suse-su-2015:0929-1
Vulnerability from csaf_suse
Published
2012-08-31 14:36
Modified
2012-08-31 14:36
Summary
Security update for kvm
Notes
Title of the patch
Security update for kvm
Description of the patch
The kvm qemu vt100 emulation was affected by a problem where specific vt100
sequences could have been used by guest users to affect the host.
(CVE-2012-3515 aka XSA-17).
Also a temp file race was fixed. (CVE-2012-2652)
Security Issue reference:
* CVE-2012-3515
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3515>
* CVE-2012-2652
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2652>
Patchnames
slessp1-kvm
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for kvm", "title": "Title of the patch" }, { "category": "description", "text": "\nThe kvm qemu vt100 emulation was affected by a problem where specific vt100 \nsequences could have been used by guest users to affect the host. \n(CVE-2012-3515 aka XSA-17).\n\nAlso a temp file race was fixed. (CVE-2012-2652)\n\nSecurity Issue reference:\n\n * CVE-2012-3515\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3515\u003e\n * CVE-2012-2652\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2652\u003e\n\n", "title": "Description of the patch" }, { "category": "details", "text": "slessp1-kvm", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_0929-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2015:0929-1", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20150929-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2015:0929-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-May/001402.html" }, { "category": "self", "summary": "SUSE Bug 598271", "url": "https://bugzilla.suse.com/598271" }, { "category": "self", "summary": "SUSE Bug 598298", "url": "https://bugzilla.suse.com/598298" }, { "category": "self", "summary": "SUSE Bug 599095", "url": "https://bugzilla.suse.com/599095" }, { "category": "self", "summary": "SUSE Bug 603161", "url": "https://bugzilla.suse.com/603161" }, { "category": "self", "summary": "SUSE Bug 603179", "url": "https://bugzilla.suse.com/603179" }, { "category": "self", "summary": "SUSE Bug 610682", "url": "https://bugzilla.suse.com/610682" }, { "category": "self", "summary": "SUSE Bug 619991", "url": "https://bugzilla.suse.com/619991" }, { "category": "self", "summary": "SUSE Bug 621793", "url": "https://bugzilla.suse.com/621793" }, { "category": "self", "summary": "SUSE Bug 626654", "url": "https://bugzilla.suse.com/626654" }, { "category": "self", "summary": "SUSE Bug 637297", "url": "https://bugzilla.suse.com/637297" }, { "category": "self", "summary": "SUSE Bug 689895", "url": "https://bugzilla.suse.com/689895" }, { "category": "self", "summary": "SUSE Bug 690781", "url": "https://bugzilla.suse.com/690781" }, { "category": "self", "summary": "SUSE Bug 695510", "url": "https://bugzilla.suse.com/695510" }, { "category": "self", "summary": "SUSE Bug 695766", "url": "https://bugzilla.suse.com/695766" }, { "category": "self", "summary": "SUSE Bug 698237", "url": "https://bugzilla.suse.com/698237" }, { "category": "self", "summary": "SUSE Bug 701161", "url": "https://bugzilla.suse.com/701161" }, { "category": "self", "summary": "SUSE Bug 702823", "url": "https://bugzilla.suse.com/702823" }, { "category": "self", "summary": "SUSE Bug 704933", "url": "https://bugzilla.suse.com/704933" }, { "category": "self", "summary": "SUSE Bug 705095", "url": "https://bugzilla.suse.com/705095" }, { "category": "self", "summary": "SUSE Bug 705304", "url": "https://bugzilla.suse.com/705304" }, { "category": "self", "summary": "SUSE Bug 740165", "url": "https://bugzilla.suse.com/740165" }, { "category": "self", "summary": "SUSE Bug 764526", "url": "https://bugzilla.suse.com/764526" }, { "category": "self", "summary": "SUSE Bug 777084", "url": "https://bugzilla.suse.com/777084" }, { "category": "self", "summary": "SUSE Bug 877642", "url": "https://bugzilla.suse.com/877642" }, { "category": "self", "summary": "SUSE Bug 877645", "url": "https://bugzilla.suse.com/877645" }, { "category": "self", "summary": "SUSE Bug 929339", "url": "https://bugzilla.suse.com/929339" }, { "category": "self", "summary": "SUSE Bug 932770", "url": "https://bugzilla.suse.com/932770" }, { "category": "self", "summary": "SUSE CVE CVE-2011-1750 page", "url": "https://www.suse.com/security/cve/CVE-2011-1750/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-1751 page", "url": "https://www.suse.com/security/cve/CVE-2011-1751/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-2212 page", "url": "https://www.suse.com/security/cve/CVE-2011-2212/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-2512 page", "url": "https://www.suse.com/security/cve/CVE-2011-2512/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-2527 page", "url": "https://www.suse.com/security/cve/CVE-2011-2527/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-0029 page", "url": "https://www.suse.com/security/cve/CVE-2012-0029/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-2652 page", "url": "https://www.suse.com/security/cve/CVE-2012-2652/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-3515 page", "url": "https://www.suse.com/security/cve/CVE-2012-3515/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0222 page", "url": "https://www.suse.com/security/cve/CVE-2014-0222/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0223 page", "url": "https://www.suse.com/security/cve/CVE-2014-0223/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3209 page", "url": "https://www.suse.com/security/cve/CVE-2015-3209/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3456 page", "url": "https://www.suse.com/security/cve/CVE-2015-3456/" } ], "title": "Security update for kvm", "tracking": { "current_release_date": "2012-08-31T14:36:20Z", "generator": { "date": "2012-08-31T14:36:20Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2015:0929-1", "initial_release_date": "2012-08-31T14:36:20Z", "revision_history": [ { "date": "2012-08-31T14:36:20Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kvm-0.12.5-1.24.1.i586", "product": { "name": "kvm-0.12.5-1.24.1.i586", "product_id": "kvm-0.12.5-1.24.