process memory on the host, which could have potentially\n resulted in arbitrary code execution on the host with the privileges\n of the QEMU process.\n\nNon-security bugs fixed:\n\n * Fix exceeding IRQ routes that could have caused freezes of guests.\n (bnc#876842)\n * Fix CPUID emulation bugs that may have broken Windows guests with\n newer -cpu types (bnc#886535)\n\nSecurity Issues:\n\n * CVE-2014-0222\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0222\u003e\n * CVE-2014-0223\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0223\u003e\n * CVE-2014-3461\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3461\u003e\n\n", "title": "Description of the patch" }, { "category": "details", "text": "sledsp3-kvm,slessp3-kvm", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_1152-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2015:1152-1", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20151152-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2015:1152-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-June/001465.html" }, { "category": "self", "summary": "SUSE Bug 812836", "url": "https://bugzilla.suse.com/812836" }, { "category": "self", "summary": "SUSE Bug 812983", "url": "https://bugzilla.suse.com/812983" }, { "category": "self", "summary": "SUSE Bug 817593", "url": "https://bugzilla.suse.com/817593" }, { "category": "self", "summary": "SUSE Bug 821819", "url": "https://bugzilla.suse.com/821819" }, { "category": "self", "summary": "SUSE Bug 824340", "url": "https://bugzilla.suse.com/824340" }, { "category": "self", "summary": "SUSE Bug 829800", "url": "https://bugzilla.suse.com/829800" }, { "category": "self", "summary": "SUSE Bug 841080", "url": "https://bugzilla.suse.com/841080" }, { "category": "self", "summary": "SUSE Bug 842006", "url": "https://bugzilla.suse.com/842006" }, { "category": "self", "summary": "SUSE Bug 842088", "url": "https://bugzilla.suse.com/842088" }, { "category": "self", "summary": "SUSE Bug 858858", "url": "https://bugzilla.suse.com/858858" }, { "category": "self", "summary": "SUSE Bug 864391", "url": "https://bugzilla.suse.com/864391" }, { "category": "self", "summary": "SUSE Bug 864649", "url": "https://bugzilla.suse.com/864649" }, { "category": "self", "summary": "SUSE Bug 864650", "url": "https://bugzilla.suse.com/864650" }, { "category": "self", "summary": "SUSE Bug 864653", "url": "https://bugzilla.suse.com/864653" }, { "category": "self", "summary": "SUSE Bug 864655", "url": "https://bugzilla.suse.com/864655" }, { "category": "self", "summary": "SUSE Bug 864665", "url": "https://bugzilla.suse.com/864665" }, { "category": "self", "summary": "SUSE Bug 864671", "url": "https://bugzilla.suse.com/864671" }, { "category": "self", "summary": "SUSE Bug 864673", "url": "https://bugzilla.suse.com/864673" }, { "category": "self", "summary": "SUSE Bug 864678", "url": "https://bugzilla.suse.com/864678" }, { "category": "self", "summary": "SUSE Bug 864682", "url": "https://bugzilla.suse.com/864682" }, { "category": "self", "summary": "SUSE Bug 864769", "url": "https://bugzilla.suse.com/864769" }, { "category": "self", "summary": "SUSE Bug 864796", "url": "https://bugzilla.suse.com/864796" }, { "category": "self", "summary": "SUSE Bug 864801", "url": "https://bugzilla.suse.com/864801" }, { "category": "self", "summary": "SUSE Bug 864802", "url": "https://bugzilla.suse.com/864802" }, { "category": "self", "summary": "SUSE Bug 864804", "url": "https://bugzilla.suse.com/864804" }, { "category": "self", "summary": "SUSE Bug 864805", "url": "https://bugzilla.suse.com/864805" }, { "category": "self", "summary": "SUSE Bug 864811", "url": "https://bugzilla.suse.com/864811" }, { "category": "self", "summary": "SUSE Bug 864812", "url": "https://bugzilla.suse.com/864812" }, { "category": "self", "summary": "SUSE Bug 864814", "url": "https://bugzilla.suse.com/864814" }, { "category": "self", "summary": "SUSE Bug 870439", "url": "https://bugzilla.suse.com/870439" }, { "category": "self", "summary": "SUSE Bug 873235", "url": "https://bugzilla.suse.com/873235" }, { "category": "self", "summary": "SUSE Bug 874749", "url": "https://bugzilla.suse.com/874749" }, { "category": "self", "summary": "SUSE Bug 874788", "url": "https://bugzilla.suse.com/874788" }, { "category": "self", "summary": "SUSE Bug 876842", "url": "https://bugzilla.suse.com/876842" }, { "category": "self", "summary": "SUSE Bug 877642", "url": "https://bugzilla.suse.com/877642" }, { "category": "self", "summary": "SUSE Bug 877645", "url": "https://bugzilla.suse.com/877645" }, { "category": "self", "summary": "SUSE Bug 878541", "url": "https://bugzilla.suse.com/878541" }, { "category": "self", "summary": "SUSE Bug 886535", "url": "https://bugzilla.suse.com/886535" }, { "category": "self", "summary": "SUSE Bug 920571", "url": "https://bugzilla.suse.com/920571" }, { "category": "self", "summary": "SUSE Bug 924018", "url": "https://bugzilla.suse.com/924018" }, { "category": "self", "summary": "SUSE Bug 929339", "url": "https://bugzilla.suse.com/929339" }, { "category": "self", "summary": "SUSE Bug 932267", "url": "https://bugzilla.suse.com/932267" }, { "category": "self", "summary": "SUSE Bug 932770", "url": "https://bugzilla.suse.com/932770" }, { "category": "self", "summary": "SUSE CVE CVE-2013-2016 page", "url": "https://www.suse.com/security/cve/CVE-2013-2016/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4344 page", "url": "https://www.suse.com/security/cve/CVE-2013-4344/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4541 page", "url": "https://www.suse.com/security/cve/CVE-2013-4541/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0142 page", "url": "https://www.suse.com/security/cve/CVE-2014-0142/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0143 page", "url": "https://www.suse.com/security/cve/CVE-2014-0143/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0144 