SUSE-SU-2016:2628-1 -- SLES kvmID: oval:org.secpod.oval:def:89045305 | Date: (C)2021-08-03 (M)2023-12-07 |
Class: PATCH | Family: unix |
kvm was updated to fix 16 security issues. These security issues were fixed: - CVE-2015-6815: e1000 NIC emulation support was vulnerable to an infinite loop issue. A privileged user inside guest could have used this flaw to crash the Qemu instance resulting in DoS. - CVE-2016-2391: The ohci_bus_start function in the USB OHCI emulation support in QEMU allowed local guest OS administrators to cause a denial of service via vectors related to multiple eof_timers . - CVE-2016-2392: The is_rndis function in the USB Net device emulator in QEMU did not properly validate USB configuration descriptor objects, which allowed local guest OS administrators to cause a denial of service via vectors involving a remote NDIS control message packet . - CVE-2016-4453: The vmsvga_fifo_run function in hw/display/vmware_vga.c in QEMU allowed local guest OS administrators to cause a denial of service via a VGA command . - CVE-2016-4454: The vmsvga_fifo_read_raw function in hw/display/vmware_vga.c in QEMU allowed local guest OS administrators to obtain sensitive host memory information or cause a denial of service by changing FIFO registers and issuing a VGA command, which triggers an out-of-bounds read . - CVE-2016-5105: The megasas_dcmd_cfg_read function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, used an uninitialized variable, which allowed local guest administrators to read host memory via vectors involving a MegaRAID Firmware Interface command . - CVE-2016-5106: The megasas_dcmd_set_properties function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allowed local guest administrators to cause a denial of service via vectors involving a MegaRAID Firmware Interface command . - CVE-2016-5107: The megasas_lookup_frame function in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allowed local guest OS administrators to cause a denial of service via unspecified vectors . - CVE-2016-5126: Heap-based buffer overflow in the iscsi_aio_ioctl function in block/iscsi.c in QEMU allowed local guest OS users to cause a denial of service or possibly execute arbitrary code via a crafted iSCSI asynchronous I/O ioctl call . - CVE-2016-5238: The get_cmd function in hw/scsi/esp.c in QEMU allowed local guest OS administrators to cause a denial of service via vectors related to reading from the information transfer buffer in non-DMA mode . - CVE-2016-5337: The megasas_ctrl_get_info function in hw/scsi/megasas.c in QEMU allowed local guest OS administrators to obtain sensitive host memory information via vectors related to reading device control information . - CVE-2016-5338: The esp_reg_read and esp_reg_write functions in hw/scsi/esp.c in QEMU allowed local guest OS administrators to cause a denial of service or execute arbitrary code on the QEMU host via vectors related to the information transfer buffer . - CVE-2016-5403: The virtqueue_pop function in hw/virtio/virtio.c in QEMU allowed local guest OS administrators to cause a denial of service by submitting requests without waiting for completion . - CVE-2016-6490: Infinite loop in the virtio framework. A privileged user inside the guest could have used this flaw to crash the Qemu instance on the host resulting in DoS . - CVE-2016-7116: Host directory sharing via Plan 9 File System was vulnerable to a directory/path traversal issue. A privileged user inside guest could have used this flaw to access undue files on the host . - CVE-2014-7815: The set_pixel_format function in ui/vnc.c in QEMU allowed remote attackers to cause a denial of service via a small bytes_per_pixel value .
Platform: |
SUSE Linux Enterprise Server 11 SP4 |