Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.4.2015.1152.1
Category:SuSE Local Security Checks
Title:SUSE: Security Advisory (SUSE-SU-2015:1152-1)
Summary:The remote host is missing an update for the 'kvm' package(s) announced via the SUSE-SU-2015:1152-1 advisory.
Description:Summary:
The remote host is missing an update for the 'kvm' package(s) announced via the SUSE-SU-2015:1152-1 advisory.

Vulnerability Insight:
kvm has been updated to fix issues in the embedded qemu:

*

CVE-2014-0223: An integer overflow flaw was found in the QEMU block
driver for QCOW version 1 disk images. A user able to alter the QEMU
disk image files loaded by a guest could have used this flaw to
corrupt QEMU process memory on the host, which could potentially have
resulted in arbitrary code execution on the host with the privileges
of the QEMU process.

*

CVE-2014-3461: A user able to alter the savevm data (either on the
disk or over the wire during migration) could have used this flaw to
to corrupt QEMU process memory on the (destination) host, which could
have potentially resulted in arbitrary code execution on the host
with the privileges of the QEMU process.

*

CVE-2014-0222: An integer overflow flaw was found in the QEMU block
driver for QCOW version 1 disk images. A user able to alter the QEMU
disk image files loaded by a guest could have used this flaw to
corrupt QEMU process memory on the host, which could have potentially
resulted in arbitrary code execution on the host with the privileges
of the QEMU process.

Non-security bugs fixed:

* Fix exceeding IRQ routes that could have caused freezes of guests.
(bnc#876842)
* Fix CPUID emulation bugs that may have broken Windows guests with
newer -cpu types (bnc#886535)

Security Issues:

* CVE-2014-0222
<[link moved to references]>
* CVE-2014-0223
<[link moved to references]>
* CVE-2014-3461
<[link moved to references]>

Affected Software/OS:
'kvm' package(s) on SUSE Linux Enterprise Desktop 11-SP3, SUSE Linux Enterprise Server 11-SP3, SUSE Linux Enterprise Server for SAP Applications 11-SP3.

Solution:
Please install the updated package(s).