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "kvm-0.12.5-1.24.1.x86_64", "product": { "name": "kvm-0.12.5-1.24.1.x86_64", "product_id": "kvm-0.12.5-1.24.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 11 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles_ltss:11:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP1-TERADATA", "product": { "name": "SUSE Linux Enterprise Server 11 SP1-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP1-TERADATA", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:11:sp1:teradata" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kvm-0.12.5-1.24.1.i586 as component of SUSE Linux Enterprise Server 11 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586" }, "product_reference": "kvm-0.12.5-1.24.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-0.12.5-1.24.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64" }, "product_reference": "kvm-0.12.5-1.24.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-0.12.5-1.24.1.i586 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586" }, "product_reference": "kvm-0.12.5-1.24.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-0.12.5-1.24.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" }, "product_reference": "kvm-0.12.5-1.24.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-TERADATA" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-1750", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-1750" } ], "notes": [ { "category": "general", "text": "Multiple heap-based buffer overflows in the virtio-blk driver (hw/virtio-blk.c) in qemu-kvm 0.14.0 allow local guest users to cause a denial of service (guest crash) and possibly gain privileges via a (1) write request to the virtio_blk_handle_write function or (2) read request to the virtio_blk_handle_read function that is not properly aligned.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-1750", "url": "https://www.suse.com/security/cve/CVE-2011-1750" }, { "category": "external", "summary": "SUSE Bug 689895 for CVE-2011-1750", "url": "https://bugzilla.suse.com/689895" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2012-08-31T14:36:20Z", "details": "important" } ], "title": "CVE-2011-1750" }, { "cve": "CVE-2011-1751", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-1751" } ], "notes": [ { "category": "general", "text": "The pciej_write function in hw/acpi_piix4.c in the PIIX4 Power Management emulation in qemu-kvm does not check if a device is hotpluggable before unplugging the PCI-ISA bridge, which allows privileged guest users to cause a denial of service (guest crash) and possibly execute arbitrary code by sending a crafted value to the 0xae08 (PCI_EJ_BASE) I/O port, which leads to a use-after-free related to \"active qemu timers.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-1751", "url": "https://www.suse.com/security/cve/CVE-2011-1751" }, { "category": "external", "summary": "SUSE Bug 690781 for CVE-2011-1751", "url": "https://bugzilla.suse.com/690781" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2012-08-31T14:36:20Z", "details": "important" } ], "title": "CVE-2011-1751" }, { "cve": "CVE-2011-2212", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-2212" } ], "notes": [ { "category": "general", "text": "Buffer overflow in the virtio subsystem in qemu-kvm 0.14.0 and earlier allows privileged guest users to cause a denial of service (guest crash) or gain privileges via a crafted indirect descriptor related to \"virtqueue in and out requests.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-2212", "url": "https://www.suse.com/security/cve/CVE-2011-2212" }, { "category": "external", "summary": "SUSE Bug 701161 for CVE-2011-2212", "url": "https://bugzilla.suse.com/701161" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2012-08-31T14:36:20Z", "details": "important" } ], "title": "CVE-2011-2212" }, { "cve": "CVE-2011-2512", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-2512" } ], "notes": [ { "category": "general", "text": "The virtio_queue_notify in qemu-kvm 0.14.0 and earlier does not properly validate the virtqueue number, which allows guest users to cause a denial of service (guest crash) and possibly execute arbitrary code via a negative number in the Queue Notify field of the Virtio Header, which bypasses a signed comparison.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-2512", "url": "https://www.suse.com/security/cve/CVE-2011-2512" }, { "category": "external", "summary": "SUSE Bug 702823 for CVE-2011-2512", "url": "https://bugzilla.suse.com/702823" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2012-08-31T14:36:20Z", "details": "moderate" } ], "title": "CVE-2011-2512" }, { "cve": "CVE-2011-2527", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-2527" } ], "notes": [ { "category": "general", "text": "The change_process_uid function in os-posix.c in Qemu 0.14.0 and earlier does not properly drop group privileges when the -runas option is used, which allows local guest users to access restricted files on the host.