page", "url": "https://www.suse.com/security/cve/CVE-2014-0144/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0145 page", "url": "https://www.suse.com/security/cve/CVE-2014-0145/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0146 page", "url": "https://www.suse.com/security/cve/CVE-2014-0146/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0147 page", "url": "https://www.suse.com/security/cve/CVE-2014-0147/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0150 page", "url": "https://www.suse.com/security/cve/CVE-2014-0150/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0222 page", "url": "https://www.suse.com/security/cve/CVE-2014-0222/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0223 page", "url": "https://www.suse.com/security/cve/CVE-2014-0223/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-2894 page", "url": "https://www.suse.com/security/cve/CVE-2014-2894/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3461 page", "url": "https://www.suse.com/security/cve/CVE-2014-3461/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1779 page", "url": "https://www.suse.com/security/cve/CVE-2015-1779/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3209 page", "url": "https://www.suse.com/security/cve/CVE-2015-3209/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3456 page", "url": "https://www.suse.com/security/cve/CVE-2015-3456/" } ], "title": "Security update for kvm", "tracking": { "current_release_date": "2014-09-19T14:41:45Z", "generator": { "date": "2014-09-19T14:41:45Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2015:1152-1", "initial_release_date": "2014-09-19T14:41:45Z", "revision_history": [ { "date": "2014-09-19T14:41:45Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kvm-1.4.2-0.17.1.i586", "product": { "name": "kvm-1.4.2-0.17.1.i586", "product_id": "kvm-1.4.2-0.17.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "kvm-1.4.2-0.17.1.s390x", "product": { "name": "kvm-1.4.2-0.17.1.s390x", "product_id": "kvm-1.4.2-0.17.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kvm-1.4.2-0.17.1.x86_64", "product": { "name": "kvm-1.4.2-0.17.1.x86_64", "product_id": "kvm-1.4.2-0.17.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 11 SP3", "product": { "name": "SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sled:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3", "product": { "name": "SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product": { "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:11:sp3:teradata" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:11:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-0.17.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586" }, "product_reference": "kvm-1.4.2-0.17.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-0.17.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64" }, "product_reference": "kvm-1.4.2-0.17.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-0.17.1.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586" }, "product_reference": "kvm-1.4.2-0.17.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-0.17.1.s390x as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x" }, "product_reference": "kvm-1.4.2-0.17.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-0.17.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64" }, "product_reference": "kvm-1.4.2-0.17.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-0.17.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586" }, "product_reference": "kvm-1.4.2-0.17.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-0.17.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x" }, "product_reference": "kvm-1.4.2-0.17.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-0.17.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64" }, "product_reference": "kvm-1.4.2-0.17.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-0.17.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586" }, "product_reference": "kvm-1.4.2-0.17.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-0.17.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x" }, "product_reference": "kvm-1.4.2-0.17.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-0.17.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" }, "product_reference": "kvm-1.4.2-0.17.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-2016", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-2016" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way qemu v1.3.0 and later (virtio-rng) validates addresses when guest accesses the config space of a virtio device. If the virtio device has zero/small sized config space, such as virtio-rng, a privileged guest user could use this flaw to access the matching host\u0027s qemu address space and thus increase their privileges on the host.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-2016", "url": "https://www.suse.com/security/cve/CVE-2013-2016" }, { "category": "external", "summary": "SUSE Bug 817593 for CVE-2013-2016", "url": "https://bugzilla.suse.com/817593" }, { "category": "external", "summary": "SUSE Bug 871442 for CVE-2013-2016", "url": "https://bugzilla.suse.com/871442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "important" } ], "title": "CVE-2013-2016" }, { "cve": "CVE-2013-4344", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4344" } ], "notes": [ { "category": "general", "text": "Buffer overflow in the SCSI implementation in QEMU, as used in Xen, when a SCSI controller has more than 256 attached devices, allows local users to gain privileges via a small transfer buffer in a REPORT LUNS command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4344", "url": "https://www.suse.com/security/cve/CVE-2013-4344" }, { "category": "external", "summary": "SUSE Bug 842006 for CVE-2013-4344", "url": "https://bugzilla.suse.com/842006" }, { "category": "external", "summary": "SUSE Bug 871442 for CVE-2013-4344", "url": "https://bugzilla.suse.com/871442" }, { "category": "external", "summary": "SUSE Bug 880751 for CVE-2013-4344", "url": "https://bugzilla.suse.com/880751" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2013-4344" }, { "cve": "CVE-2013-4541", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4541" } ], "notes": [ { "category": "general", "text": "The usb_device_post_load function in hw/usb/bus.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a crafted savevm image, related to a negative setup_len or setup_index value.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4541", "url": "https://www.suse.com/security/cve/CVE-2013-4541" }, { "category": "external", "summary": "SUSE Bug 864802 for CVE-2013-4541", "url": "https://bugzilla.suse.com/864802" }, { "category": "external", "summary": "SUSE Bug 871442 for CVE-2013-4541", "url": "https://bugzilla.suse.com/871442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2013-4541" }, { "cve": "CVE-2014-0142", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0142" } ], "notes": [ { "category": "general", "text": "QEMU, possibly before 2.0.0, allows local users to cause a denial of service (divide-by-zero error and crash) via a zero value in the (1) tracks field to the seek_to_sector function in block/parallels.c or (2) extent_size field in the bochs function in block/bochs.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0142", "url": "https://www.suse.com/security/cve/CVE-2014-0142" }, { "category": "external", "summary": "SUSE Bug 870439 for CVE-2014-0142", "url": "https://bugzilla.suse.com/870439" }, { "category": "external", "summary": "SUSE Bug 871442 for CVE-2014-0142", "url": "https://bugzilla.suse.com/871442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2014-0142" }, { "cve": "CVE-2014-0143", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0143" } ], "notes": [ { "category": "general", "text": "Multiple integer overflows in the block drivers in QEMU, possibly before 2.0.0, allow local users to cause a denial of service (crash) via a crafted catalog size in (1) the parallels_open function in block/parallels.c or (2) bochs_open function in bochs.c, a large L1 table in the (3) qcow2_snapshot_load_tmp in qcow2-snapshot.c or (4) qcow2_grow_l1_table function in qcow2-cluster.c, (5) a large request in the bdrv_check_byte_request function in block.c and other block drivers, (6) crafted cluster indexes in the get_refcount function in qcow2-refcount.c, or (7) a large number of blocks in the cloop_open function in cloop.c, which trigger buffer overflows, memory corruption, large memory allocations and out-of-bounds read and writes.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0143", "url": "https://www.suse.com/security/cve/CVE-2014-0143" }, { "category": "external", "summary": "SUSE Bug 870439 for CVE-2014-0143", "url": "https://bugzilla.suse.com/870439" }, { "category": "external", "summary": "SUSE Bug 871442 for CVE-2014-0143", "url": "https://bugzilla.suse.com/871442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2014-0143" }, { "cve": "CVE-2014-0144", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0144" } ], "notes": [ { "category": "general", "text": "QEMU before 2.0.0 block drivers for CLOOP, QCOW2 version 2 and various other image formats are vulnerable to potential memory corruptions, integer/buffer overflows or crash caused by missing input validations which could allow a remote user to execute arbitrary code on the host with the privileges of the QEMU process.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0144", "url": "https://www.suse.com/security/cve/CVE-2014-0144" }, { "category": "external", "summary": "SUSE Bug 870439 for CVE-2014-0144", "url": "https://bugzilla.suse.com/870439" }, { "category": "external", "summary": "SUSE Bug 871442 for CVE-2014-0144", "url": "https://bugzilla.suse.com/871442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2014-0144" }, { "cve": "CVE-2014-0145", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0145" } ], "notes": [ { "category": "general", "text": "Multiple buffer overflows in QEMU before 1.7.2 and 2.x before 2.0.0, allow local users to cause a denial of service (crash) or possibly execute arbitrary code via a large (1) L1 table in the qcow2_snapshot_load_tmp in the QCOW 2 block driver (block/qcow2-snapshot.c) or (2) uncompressed chunk, (3) chunk length, or (4) number of sectors in the DMG block driver (block/dmg.c).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0145", "url": "https://www.suse.com/security/cve/CVE-2014-0145" }, { "category": "external", "summary": "SUSE Bug 870439 for CVE-2014-0145", "url": "https://bugzilla.suse.com/870439" }, { "category": "external", "summary": "SUSE Bug 871442 for CVE-2014-0145", "url": "https://bugzilla.suse.com/871442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "important" } ], "title": "CVE-2014-0145" }, { "cve": "CVE-2014-0146", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0146" } ], "notes": [ { "category": "general", "text": "The qcow2_open function in the (block/qcow2.c) in QEMU before 1.7.2 and 2.x before 2.0.0 allows local users to cause a denial of service (NULL pointer dereference) via a crafted image which causes an error, related to the initialization of the snapshot_offset and nb_snapshots fields.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0146", "url": "https://www.suse.com/security/cve/CVE-2014-0146" }, { "category": "external", "summary": "SUSE Bug 870439 for CVE-2014-0146", "url": "https://bugzilla.suse.com/870439" }, { "category": "external", "summary": "SUSE Bug 871442 for CVE-2014-0146", "url": "https://bugzilla.suse.com/871442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2014-0146" }, { "cve": "CVE-2014-0147", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0147" } ], "notes": [ { "category": "general", "text": "Qemu before 1.6.2 block diver for the various disk image formats used by Bochs and for the QCOW version 2 format, are vulnerable to a possible crash caused by signed data types or a logic error while creating QCOW2 snapshots, which leads to incorrectly calling update_refcount() routine.