CVSS Score:
7.8

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2013-2016
http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00002.html
http://www.openwall.com/lists/oss-security/2013/04/29/5
http://www.openwall.com/lists/oss-security/2013/04/29/6
http://www.securityfocus.com/bid/59541
https://access.redhat.com/security/cve/cve-2013-2016
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-2016
https://exchange.xforce.ibmcloud.com/vulnerabilities/83850
https://github.com/qemu/qemu/commit/5f5a1318653c08e435cfa52f60b6a712815b659d
https://security-tracker.debian.org/tracker/CVE-2013-2016
Common Vulnerability Exposure (CVE) ID: CVE-2013-4344
62773
http://www.securityfocus.com/bid/62773
98028
http://osvdb.org/98028
RHSA-2013:1553
http://rhn.redhat.com/errata/RHSA-2013-1553.html
RHSA-2013:1754
http://rhn.redhat.com/errata/RHSA-2013-1754.html
USN-2092-1
http://www.ubuntu.com/usn/USN-2092-1
[oss-security] 20131002 Xen Security Advisory 65 (CVE-2013-4344) - qemu SCSI REPORT LUNS buffer overflow
http://www.openwall.com/lists/oss-security/2013/10/02/2
[qemu-devel] 20131009 [ANNOUNCE] QEMU 1.6.1 Stable released
http://article.gmane.org/gmane.comp.emulators.qemu/237191
openSUSE-SU-2014:1279
http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00002.html
openSUSE-SU-2014:1281
http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00003.html
Common Vulnerability Exposure (CVE) ID: CVE-2013-4541
FEDORA-2014-6288
http://lists.fedoraproject.org/pipermail/package-announce/2014-May/133345.html
RHSA-2014:0743
http://rhn.redhat.com/errata/RHSA-2014-0743.html
RHSA-2014:0744
http://rhn.redhat.com/errata/RHSA-2014-0744.html
[Qemu-stable] 20140723 [ANNOUNCE] QEMU 1.7.2 Stable released
http://lists.nongnu.org/archive/html/qemu-stable/2014-07/msg00187.html
http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=9f8e9895c504149d7048e9fc5eb5cbb34b16e49a
Common Vulnerability Exposure (CVE) ID: CVE-2014-0142
DSA-3044
http://www.debian.org/security/2014/dsa-3044
RHSA-2014:0420
http://rhn.redhat.com/errata/RHSA-2014-0420.html
RHSA-2014:0421
http://rhn.redhat.com/errata/RHSA-2014-0421.html
http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=8e53abbc20d08ae3ec30c2054e1161314ad9501d
http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=9302e863aa8baa5d932fc078967050c055fa1a7f
https://bugzilla.redhat.com/show_bug.cgi?id=1078201
Common Vulnerability Exposure (CVE) ID: CVE-2014-0143
http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=509a41bab5306181044b5fff02eadf96d9c8676a
http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=6a83f8b5bec6f59e56cc49bd49e4c3f8f805d56f
http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=8f4754ede56e3f9ea3fd7207f4a7c4453e59285b
http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=afbcc40bee4ef51731102d7d4b499ee12fc182e1
http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=cab60de930684c33f67d4e32c7509b567f8c445b
http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=db8a31d11d6a60f48d6817530640d75aa72a9a2f
http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=e3737b820b45e54b059656dc3f914f895ac7a88b
https://bugzilla.redhat.com/show_bug.cgi?id=1079140
Common Vulnerability Exposure (CVE) ID: CVE-2014-0144
http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=24342f2cae47d03911e346fe1e520b00dc2818e0
http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=2d51c32c4b511db8bb9e58208f1e2c25e4c06c85
http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=5dab2faddc8eaa1fb1abdbe2f502001fc13a1b21
http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=63fa06dc978f3669dbfd9443b33cde9e2a7f4b41
http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=6d4b9e55fc625514a38d27cff4b9933f617fa7dc
http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=7b103b36d6ef3b11827c203d3a793bf7da50ecd6
http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=97f1c45c6f456572e5b504b8614e4a69e23b8e3a
http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=a1b3955c9415b1e767c130a2f59fee6aa28e575b
http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=ce48f2f441ca98885267af6fd636a7cb804ee646
http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=d65f97a82c4ed48374a764c769d4ba1ea9724e97
http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=f56b9bc3ae20fc93815b34aa022be919941406ce
https://bugzilla.redhat.com/show_bug.cgi?id=1079240
https://www.vulnerabilitycenter.com/#%21vul=44767
Common Vulnerability Exposure (CVE) ID: CVE-2014-0145
[oss-security] 20140326 QEMU image format input validation fixes (multiple CVEs)
http://www.openwall.com/lists/oss-security/2014/03/26/8
http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=c05e4667be91b46ab42b5a11babf8e84d476cc6b
http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=f0dce23475b5af5da6b17b97c1765271307734b6
