Security update for qemu
SUSE Patch
security@suse.de
SUSE Security Team
openSUSE-SU-2016:1750-1
Final
1
1
2016-07-06T15:08:40Z
current
2016-07-06T15:08:40Z
2016-07-06T15:08:40Z
cve-database/bin/generate-cvrf.pl
2017-02-24T01:00:00Z
Security update for qemu
qemu was updated to fix 29 security issues.
These security issues were fixed:
- CVE-2016-4439: Avoid OOB access in 53C9X emulation (bsc#980711)
- CVE-2016-4441: Avoid OOB access in 53C9X emulation (bsc#980723)
- CVE-2016-4952: Avoid OOB access in Vmware PV SCSI emulation (bsc#981266)
- CVE-2015-8817: Avoid OOB access in PCI dma I/O (bsc#969121)
- CVE-2015-8818: Avoid OOB access in PCI dma I/O (bsc#969122)
- CVE-2016-3710: Fixed VGA emulation based OOB access with potential for guest escape (bsc#978158)
- CVE-2016-3712: Fixed VGa emulation based DOS and OOB read access exploit (bsc#978160)
- CVE-2016-4037: Fixed USB ehci based DOS (bsc#976109)
- CVE-2016-2538: Fixed potential OOB access in USB net device emulation (bsc#967969)
- CVE-2016-2841: Fixed OOB access / hang in ne2000 emulation (bsc#969350)
- CVE-2016-2858: Avoid potential DOS when using QEMU pseudo random number generator (bsc#970036)
- CVE-2016-2857: Fixed OOB access when processing IP checksums (bsc#970037)
- CVE-2016-4001: Fixed OOB access in Stellaris enet emulated nic (bsc#975128)
- CVE-2016-4002: Fixed OOB access in MIPSnet emulated controller (bsc#975136)
- CVE-2016-4020: Fixed possible host data leakage to guest from TPR access (bsc#975700)
- CVE-2016-2197: Prevent AHCI NULL pointer dereference when using FIS CLB engine (bsc#964411)
- CVE-2015-5745: Buffer overflow in virtio-serial (bsc#940929).
- CVE-2015-7549: PCI null pointer dereferences (bsc#958917).
- CVE-2015-8504: VNC floating point exception (bsc#958491).
- CVE-2015-8558: Infinite loop in ehci_advance_state resulting in DoS (bsc#959005).
- CVE-2015-8567: A guest repeatedly activating a vmxnet3 device can leak host memory (bsc#959386).
- CVE-2015-8568: A guest repeatedly activating a vmxnet3 device can leak host memory (bsc#959386).
- CVE-2015-8613: Wrong sized memset in megasas command handler (bsc#961358).
- CVE-2015-8619: Potential DoS for long HMP sendkey command argument (bsc#960334).
- CVE-2015-8743: OOB memory access in ne2000 ioport r/w functions (bsc#960725).
- CVE-2015-8744: Incorrect l2 header validation could have lead to a crash via assert(2) call (bsc#960835).
- CVE-2015-8745: Reading IMR registers could have lead to a crash via assert(2) call (bsc#960708).
- CVE-2016-1568: AHCI use-after-free in aio port commands (bsc#961332).
- CVE-2016-1714: Potential OOB memory access in processing firmware configuration (bsc#961691).
- CVE-2016-1922: NULL pointer dereference when processing hmp i/o command (bsc#962320).
- CVE-2016-1981: Potential DoS (infinite loop) in e1000 device emulation by malicious privileged user within guest (bsc#963782).
- CVE-2016-2198: Malicious privileged guest user were able to cause DoS by writing to read-only EHCI capabilities registers (bsc#964413).
This non-security issue was fixed
- bsc#886378: qemu truncates vhd images in virt-rescue
This update was imported from the SUSE:SLE-12-SP1:Update update project.