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0147", "url": "https://www.suse.com/security/cve/CVE-2014-0147" }, { "category": "external", "summary": "SUSE Bug 870439 for CVE-2014-0147", "url": "https://bugzilla.suse.com/870439" }, { "category": "external", "summary": "SUSE Bug 871442 for CVE-2014-0147", "url": "https://bugzilla.suse.com/871442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2014-0147" }, { "cve": "CVE-2014-0150", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0150" } ], "notes": [ { "category": "general", "text": "Integer overflow in the virtio_net_handle_mac function in hw/net/virtio-net.c in QEMU 2.0 and earlier allows local guest users to execute arbitrary code via a MAC addresses table update request, which triggers a heap-based buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0150", "url": "https://www.suse.com/security/cve/CVE-2014-0150" }, { "category": "external", "summary": "SUSE Bug 873235 for CVE-2014-0150", "url": "https://bugzilla.suse.com/873235" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2014-0150" }, { "cve": "CVE-2014-0222", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0222" } ], "notes": [ { "category": "general", "text": "Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0222", "url": "https://www.suse.com/security/cve/CVE-2014-0222" }, { "category": "external", "summary": "SUSE Bug 1072223 for CVE-2014-0222", "url": "https://bugzilla.suse.com/1072223" }, { "category": "external", "summary": "SUSE Bug 877642 for CVE-2014-0222", "url": "https://bugzilla.suse.com/877642" }, { "category": "external", "summary": "SUSE Bug 950367 for CVE-2014-0222", "url": "https://bugzilla.suse.com/950367" }, { "category": "external", "summary": "SUSE Bug 964925 for CVE-2014-0222", "url": "https://bugzilla.suse.com/964925" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2014-0222" }, { "cve": "CVE-2014-0223", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0223" } ], "notes": [ { "category": "general", "text": "Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a large image size, which triggers a buffer overflow or out-of-bounds read.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0223", "url": "https://www.suse.com/security/cve/CVE-2014-0223" }, { "category": "external", "summary": "SUSE Bug 877645 for CVE-2014-0223", "url": "https://bugzilla.suse.com/877645" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2014-0223" }, { "cve": "CVE-2014-2894", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-2894" } ], "notes": [ { "category": "general", "text": "Off-by-one error in the cmd_smart function in the smart self test in hw/ide/core.c in QEMU before 2.0 allows local users to have unspecified impact via a SMART EXECUTE OFFLINE command that triggers a buffer underflow and memory corruption.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-2894", "url": "https://www.suse.com/security/cve/CVE-2014-2894" }, { "category": "external", "summary": "SUSE Bug 874749 for CVE-2014-2894", "url": "https://bugzilla.suse.com/874749" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2014-2894" }, { "cve": "CVE-2014-3461", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3461" } ], "notes": [ { "category": "general", "text": "hw/usb/bus.c in QEMU 1.6.2 allows remote attackers to execute arbitrary code via crafted savevm data, which triggers a heap-based buffer overflow, related to \"USB post load checks.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3461", "url": "https://www.suse.com/security/cve/CVE-2014-3461" }, { "category": "external", "summary": "SUSE Bug 878541 for CVE-2014-3461", "url": "https://bugzilla.suse.com/878541" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2014-3461" }, { "cve": "CVE-2015-1779", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1779" } ], "notes": [ { "category": "general", "text": "The VNC websocket frame decoder in QEMU allows remote attackers to cause a denial of service (memory and CPU consumption) via a large (1) websocket payload or (2) HTTP headers section.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1779", "url": "https://www.suse.com/security/cve/CVE-2015-1779" }, { "category": "external", "summary": "SUSE Bug 924018 for CVE-2015-1779", "url": "https://bugzilla.suse.com/924018" }, { "category": "external", "summary": "SUSE Bug 962632 for CVE-2015-1779", "url": "https://bugzilla.suse.com/962632" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2015-1779" }, { "cve": "CVE-2015-3209", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3209" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3209", "url": "https://www.suse.com/security/cve/CVE-2015-3209" }, { "category": "external", "summary": "SUSE Bug 932267 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932267" }, { "category": "external", "summary": "SUSE Bug 932770 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932770" }, { "category": "external", "summary": "SUSE Bug 932823 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932823" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "important" } ], "title": "CVE-2015-3209" }, { "cve": "CVE-2015-3456", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3456" } ], "notes": [ { "category": "general", "text": "The Floppy Disk Controller (FDC) in QEMU, as used in Xen 4.5.x and earlier and KVM, allows local guest users to cause a denial of service (out-of-bounds write and guest crash) or possibly execute arbitrary code via the (1) FD_CMD_READ_ID, (2) FD_CMD_DRIVE_SPECIFICATION_COMMAND, or other unspecified commands, aka VENOM.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3456", "url": "https://www.suse.com/security/cve/CVE-2015-3456" }, { "category": "external", "summary": "SUSE Bug 929339 for CVE-2015-3456", "url": "https://bugzilla.suse.com/929339" }, { "category": "external", "summary": "SUSE Bug 932770 for CVE-2015-3456", "url": "https://bugzilla.suse.com/932770" }, { "category": "external", "summary": "SUSE Bug 935900 for CVE-2015-3456", "url": "https://bugzilla.suse.com/935900" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server 11 SP3:kvm-1.4.2-0.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:kvm-1.4.2-0.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-09-19T14:41:45Z", "details": "moderate" } ], "title": "CVE-2015-3456" } ] }