http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=c165f7758009a4f793c1fc19ebb69cf55313450b
https://bugzilla.redhat.com/show_bug.cgi?id=1078885
https://lists.gnu.org/archive/html/qemu-devel/2014-03/msg04994.html
Common Vulnerability Exposure (CVE) ID: CVE-2014-0146
http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=11b128f4062dd7f89b14abc8877ff20d41b28be9
https://bugzilla.redhat.com/show_bug.cgi?id=1078232
Common Vulnerability Exposure (CVE) ID: CVE-2014-0147
http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=246f65838d19db6db55bfb41117c35645a2c4789
https://bugzilla.redhat.com/show_bug.cgi?id=1078848
https://bugzilla.redhat.com/show_bug.cgi?id=1086717
Common Vulnerability Exposure (CVE) ID: CVE-2014-0150
57878
http://secunia.com/advisories/57878
58191
http://secunia.com/advisories/58191
DSA-2909
http://www.debian.org/security/2014/dsa-2909
DSA-2910
http://www.debian.org/security/2014/dsa-2910
USN-2182-1
http://www.ubuntu.com/usn/USN-2182-1
[Qemu-devel] 20140411 Re: [PATCH for-2.0] virtio-net: fix guest-triggerable buffer overrun
http://article.gmane.org/gmane.comp.emulators.qemu/266768
[Qemu-devel] 20140411 [PATCH for-2.0] virtio-net: fix guest-triggerable buffer overrun
http://thread.gmane.org/gmane.comp.emulators.qemu/266713
https://bugzilla.redhat.com/show_bug.cgi?id=1078846
Common Vulnerability Exposure (CVE) ID: CVE-2014-0222
67357
http://www.securityfocus.com/bid/67357
FEDORA-2014-6970
http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134053.html
SUSE-SU-2015:0929
http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00021.html
[Qemu-devel] 20140512 [PATCH 3/5] qcow1: Validate L2 table size (CVE-2014-0222)
https://lists.gnu.org/archive/html/qemu-devel/2014-05/msg02155.html
openSUSE-SU-2015:1965
http://lists.opensuse.org/opensuse-updates/2015-11/msg00063.html
Common Vulnerability Exposure (CVE) ID: CVE-2014-0223
67391
http://www.securityfocus.com/bid/67391
[Qemu-devel] 20140512 [PATCH 4/5] qcow1: Validate image size (CVE-2014-0223)
https://lists.gnu.org/archive/html/qemu-devel/2014-05/msg02156.html
Common Vulnerability Exposure (CVE) ID: CVE-2014-2894
57945
http://secunia.com/advisories/57945
66932
http://www.securityfocus.com/bid/66932
RHSA-2014:0704
http://rhn.redhat.com/errata/RHSA-2014-0704.html
[Qemu-devel] 20140412 [PATCH for 2.0] ide: Correct improper smart self test c
https://lists.nongnu.org/archive/html/qemu-devel/2014-04/msg02016.html
[Qemu-devel] 20140414 Re: [PATCH for 2.0] ide: Correct improper smart self test c
https://lists.nongnu.org/archive/html/qemu-devel/2014-04/msg02095.html
https://lists.nongnu.org/archive/html/qemu-devel/2014-04/msg02152.html
[oss-security] 20140415 CVE request Qemu: out of bounds buffer access, guest triggerable via IDE SMART
http://www.openwall.com/lists/oss-security/2014/04/15/4
[oss-security] 20140418 Re: CVE request Qemu: out of bounds buffer access, guest triggerable via IDE SMART
http://www.openwall.com/lists/oss-security/2014/04/18/5
Common Vulnerability Exposure (CVE) ID: CVE-2014-3461
[qemu-devel] 20140512 [PATCH] usb: fix up post load checks
http://article.gmane.org/gmane.comp.emulators.qemu/272092
Common Vulnerability Exposure (CVE) ID: CVE-2015-1779
1033975
http://www.securitytracker.com/id/1033975
73303
http://www.securityfocus.com/bid/73303
DSA-3259
http://www.debian.org/security/2015/dsa-3259
FEDORA-2015-5482
http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154656.html
FEDORA-2015-5541
http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155196.html
GLSA-201602-01
https://security.gentoo.org/glsa/201602-01
RHSA-2015:1931
http://rhn.redhat.com/errata/RHSA-2015-1931.html
RHSA-2015:1943
http://rhn.redhat.com/errata/RHSA-2015-1943.html
SUSE-SU-2015:0870
http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00033.html
SUSE-SU-2015:0896
http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00042.html
USN-2608-1
http://www.ubuntu.com/usn/USN-2608-1
[Qemu-devel] 20150323 [PATCH 0/2] CVE-2015-1779: fix denial of service in VNC websockets
https://lists.gnu.org/archive/html/qemu-devel/2015-03/msg04894.html
[Qemu-devel] 20150323 [PATCH 1/2] CVE-2015-1779: incrementally decode websocket frames
https://lists.gnu.org/archive/html/qemu-devel/2015-03/msg04896.html
[Qemu-devel] 20150323 [PATCH 2/2] CVE-2015-1779: limit size of HTTP headers from websockets clients
https://lists.gnu.org/archive/html/qemu-devel/2015-03/msg04895.html
[oss-security] 20150324 CVE-2015-1779 qemu: vnc: insufficient resource limiting in VNC websockets decoder
http://www.openwall.com/lists/oss-security/2015/03/24/9
[oss-security] 20150409 Re: CVE-2015-1779 qemu: vnc: insufficient resource limiting in VNC websockets decoder
http://www.openwall.com/lists/oss-security/2015/04/09/6