The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)
https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html
E-Mail link for openSUSE-SU-2016:1750-1
https://www.suse.com/support/security/rating/
SUSE Security Ratings
openSUSE Leap 42.1
qemu-2.3.1-15.1
qemu-arm-2.3.1-15.1
qemu-block-curl-2.3.1-15.1
qemu-block-rbd-2.3.1-15.1
qemu-extra-2.3.1-15.1
qemu-guest-agent-2.3.1-15.1
qemu-ipxe-1.0.0-15.1
qemu-kvm-2.3.1-15.1
qemu-lang-2.3.1-15.1
qemu-linux-user-2.3.1-15.1
qemu-ppc-2.3.1-15.1
qemu-s390-2.3.1-15.1
qemu-seabios-1.8.1-15.1
qemu-sgabios-8-15.1
qemu-testsuite-2.3.1-15.2
qemu-tools-2.3.1-15.1
qemu-vgabios-1.8.1-15.1
qemu-x86-2.3.1-15.1
qemu-2.3.1-15.1 as a component of openSUSE Leap 42.1
qemu-arm-2.3.1-15.1 as a component of openSUSE Leap 42.1
qemu-block-curl-2.3.1-15.1 as a component of openSUSE Leap 42.1
qemu-block-rbd-2.3.1-15.1 as a component of openSUSE Leap 42.1
qemu-extra-2.3.1-15.1 as a component of openSUSE Leap 42.1
qemu-guest-agent-2.3.1-15.1 as a component of openSUSE Leap 42.1
qemu-ipxe-1.0.0-15.1 as a component of openSUSE Leap 42.1
qemu-kvm-2.3.1-15.1 as a component of openSUSE Leap 42.1
qemu-lang-2.3.1-15.1 as a component of openSUSE Leap 42.1
qemu-linux-user-2.3.1-15.1 as a component of openSUSE Leap 42.1
qemu-ppc-2.3.1-15.1 as a component of openSUSE Leap 42.1
qemu-s390-2.3.1-15.1 as a component of openSUSE Leap 42.1
qemu-seabios-1.8.1-15.1 as a component of openSUSE Leap 42.1
qemu-sgabios-8-15.1 as a component of openSUSE Leap 42.1
qemu-testsuite-2.3.1-15.2 as a component of openSUSE Leap 42.1
qemu-tools-2.3.1-15.1 as a component of openSUSE Leap 42.1
qemu-vgabios-1.8.1-15.1 as a component of openSUSE Leap 42.1
qemu-x86-2.3.1-15.1 as a component of openSUSE Leap 42.1
Buffer overflow in the send_control_msg function in hw/char/virtio-serial-bus.c in QEMU before 2.4.0 allows guest users to cause a denial of service (QEMU process crash) via a crafted virtio control message.
CVE-2015-5745
openSUSE Leap 42.1:qemu-2.3.1-15.1
openSUSE Leap 42.1:qemu-arm-2.3.1-15.1
openSUSE Leap 42.1:qemu-block-curl-2.3.1-15.1
openSUSE Leap 42.1:qemu-block-rbd-2.3.1-15.1
openSUSE Leap 42.1:qemu-extra-2.3.1-15.1
openSUSE Leap 42.1:qemu-guest-agent-2.3.1-15.1
openSUSE Leap 42.1:qemu-ipxe-1.0.0-15.1
openSUSE Leap 42.1:qemu-kvm-2.3.1-15.1
openSUSE Leap 42.1:qemu-lang-2.3.1-15.1
openSUSE Leap 42.1:qemu-linux-user-2.3.1-15.1
openSUSE Leap 42.1:qemu-ppc-2.3.1-15.1
openSUSE Leap 42.1:qemu-s390-2.3.1-15.1
openSUSE Leap 42.1:qemu-seabios-1.8.1-15.1
openSUSE Leap 42.1:qemu-sgabios-8-15.1
openSUSE Leap 42.1:qemu-testsuite-2.3.1-15.2
openSUSE Leap 42.1:qemu-tools-2.3.1-15.1
openSUSE Leap 42.1:qemu-vgabios-1.8.1-15.1
openSUSE Leap 42.1:qemu-x86-2.3.1-15.1
low
3.2
AV:A/AC:H/Au:N/C:N/I:P/A:P
Please Install the update.
https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html
https://www.suse.com/security/cve/CVE-2015-5745.html
CVE-2015-5745
https://bugzilla.suse.com/940929
SUSE Bug 940929
https://bugzilla.suse.com/950367
SUSE Bug 950367
The MSI-X MMIO support in hw/pci/msix.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (NULL pointer dereference and QEMU process crash) by leveraging failure to define the .write method.