gsd-2015-3209
Vulnerability from gsd
Modified
2023-12-13 01:20
Details
Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2015-3209", "description": "Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.", "id": "GSD-2015-3209", "references": [ "https://www.suse.com/security/cve/CVE-2015-3209.html", "https://www.debian.org/security/2015/dsa-3286", "https://www.debian.org/security/2015/dsa-3285", "https://www.debian.org/security/2015/dsa-3284", "https://access.redhat.com/errata/RHSA-2015:1189", "https://access.redhat.com/errata/RHSA-2015:1089", "https://access.redhat.com/errata/RHSA-2015:1088", "https://access.redhat.com/errata/RHSA-2015:1087", "https://ubuntu.com/security/CVE-2015-3209", "https://advisories.mageia.org/CVE-2015-3209.html", "https://linux.oracle.com/cve/CVE-2015-3209.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2015-3209" ], "details": "Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.", "id": "GSD-2015-3209", "modified": "2023-12-13T01:20:07.384150Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-3209", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_affected": "=", "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://security.gentoo.org/glsa/201604-03", "refsource": "MISC", "url": "https://security.gentoo.org/glsa/201604-03" }, { "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10698", "refsource": "MISC", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10698" }, { "name": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160669.html", "refsource": "MISC", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160669.html" }, { "name": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160677.html", "refsource": "MISC", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160677.html" }, { "name": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160685.html", "refsource": "MISC", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160685.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00027.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00027.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00029.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00029.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00014.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00014.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00020.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00020.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00015.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00015.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00027.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00027.html" }, { "name": "http://rhn.redhat.com/errata/RHSA-2015-1087.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2015-1087.html" }, { "name": "http://rhn.redhat.com/errata/RHSA-2015-1088.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2015-1088.html" }, { "name": "http://rhn.redhat.com/errata/RHSA-2015-1089.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2015-1089.html" }, { "name": "http://rhn.redhat.com/errata/RHSA-2015-1189.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2015-1189.html" }, { "name": "http://www.debian.org/security/2015/dsa-3284", "refsource": "MISC", "url": "http://www.debian.org/security/2015/dsa-3284" }, { "name": "http://www.debian.org/security/2015/dsa-3285", "refsource": "MISC", "url": "http://www.debian.org/security/2015/dsa-3285" }, { "name": "http://www.debian.org/security/2015/dsa-3286", "refsource": "MISC", "url": "http://www.debian.org/security/2015/dsa-3286" }, { "name": "http://www.securityfocus.com/bid/75123", "refsource": "MISC", "url": "http://www.securityfocus.com/bid/75123" }, { "name": "http://www.securitytracker.com/id/1032545", "refsource": "MISC", "url": "http://www.securitytracker.com/id/1032545" }, { "name": "http://www.ubuntu.com/usn/USN-2630-1", "refsource": "MISC", "url": "http://www.ubuntu.com/usn/USN-2630-1" }, { "name": "http://xenbits.xen.org/xsa/advisory-135.html", "refsource": "MISC", "url": "http://xenbits.xen.org/xsa/advisory-135.html" }, { "name": "https://kb.juniper.net/JSA10783", "refsource": "MISC", "url": "https://kb.juniper.net/JSA10783" }, { "name": "https://security.gentoo.org/glsa/201510-02", "refsource": "MISC", "url": "https://security.gentoo.org/glsa/201510-02" }, { "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1180-security-advisory-13", "refsource": "MISC", "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1180-security-advisory-13" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.3.1", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:juniper:junos_space:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "15.1", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:6.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:arista:eos:4.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:arista:eos:4.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:arista:eos:4.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:arista:eos:4.