SUSE-SU-2016:1560-1 -- Suse qemuID: oval:org.secpod.oval:def:400672 | Date: (C)2016-12-27 (M)2023-12-07 |
Class: PATCH | Family: unix |
qemu was updated to fix 37 security issues. These security issues were fixed: - CVE-2016-4439: Avoid OOB access in 53C9X emulation - CVE-2016-4441: Avoid OOB access in 53C9X emulation - CVE-2016-4952: Avoid OOB access in Vmware PV SCSI emulation - CVE-2015-8817: Avoid OOB access in PCI DMA I/O - CVE-2015-8818: Avoid OOB access in PCI DMA I/O - CVE-2016-3710: Fixed VGA emulation based OOB access with potential for guest escape - CVE-2016-3712: Fixed VGa emulation based DOS and OOB read access exploit - CVE-2016-4037: Fixed USB ehci based DOS - CVE-2016-2538: Fixed potential OOB access in USB net device emulation - CVE-2016-2841: Fixed OOB access / hang in ne2000 emulation - CVE-2016-2858: Avoid potential DOS when using QEMU pseudo random number generator - CVE-2016-2857: Fixed OOB access when processing IP checksums - CVE-2016-4001: Fixed OOB access in Stellaris enet emulated nic - CVE-2016-4002: Fixed OOB access in MIPSnet emulated controller - CVE-2016-4020: Fixed possible host data leakage to guest from TPR access - CVE-2015-3214: Fixed OOB read in i8254 PIC - CVE-2014-9718: Fixed the handling of malformed or short ide PRDTs to avoid any opportunity for guest to cause DoS by abusing that interface - CVE-2014-3689: Fixed insufficient parameter validation in rectangle functions - CVE-2014-3615: The VGA emulator in QEMU allowed local guest users to read host memory by setting the display to a high resolution . - CVE-2015-5239: Integer overflow in vnc_client_read and protocol_client_msg . - CVE-2015-5745: Buffer overflow in virtio-serial . - CVE-2015-7295: hw/virtio/virtio.c in the Virtual Network Device support in QEMU, when big or mergeable receive buffers are not supported, allowed remote attackers to cause a denial of service via a flood of jumbo frames on the tuntap or macvtap interface . - CVE-2015-7549: PCI null pointer dereferences . - CVE-2015-8504: VNC floating point exception . - CVE-2015-8558: Infinite loop in ehci_advance_state resulting in DoS . - CVE-2015-8567: A guest repeatedly activating a vmxnet3 device can leak host memory . - CVE-2015-8568: A guest repeatedly activating a vmxnet3 device can leak host memory . - CVE-2015-8613: Wrong sized memset in megasas command handler . - CVE-2015-8619: Potential DoS for long HMP sendkey command argument . - CVE-2015-8743: OOB memory access in ne2000 ioport r/w functions . - CVE-2015-8744: Incorrect l2 header validation could have lead to a crash via assert call . - CVE-2015-8745: Reading IMR registers could have lead to a crash via assert call . - CVE-2016-1568: AHCI use-after-free in aio port commands . - CVE-2016-1714: Potential OOB memory access in processing firmware configuration . - CVE-2016-1922: NULL pointer dereference when processing hmp i/o command . - CVE-2016-1981: Potential DoS in e1000 device emulation by malicious privileged user within guest . - CVE-2016-2198: Malicious privileged guest user were able to cause DoS by writing to read-only EHCI capabilities registers . This non-security issue was fixed - bsc#886378: qemu truncates vhd images in virt-rescue
Platform: |
SUSE Linux Enterprise Desktop 12 |
SUSE Linux Enterprise Server 12 |