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
Common Vulnerability Exposure (CVE) ID: CVE-2015-3209
1032545
http://www.securitytracker.com/id/1032545
75123
http://www.securityfocus.com/bid/75123
DSA-3284
http://www.debian.org/security/2015/dsa-3284
DSA-3285
http://www.debian.org/security/2015/dsa-3285
DSA-3286
http://www.debian.org/security/2015/dsa-3286
FEDORA-2015-10001
http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160669.html
FEDORA-2015-9965
http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160685.html
FEDORA-2015-9978
http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160677.html
GLSA-201510-02
https://security.gentoo.org/glsa/201510-02
GLSA-201604-03
https://security.gentoo.org/glsa/201604-03
RHSA-2015:1087
http://rhn.redhat.com/errata/RHSA-2015-1087.html
RHSA-2015:1088
http://rhn.redhat.com/errata/RHSA-2015-1088.html
RHSA-2015:1089
http://rhn.redhat.com/errata/RHSA-2015-1089.html
RHSA-2015:1189
http://rhn.redhat.com/errata/RHSA-2015-1189.html
SUSE-SU-2015:1042
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html
SUSE-SU-2015:1045
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html
SUSE-SU-2015:1152
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00027.html
SUSE-SU-2015:1156
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00029.html
SUSE-SU-2015:1157
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html
SUSE-SU-2015:1206
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00014.html
SUSE-SU-2015:1426
http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00020.html
SUSE-SU-2015:1519
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00015.html
SUSE-SU-2015:1643
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00027.html
USN-2630-1
http://www.ubuntu.com/usn/USN-2630-1
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698
http://xenbits.xen.org/xsa/advisory-135.html
https://kb.juniper.net/JSA10783
https://www.arista.com/en/support/advisories-notices/security-advisories/1180-security-advisory-13
Common Vulnerability Exposure (CVE) ID: CVE-2015-3456
BugTraq ID: 74640
http://www.securityfocus.com/bid/74640
Debian Security Information: DSA-3259 (Google Search)
Debian Security Information: DSA-3262 (Google Search)
http://www.debian.org/security/2015/dsa-3262
Debian Security Information: DSA-3274 (Google Search)
http://www.debian.org/security/2015/dsa-3274
https://www.exploit-db.com/exploits/37053/
http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158072.html
https://security.gentoo.org/glsa/201612-27
HPdes Security Advisory: HPSBMU03336
http://marc.info/?l=bugtraq&m=143229451215900&w=2
HPdes Security Advisory: HPSBMU03349
http://marc.info/?l=bugtraq&m=143387998230996&w=2
HPdes Security Advisory: SSRT102076
http://venom.crowdstrike.com/
https://www.arista.com/en/support/advisories-notices/security-advisories/1128-security-advisory-10
RedHat Security Advisories: RHSA-2015:0998
http://rhn.redhat.com/errata/RHSA-2015-0998.html
RedHat Security Advisories: RHSA-2015:0999
http://rhn.redhat.com/errata/RHSA-2015-0999.html
RedHat Security Advisories: RHSA-2015:1000
http://rhn.redhat.com/errata/RHSA-2015-1000.html
RedHat Security Advisories: RHSA-2015:1001
http://rhn.redhat.com/errata/RHSA-2015-1001.html
RedHat Security Advisories: RHSA-2015:1002
http://rhn.redhat.com/errata/RHSA-2015-1002.html
RedHat Security Advisories: RHSA-2015:1003
http://rhn.redhat.com/errata/RHSA-2015-1003.html
RedHat Security Advisories: RHSA-2015:1004
http://rhn.redhat.com/errata/RHSA-2015-1004.html
RedHat Security Advisories: RHSA-2015:1011
http://rhn.redhat.com/errata/RHSA-2015-1011.html
http://www.securitytracker.com/id/1032306
http://www.securitytracker.com/id/1032311
http://www.securitytracker.com/id/1032917
SuSE Security Announcement: SUSE-SU-2015:0889 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00009.html
SuSE Security Announcement: SUSE-SU-2015:0896 (Google Search)
SuSE Security Announcement: SUSE-SU-2015:0923 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00018.html
SuSE Security Announcement: SUSE-SU-2015:0927 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00019.html
SuSE Security Announcement: SUSE-SU-2015:0929 (Google Search)
SuSE Security Announcement: openSUSE-SU-2015:0893 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00013.html
SuSE Security Announcement: openSUSE-SU-2015:0894 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00014.html
SuSE Security Announcement: openSUSE-SU-2015:0983 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00001.html
SuSE Security Announcement: openSUSE-SU-2015:1400 (Google Search)
http://lists.opensuse.org/opensuse-updates/2015-08/msg00021.html
CopyrightCopyright (C) 2021 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.