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-2527", "url": "https://www.suse.com/security/cve/CVE-2011-2527" }, { "category": "external", "summary": "SUSE Bug 705304 for CVE-2011-2527", "url": "https://bugzilla.suse.com/705304" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2012-08-31T14:36:20Z", "details": "low" } ], "title": "CVE-2011-2527" }, { "cve": "CVE-2012-0029", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-0029" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-0029", "url": "https://www.suse.com/security/cve/CVE-2012-0029" }, { "category": "external", "summary": "SUSE Bug 740165 for CVE-2012-0029", "url": "https://bugzilla.suse.com/740165" }, { "category": "external", "summary": "SUSE Bug 747331 for CVE-2012-0029", "url": "https://bugzilla.suse.com/747331" }, { "category": "external", "summary": "SUSE Bug 757537 for CVE-2012-0029", "url": "https://bugzilla.suse.com/757537" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2012-08-31T14:36:20Z", "details": "important" } ], "title": "CVE-2012-0029" }, { "cve": "CVE-2012-2652", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-2652" } ], "notes": [ { "category": "general", "text": "The bdrv_open function in Qemu 1.0 does not properly handle the failure of the mkstemp function, when in snapshot node, which allows local users to overwrite or read arbitrary files via a symlink attack on an unspecified temporary file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-2652", "url": "https://www.suse.com/security/cve/CVE-2012-2652" }, { "category": "external", "summary": "SUSE Bug 764526 for CVE-2012-2652", "url": "https://bugzilla.suse.com/764526" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2012-08-31T14:36:20Z", "details": "moderate" } ], "title": "CVE-2012-2652" }, { "cve": "CVE-2012-3515", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-3515" } ], "notes": [ { "category": "general", "text": "Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a \"device model\u0027s address space.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-3515", "url": "https://www.suse.com/security/cve/CVE-2012-3515" }, { "category": "external", "summary": "SUSE Bug 777084 for CVE-2012-3515", "url": "https://bugzilla.suse.com/777084" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2012-08-31T14:36:20Z", "details": "important" } ], "title": "CVE-2012-3515" }, { "cve": "CVE-2014-0222", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0222" } ], "notes": [ { "category": "general", "text": "Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0222", "url": "https://www.suse.com/security/cve/CVE-2014-0222" }, { "category": "external", "summary": "SUSE Bug 1072223 for CVE-2014-0222", "url": "https://bugzilla.suse.com/1072223" }, { "category": "external", "summary": "SUSE Bug 877642 for CVE-2014-0222", "url": "https://bugzilla.suse.com/877642" }, { "category": "external", "summary": "SUSE Bug 950367 for CVE-2014-0222", "url": "https://bugzilla.suse.com/950367" }, { "category": "external", "summary": "SUSE Bug 964925 for CVE-2014-0222", "url": "https://bugzilla.suse.com/964925" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2012-08-31T14:36:20Z", "details": "moderate" } ], "title": "CVE-2014-0222" }, { "cve": "CVE-2014-0223", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0223" } ], "notes": [ { "category": "general", "text": "Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a large image size, which triggers a buffer overflow or out-of-bounds read.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0223", "url": "https://www.suse.com/security/cve/CVE-2014-0223" }, { "category": "external", "summary": "SUSE Bug 877645 for CVE-2014-0223", "url": "https://bugzilla.suse.com/877645" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2012-08-31T14:36:20Z", "details": "moderate" } ], "title": "CVE-2014-0223" }, { "cve": "CVE-2015-3209", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3209" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3209", "url": "https://www.suse.com/security/cve/CVE-2015-3209" }, { "category": "external", "summary": "SUSE Bug 932267 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932267" }, { "category": "external", "summary": "SUSE Bug 932770 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932770" }, { "category": "external", "summary": "SUSE Bug 932823 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932823" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2012-08-31T14:36:20Z", "details": "important" } ], "title": "CVE-2015-3209" }, { "cve": "CVE-2015-3456", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3456" } ], "notes": [ { "category": "general", "text": "The Floppy Disk Controller (FDC) in QEMU, as used in Xen 4.5.x and earlier and KVM, allows local guest users to cause a denial of service (out-of-bounds write and guest crash) or possibly execute arbitrary code via the (1) FD_CMD_READ_ID, (2) FD_CMD_DRIVE_SPECIFICATION_COMMAND, or other unspecified commands, aka VENOM.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3456", "url": "https://www.suse.com/security/cve/CVE-2015-3456" }, { "category": "external", "summary": "SUSE Bug 929339 for CVE-2015-3456", "url": "https://bugzilla.suse.com/929339" }, { "category": "external", "summary": "SUSE Bug 932770 for CVE-2015-3456", "url": "https://bugzilla.suse.com/932770" }, { "category": "external", "summary": "SUSE Bug 935900 for CVE-2015-3456", "url": "https://bugzilla.suse.com/935900" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2012-08-31T14:36:20Z", "details": "moderate" } ], "title": "CVE-2015-3456" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…