Lucene search

K
suseSuseSUSE-SU-2015:1782-1
HistoryOct 20, 2015 - 10:09 a.m.

Security update for qemu (important)

2015-10-2010:09:58
lists.opensuse.org
10

0.891 High

EPSS

Percentile

98.4%

qemu was updated to fix several security issues and bugs.

The following vulnerabilities were fixed:

  • CVE-2015-5154: Heap-based buffer overflow in the IDE subsystem in QEMU,
    when the container has a CDROM drive enabled, allows local guest users
    to execute arbitrary code on the host via unspecified ATAPI commands.
    (bsc#938344).
  • CVE-2015-5278: QEMU was vulnerable to an infinite loop issue that could
    occur when receiving packets over the network. (bsc#945989)
  • CVE-2015-5279: QEMU was vulnerable to a heap buffer overflow issue that
    could occur when receiving packets over the network. (bsc#945987)
  • CVE-2015-6855: QEMU was vulnerable to a divide by zero issue that could
    occur while executing an IDE command WIN_READ_NATIVE_MAX to determine
    the maximum size of a drive. (bsc#945404)
  • CVE-2014-7815: The set_pixel_format function in ui/vnc.c in QEMU allowed
    remote attackers to cause a denial of service (crash) via a small
    bytes_per_pixel value. (bsc#902737):

Also these non-security issues were fixed:

  • bsc#937572: Fixed dictzip on big endian systems
  • bsc#934517: Fix ‘info tlb’ causes guest to freeze
  • bsc#934506: Fix vte monitor consol looks empy
  • bsc#937125: Fix parsing of scsi-disk wwn uint64 property
  • bsc#945778: Drop .probe hooks for DictZip and tar block drivers
  • bsc#937572: Fold common-obj-y -> block-obj-y change into original patches
  • bsc#928308,bsc#944017: Fix virtio-ccw index errors when initrd gets too
    large
  • bsc#936537: Fix possible qemu-img error when converting to compressed
    qcow2 image
  • bsc#939216: Fix reboot fail after install using uefi
  • bsc#943446: qemu-img convert doesn’t create MB aligned VHDs anymore