Security update for qemu
Announcement ID: | SUSE-SU-2016:0021-1 |
---|---|
Rating: | moderate |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves two vulnerabilities and has two security fixes can now be installed.
Description:
This update fixes the following security issues:
- Enforce receive packet size, thus eliminating buffer overflow and potential security issue. (bsc#957162 CVE-2015-7512)
- Infinite loop in processing command block list. CVE-2015-8345 (bsc#956829):
Also a non-security bug fixed: - Fix cases of wrong clock values in kvmclock timekeeping (bsc#947164 and bsc#953187)
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Desktop 12
zypper in -t patch SUSE-SLE-DESKTOP-12-2016-11=1
-
SUSE Linux Enterprise Server 12
zypper in -t patch SUSE-SLE-SERVER-12-2016-11=1
-
SUSE Linux Enterprise Server for SAP Applications 12
zypper in -t patch SUSE-SLE-SERVER-12-2016-11=1
Package List:
-
SUSE Linux Enterprise Desktop 12 (x86_64)
- qemu-x86-2.0.2-48.12.1
- qemu-tools-2.0.2-48.12.1
- qemu-debugsource-2.0.2-48.12.1
- qemu-x86-debuginfo-2.0.2-48.12.1
- qemu-kvm-2.0.2-48.12.1
- qemu-block-curl-debuginfo-2.0.2-48.12.1
- qemu-tools-debuginfo-2.0.2-48.12.1
- qemu-block-curl-2.0.2-48.12.1
- qemu-2.0.2-48.12.1
-
SUSE Linux Enterprise Desktop 12 (noarch)
- qemu-seabios-1.7.4-48.12.1
- qemu-sgabios-8-48.12.1
- qemu-vgabios-1.7.4-48.12.1
- qemu-ipxe-1.0.0-48.12.1
-
SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64)
- qemu-tools-2.0.2-48.12.1
- qemu-guest-agent-2.0.2-48.12.1
- qemu-debugsource-2.0.2-48.12.1
- qemu-guest-agent-debuginfo-2.0.2-48.12.1
- qemu-lang-2.0.2-48.12.1
- qemu-block-curl-debuginfo-2.0.2-48.12.1
- qemu-tools-debuginfo-2.0.2-48.12.1
- qemu-block-curl-2.0.2-48.12.1
- qemu-2.0.2-48.12.1
-
SUSE Linux Enterprise Server 12 (ppc64le)
- qemu-ppc-2.0.2-48.12.1
- qemu-ppc-debuginfo-2.0.2-48.12.1
-
SUSE Linux Enterprise Server 12 (s390x x86_64)
- qemu-kvm-2.0.2-48.12.1
-
SUSE Linux Enterprise Server 12 (s390x)
- qemu-s390-2.0.2-48.12.1
- qemu-s390-debuginfo-2.0.2-48.12.1
-
SUSE Linux Enterprise Server 12 (x86_64)
- qemu-x86-debuginfo-2.0.2-48.12.1
- qemu-x86-2.0.2-48.12.1
- qemu-block-rbd-debuginfo-2.0.2-48.12.1
- qemu-block-rbd-2.0.2-48.12.1
-
SUSE Linux Enterprise Server 12 (noarch)
- qemu-seabios-1.7.4-48.12.1
- qemu-sgabios-8-48.12.1
- qemu-vgabios-1.7.4-48.12.1
- qemu-ipxe-1.0.0-48.12.1
-
SUSE Linux Enterprise Server for SAP Applications 12 (x86_64)
- qemu-x86-2.0.2-48.12.1
- qemu-tools-2.0.2-48.12.1
- qemu-guest-agent-2.0.2-48.12.1
- qemu-debugsource-2.0.2-48.12.1
- qemu-x86-debuginfo-2.0.2-48.12.1
- qemu-kvm-2.0.2-48.12.1
- qemu-guest-agent-debuginfo-2.0.2-48.12.1
- qemu-lang-2.0.2-48.12.1
- qemu-block-curl-debuginfo-2.0.2-48.12.1
- qemu-block-rbd-debuginfo-2.0.2-48.12.1
- qemu-block-rbd-2.0.2-48.12.1
- qemu-tools-debuginfo-2.0.2-48.12.1
- qemu-block-curl-2.0.2-48.12.1
- qemu-2.0.2-48.12.1
-
SUSE Linux Enterprise Server for SAP Applications 12 (noarch)
- qemu-seabios-1.7.4-48.12.1
- qemu-sgabios-8-48.12.1
- qemu-vgabios-1.7.4-48.12.1
- qemu-ipxe-1.0.0-48.12.1
References:
- https://www.suse.com/security/cve/CVE-2015-7512.html
- https://www.suse.com/security/cve/CVE-2015-8345.html
- https://bugzilla.suse.com/show_bug.cgi?id=947164
- https://bugzilla.suse.com/show_bug.cgi?id=953187
- https://bugzilla.suse.com/show_bug.cgi?id=956829
- https://bugzilla.suse.com/show_bug.cgi?id=957162