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-3209" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-787" } ] } ] }, "references": { "reference_data": [ { "name": "http://xenbits.xen.org/xsa/advisory-135.html", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://xenbits.xen.org/xsa/advisory-135.html" }, { "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10698", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10698" }, { "name": "GLSA-201510-02", "refsource": "GENTOO", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201510-02" }, { "name": "75123", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/75123" }, { "name": "USN-2630-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2630-1" }, { "name": "SUSE-SU-2015:1643", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00027.html" }, { "name": "SUSE-SU-2015:1519", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00015.html" }, { "name": "SUSE-SU-2015:1426", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00020.html" }, { "name": "SUSE-SU-2015:1152", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00027.html" }, { "name": "SUSE-SU-2015:1206", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00014.html" }, { "name": "FEDORA-2015-9965", "refsource": "FEDORA", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160685.html" }, { "name": "FEDORA-2015-9978", "refsource": "FEDORA", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160677.html" }, { "name": "FEDORA-2015-10001", "refsource": "FEDORA", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160669.html" }, { "name": "1032545", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1032545" }, { "name": "DSA-3286", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2015/dsa-3286" }, { "name": "RHSA-2015:1089", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1089.html" }, { "name": "RHSA-2015:1088", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1088.html" }, { "name": "RHSA-2015:1087", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1087.html" }, { "name": "SUSE-SU-2015:1157", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html" }, { "name": "SUSE-SU-2015:1156", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00029.html" }, { "name": "SUSE-SU-2015:1045", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html" }, { "name": "SUSE-SU-2015:1042", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html" }, { "name": "https://kb.juniper.net/JSA10783", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://kb.juniper.net/JSA10783" }, { "name": "GLSA-201604-03", "refsource": "GENTOO", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201604-03" }, { "name": "DSA-3285", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2015/dsa-3285" }, { "name": "DSA-3284", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2015/dsa-3284" }, { "name": "RHSA-2015:1189", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1189.html" }, { "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1180-security-advisory-13", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1180-security-advisory-13" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false } }, "lastModifiedDate": "2023-02-13T00:48Z", "publishedDate": "2015-06-15T15:59Z" } } }
ghsa-f8hq-r3jp-2m27
Vulnerability from github
Published
2022-05-13 01:03
Modified
2022-05-13 01:03
VLAI Severity ?
Details
Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.
{ "affected": [], "aliases": [ "CVE-2015-3209" ], "database_specific": { "cwe_ids": [ "CWE-787" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2015-06-15T15:59:00Z", "severity": "HIGH" }, "details": "Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.", "id": "GHSA-f8hq-r3jp-2m27", "modified": "2022-05-13T01:03:35Z", "published": "2022-05-13T01:03:35Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3209" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2015:1087" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2015:1088" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2015:1089" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2015:1189" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2015-3209" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1225882" }, { "type": "WEB", "url": "https://kb.juniper.net/JSA10783" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/201510-02" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/201604-03" }, { "type": "WEB", "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1180-security-advisory-13" }, { "type": "WEB", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10698" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160669.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160677.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160685.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00027.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00029.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00014.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00020.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00015.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00027.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2015-1087.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2015-1088.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2015-1089.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2015-1189.html" }, { "type": "WEB", "url": "http://www.debian.org/security/2015/dsa-3284" }, { "type": "WEB", "url": "http://www.debian.org/security/2015/dsa-3285" }, { "type": "WEB", "url": "http://www.debian.org/security/2015/dsa-3286" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/75123" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1032545" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-2630-1" }, { "type": "WEB", "url": "http://xenbits.xen.org/xsa/advisory-135.html" } ], "schema_version": "1.4.0", "severity": [] }
fkie_cve-2015-3209
Vulnerability from fkie_nvd
Published
2015-06-15 15:59
Modified
2025-04-12 10:46
Severity ?
