Security update for KVM

SUSE Security Update: Security update for KVM
Announcement ID: SUSE-SU-2015:0929-1
Rating: important
References: #877642 #877645 #929339
Affected Products:
  • SUSE Linux Enterprise Server 11 SP1 LTSS

  • An update that fixes three vulnerabilities is now available. It includes one version update.

    Description:

    KVM was updated to fix the following security issues:

    • CVE-2015-3456: Buffer overflow in the floppy drive emulation, which could be used to carry out denial of service attacks or potential code execution against the host. This vulnerability is also known as VENOM.
    • CVE-2014-0222: Integer overflow in the qcow_open function in block/qcow.c in QEMU allowed remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image.
    • CVE-2014-0223: Integer overflow in the qcow_open function in block/qcow.c in QEMU allowed local users to cause a denial of service (crash) and possibly execute arbitrary code via a large image size, which triggers a buffer overflow or out-of-bounds read.

    Security Issues:

    Special Instructions and Notes:

    Please reboot the system after installing this update.

    Patch Instructions:

    To install this SUSE Security Update use YaST online_update.
    Alternatively you can run the command listed for your product:

    • SUSE Linux Enterprise Server 11 SP1 LTSS:
      zypper in -t patch slessp1-kvm=10683

    To bring your system up-to-date, use "zypper patch".

    Package List:

    • SUSE Linux Enterprise Server 11 SP1 LTSS (i586 x86_64) [New Version: 0.12.5]:
      • kvm-0.12.5-1.26.1

    References: