KVM was updated to fix the following security issues:
* CVE-2015-3456: Buffer overflow in the floppy drive emulation, which
could be used to carry out denial of service attacks or potential
code execution against the host. This vulnerability is also known as
VENOM.
* CVE-2014-0222: Integer overflow in the qcow_open function in
block/qcow.c in QEMU allowed remote attackers to cause a denial of
service (crash) via a large L2 table in a QCOW version 1 image.
* CVE-2014-0223: Integer overflow in the qcow_open function in
block/qcow.c in QEMU allowed local users to cause a denial of
service (crash) and possibly execute arbitrary code via a large
image size, which triggers a buffer overflow or out-of-bounds read.
Security Issues:
* CVE-2015-3456
<<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456</a>>
* CVE-2014-0222
<<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0222">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0222</a>>
* CVE-2014-0223
<<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0223">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0223</a>>
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
SUSE Linux Enterprise Server LTSS | 11.1 | x86_64 | kvm | <Β 0.12.5-1.26.1 | kvm-0.12.5-1.26.1.x86_64.rpm |
SUSE Linux Enterprise Server LTSS | 11.1 | i586 | kvm | <Β 0.12.5-1.26.1 | kvm-0.12.5-1.26.1.i586.rpm |