Summary
Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698 | Third Party Advisory | |
secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160669.html | Third Party Advisory | |
secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160677.html | Third Party Advisory | |
secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160685.html | Third Party Advisory | |
secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html | Mailing List, Third Party Advisory | |
secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html | Mailing List, Third Party Advisory | |
secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00027.html | Mailing List, Third Party Advisory | |
secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00029.html | Mailing List, Third Party Advisory | |
secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html | Mailing List, Third Party Advisory | |
secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00014.html | Mailing List, Third Party Advisory | |
secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00020.html | Mailing List, Third Party Advisory | |
secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00015.html | Mailing List, Third Party Advisory | |
secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00027.html | Mailing List, Third Party Advisory | |
secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2015-1087.html | Third Party Advisory | |
secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2015-1088.html | Third Party Advisory | |
secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2015-1089.html | Third Party Advisory | |
secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2015-1189.html | Third Party Advisory | |
secalert@redhat.com | http://www.debian.org/security/2015/dsa-3284 | Third Party Advisory | |
secalert@redhat.com | http://www.debian.org/security/2015/dsa-3285 | Third Party Advisory | |
secalert@redhat.com | http://www.debian.org/security/2015/dsa-3286 | Third Party Advisory | |
secalert@redhat.com | http://www.securityfocus.com/bid/75123 | Third Party Advisory, VDB Entry | |
secalert@redhat.com | http://www.securitytracker.com/id/1032545 | Third Party Advisory, VDB Entry | |
secalert@redhat.com | http://www.ubuntu.com/usn/USN-2630-1 | Third Party Advisory | |
secalert@redhat.com | http://xenbits.xen.org/xsa/advisory-135.html | Third Party Advisory | |
secalert@redhat.com | https://kb.juniper.net/JSA10783 | Third Party Advisory | |
secalert@redhat.com | https://security.gentoo.org/glsa/201510-02 | Third Party Advisory | |
secalert@redhat.com | https://security.gentoo.org/glsa/201604-03 | Third Party Advisory | |
secalert@redhat.com | https://www.arista.com/en/support/advisories-notices/security-advisories/1180-security-advisory-13 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160669.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160677.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160685.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00027.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00029.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00014.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00020.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00015.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00027.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2015-1087.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2015-1088.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2015-1089.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2015-1189.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2015/dsa-3284 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2015/dsa-3285 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2015/dsa-3286 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/75123 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1032545 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-2630-1 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://xenbits.xen.org/xsa/advisory-135.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://kb.juniper.net/JSA10783 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201510-02 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201604-03 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.arista.com/en/support/advisories-notices/security-advisories/1180-security-advisory-13 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
qemu | qemu | * | |
juniper | junos_space | * | |
canonical | ubuntu_linux | 12.04 | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 14.10 | |
canonical | ubuntu_linux | 15.04 | |
debian | debian_linux | 7.0 | |
debian | debian_linux | 8.0 | |
redhat | enterprise_linux_desktop | 6.0 | |
redhat | enterprise_linux_eus | 6.6 | |
redhat | enterprise_linux_server | 5.0 | |
redhat | enterprise_linux_server | 6.0 | |
redhat | enterprise_linux_server_aus | 6.6 | |
redhat | enterprise_linux_server_tus | 6.6 | |
redhat | enterprise_linux_workstation | 5.0 | |
redhat | enterprise_linux_workstation | 6.0 | |
redhat | openstack | 5.0 | |
redhat | virtualization | 3.0 | |
redhat | enterprise_linux | 6.0 | |
fedoraproject | fedora | 20 | |
fedoraproject | fedora | 21 | |
fedoraproject | fedora | 22 | |
suse | linux_enterprise_debuginfo | 11 | |
suse | linux_enterprise_desktop | 11 | |
suse | linux_enterprise_desktop | 12 | |
suse | linux_enterprise_server | 10 | |
suse | linux_enterprise_server | 11 | |
suse | linux_enterprise_server | 11 | |
suse | linux_enterprise_server | 11 | |
suse | linux_enterprise_server | 12 | |
suse | linux_enterprise_software_development_kit | 11 | |
suse | linux_enterprise_software_development_kit | 12 | |
arista | eos | 4.12 | |
arista | eos | 4.13 | |
arista | eos | 4.14 | |
arista | eos | 4.15 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*", "matchCriteriaId": "19E6775C-BA58-4D7E-96AB-9283C99D9641", "versionEndIncluding": "2.3.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:juniper:junos_space:*:*:*:*:*:*:*:*", "matchCriteriaId": "6133CA80-A291-487F-AE06-85D4AA154727", "versionEndIncluding": "15.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "matchCriteriaId": "8D305F7A-D159-4716-AB26-5E38BB5CD991", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*", "matchCriteriaId": "49A63F39-30BE-443F-AF10-6245587D3359", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*", "matchCriteriaId": "F38D3B7E-8429-473F-BB31-FC3583EE5A5B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:6.6:*:*:*:*:*:*:*", "matchCriteriaId": "319EC0C6-94C5-494A-9C5D-DC5124DFC8E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "54D669D4-6D7E-449D-80C1-28FA44F06FFE", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*", "matchCriteriaId": "16E6D998-B41D-4B49-9E00-8336D2E40A4A", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*", "matchCriteriaId": "13E02156-E748-4820-B76F-7074793837E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "D0AC5CD5-6E58-433C-9EB3-6DFE5656463E", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "B152EDF3-3140-4343-802F-F4F1C329F5C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "D86166F9-BBF0-4650-8CCD-0F9C97104D21", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*", "matchCriteriaId": "FF47C9F0-D8DA-4B55-89EB-9B2C9383ADB9", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*", "matchCriteriaId": "56BDB5A0-0839-4A20-A003-B8CD56F48171", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "matchCriteriaId": "253C303A-E577-4488-93E6-68A8DD942C38", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*", "matchCriteriaId": "D5900A25-FDD7-4900-BF7C-F3ECCB714D2B", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*", "matchCriteriaId": "3ED68ADD-BBDA-4485-BC76-58F011D72311", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*", "matchCriteriaId": "D2DF4815-B8CB-4AD3-B91D-2E09A8E318E9", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*", "matchCriteriaId": "35BBD83D-BDC7-4678-BE94-639F59281139", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:*:*:*", "matchCriteriaId": "67960FB9-13D1-4DEE-8158-31BF31BCBE6F", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*", "matchCriteriaId": "CB6476C7-03F2-4939-AB85-69AA524516D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*", "matchCriteriaId": "E534C201-BCC5-473C-AAA7-AAB97CEB5437", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*", "matchCriteriaId": "15FC9014-BD85-4382-9D04-C0703E901D7A", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*", "matchCriteriaId": "2F7F8866-DEAD-44D1-AB10-21EE611AA026", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*", "matchCriteriaId": "1831D45A-EE6E-4220-8F8C-248B69520948", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:eos:4.12:*:*:*:*:*:*:*", "matchCriteriaId": "FDDF9823-D999-41A4-BB7B-A63C00ACE11B", "vulnerable": true }, { "criteria": "cpe:2.3:o:arista:eos:4.13:*:*:*:*:*:*:*", "matchCriteriaId": "51F7426A-46F7-4BE0-806F-F4598C8B0426", "vulnerable": true }, { "criteria": "cpe:2.3:o:arista:eos:4.14:*:*:*:*:*:*:*", "matchCriteriaId": "E7F71EBA-27AC-464B-8708-4E8971BC75A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:arista:eos:4.15:*:*:*:*:*:*:*", "matchCriteriaId": "8705CF80-DEFC-4425-8E23-D98FFD678157", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set." }, { "lang": "es", "value": "Desbordamiento de buffer basado en memoria din\u00e1mica en el controlador PCNET en QEMU permite a atacantes remotos ejecutar c\u00f3digo arbitrario mediante el env\u00edo de un paquete con el juego TXSTATUS_STARTPACKET y posteriormente un paquete manipulado con el juego TXSTATUS_DEVICEOWNS." } ], "id": "CVE-2015-3209", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-06-15T15:59:00.070", "references": [ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10698" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160669.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160677.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160685.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00027.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00029.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00014.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00020.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00015.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00027.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1087.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1088.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1089.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1189.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2015/dsa-3284" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2015/dsa-3285" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2015/dsa-3286" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/75123" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1032545" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2630-1" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://xenbits.xen.org/xsa/advisory-135.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://kb.juniper.net/JSA10783" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201510-02" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201604-03" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1180-security-advisory-13" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10698" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160669.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160677.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160685.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00027.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00029.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00014.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00015.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00027.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1087.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1088.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1089.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1189.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2015/dsa-3284" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2015/dsa-3285" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2015/dsa-3286" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/75123" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1032545" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2630-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://xenbits.xen.org/xsa/advisory-135.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://kb.juniper.net/JSA10783" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201510-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201604-03" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1180-security-advisory-13" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…