CVE-2015-7549
openSUSE Leap 42.1:qemu-2.3.1-15.1
openSUSE Leap 42.1:qemu-arm-2.3.1-15.1
openSUSE Leap 42.1:qemu-block-curl-2.3.1-15.1
openSUSE Leap 42.1:qemu-block-rbd-2.3.1-15.1
openSUSE Leap 42.1:qemu-extra-2.3.1-15.1
openSUSE Leap 42.1:qemu-guest-agent-2.3.1-15.1
openSUSE Leap 42.1:qemu-ipxe-1.0.0-15.1
openSUSE Leap 42.1:qemu-kvm-2.3.1-15.1
openSUSE Leap 42.1:qemu-lang-2.3.1-15.1
openSUSE Leap 42.1:qemu-linux-user-2.3.1-15.1
openSUSE Leap 42.1:qemu-ppc-2.3.1-15.1
openSUSE Leap 42.1:qemu-s390-2.3.1-15.1
openSUSE Leap 42.1:qemu-seabios-1.8.1-15.1
openSUSE Leap 42.1:qemu-sgabios-8-15.1
openSUSE Leap 42.1:qemu-testsuite-2.3.1-15.2
openSUSE Leap 42.1:qemu-tools-2.3.1-15.1
openSUSE Leap 42.1:qemu-vgabios-1.8.1-15.1
openSUSE Leap 42.1:qemu-x86-2.3.1-15.1
low
2.3
AV:A/AC:M/Au:S/C:N/I:N/A:P
Please Install the update.
https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html
https://www.suse.com/security/cve/CVE-2015-7549.html
CVE-2015-7549
https://bugzilla.suse.com/958917
SUSE Bug 958917
https://bugzilla.suse.com/958918
SUSE Bug 958918
Qemu, when built with VNC display driver support, allows remote attackers to cause a denial of service (arithmetic exception and application crash) via crafted SetPixelFormat messages from a client.
CVE-2015-8504
openSUSE Leap 42.1:qemu-2.3.1-15.1
openSUSE Leap 42.1:qemu-arm-2.3.1-15.1
openSUSE Leap 42.1:qemu-block-curl-2.3.1-15.1
openSUSE Leap 42.1:qemu-block-rbd-2.3.1-15.1
openSUSE Leap 42.1:qemu-extra-2.3.1-15.1
openSUSE Leap 42.1:qemu-guest-agent-2.3.1-15.1
openSUSE Leap 42.1:qemu-ipxe-1.0.0-15.1
openSUSE Leap 42.1:qemu-kvm-2.3.1-15.1
openSUSE Leap 42.1:qemu-lang-2.3.1-15.1
openSUSE Leap 42.1:qemu-linux-user-2.3.1-15.1
openSUSE Leap 42.1:qemu-ppc-2.3.1-15.1
openSUSE Leap 42.1:qemu-s390-2.3.1-15.1
openSUSE Leap 42.1:qemu-seabios-1.8.1-15.1
openSUSE Leap 42.1:qemu-sgabios-8-15.1
openSUSE Leap 42.1:qemu-testsuite-2.3.1-15.2
openSUSE Leap 42.1:qemu-tools-2.3.1-15.1
openSUSE Leap 42.1:qemu-vgabios-1.8.1-15.1
openSUSE Leap 42.1:qemu-x86-2.3.1-15.1
moderate
Please Install the update.
https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html
https://www.suse.com/security/cve/CVE-2015-8504.html
CVE-2015-8504
https://bugzilla.suse.com/958491
SUSE Bug 958491
https://bugzilla.suse.com/958493
SUSE Bug 958493
The ehci_process_itd function in hw/usb/hcd-ehci.c in QEMU allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via a circular isochronous transfer descriptor (iTD) list.
CVE-2015-8558
openSUSE Leap 42.1:qemu-2.3.1-15.1
openSUSE Leap 42.1:qemu-arm-2.3.1-15.1
openSUSE Leap 42.1:qemu-block-curl-2.3.1-15.1
openSUSE Leap 42.1:qemu-block-rbd-2.3.1-15.1
openSUSE Leap 42.1:qemu-extra-2.3.1-15.1
openSUSE Leap 42.1:qemu-guest-agent-2.3.1-15.1
openSUSE Leap 42.1:qemu-ipxe-1.0.0-15.1
openSUSE Leap 42.1:qemu-kvm-2.3.1-15.1
openSUSE Leap 42.1:qemu-lang-2.3.1-15.1
openSUSE Leap 42.1:qemu-linux-user-2.3.1-15.1
openSUSE Leap 42.1:qemu-ppc-2.3.1-15.1
openSUSE Leap 42.1:qemu-s390-2.3.1-15.1
openSUSE Leap 42.1:qemu-seabios-1.8.1-15.1
openSUSE Leap 42.1:qemu-sgabios-8-15.1
openSUSE Leap 42.1:qemu-testsuite-2.3.1-15.2
openSUSE Leap 42.1:qemu-tools-2.3.1-15.1
openSUSE Leap 42.1:qemu-vgabios-1.8.1-15.1
openSUSE Leap 42.1:qemu-x86-2.3.1-15.1
low
Please Install the update.
https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html
https://www.suse.com/security/cve/CVE-2015-8558.html
CVE-2015-8558
https://bugzilla.suse.com/959005
SUSE Bug 959005
https://bugzilla.suse.com/959006
SUSE Bug 959006
https://bugzilla.suse.com/976109
SUSE Bug 976109
https://bugzilla.suse.com/976111
SUSE Bug 976111
Memory leak in net/vmxnet3.c in QEMU allows remote attackers to cause a denial of service (memory consumption).
CVE-2015-8567
openSUSE Leap 42.1:qemu-2.3.1-15.1
openSUSE Leap 42.1:qemu-arm-2.3.1-15.1
openSUSE Leap 42.1:qemu-block-curl-2.3.1-15.1
openSUSE Leap 42.1:qemu-block-rbd-2.3.1-15.1
openSUSE Leap 42.1:qemu-extra-2.3.1-15.1
openSUSE Leap 42.1:qemu-guest-agent-2.3.1-15.1
openSUSE Leap 42.1:qemu-ipxe-1.0.0-15.1
openSUSE Leap 42.1:qemu-kvm-2.3.1-15.1
openSUSE Leap 42.1:qemu-lang-2.3.1-15.1
openSUSE Leap 42.1:qemu-linux-user-2.3.1-15.1
openSUSE Leap 42.1:qemu-ppc-2.3.1-15.1
openSUSE Leap 42.1:qemu-s390-2.3.1-15.1
openSUSE Leap 42.1:qemu-seabios-1.8.1-15.1
openSUSE Leap 42.1:qemu-sgabios-8-15.1
openSUSE Leap 42.1:qemu-testsuite-2.3.1-15.2
openSUSE Leap 42.1:qemu-tools-2.3.1-15.1
openSUSE Leap 42.1:qemu-vgabios-1.8.1-15.1
openSUSE Leap 42.1:qemu-x86-2.3.1-15.1
low
2.3
AV:A/AC:M/Au:S/C:N/I:N/A:P
Please Install the update.
https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html
https://www.suse.com/security/cve/CVE-2015-8567.html
CVE-2015-8567
https://bugzilla.suse.com/959386
SUSE Bug 959386
https://bugzilla.suse.com/959387
SUSE Bug 959387
Memory leak in QEMU, when built with a VMWARE VMXNET3 paravirtual NIC emulator support, allows local guest users to cause a denial of service (host memory consumption) by trying to activate the vmxnet3 device repeatedly.
CVE-2015-8568
openSUSE Leap 42.1:qemu-2.3.1-15.1
openSUSE Leap 42.1:qemu-arm-2.3.1-15.1
openSUSE Leap 42.1:qemu-block-curl-2.3.1-15.1
openSUSE Leap 42.1:qemu-block-rbd-2.3.1-15.1
openSUSE Leap 42.1:qemu-extra-2.3.1-15.1
openSUSE Leap 42.1:qemu-guest-agent-2.3.1-15.1
openSUSE Leap 42.1:qemu-ipxe-1.0.0-15.1
openSUSE Leap 42.1:qemu-kvm-2.3.1-15.1
openSUSE Leap 42.1:qemu-lang-2.3.1-15.1
openSUSE Leap 42.1:qemu-linux-user-2.3.1-15.1
openSUSE Leap 42.1:qemu-ppc-2.3.1-15.1
openSUSE Leap 42.1:qemu-s390-2.3.1-15.1
openSUSE Leap 42.1:qemu-seabios-1.8.1-15.1
openSUSE Leap 42.1:qemu-sgabios-8-15.1
openSUSE Leap 42.1:qemu-testsuite-2.3.1-15.2
openSUSE Leap 42.1:qemu-tools-2.3.1-15.1
openSUSE Leap 42.1:qemu-vgabios-1.8.1-15.1
openSUSE Leap 42.1:qemu-x86-2.3.1-15.1
low
Please Install the update.
https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html
https://www.suse.com/security/cve/CVE-2015-8568.html
CVE-2015-8568
https://bugzilla.suse.com/959386
SUSE Bug 959386
https://bugzilla.suse.com/959387
SUSE Bug 959387
Stack-based buffer overflow in the megasas_ctrl_get_info function in QEMU, when built with SCSI MegaRAID SAS HBA emulation support, allows local guest users to cause a denial of service (QEMU instance crash) via a crafted SCSI controller CTRL_GET_INFO command.
CVE-2015-8613
openSUSE Leap 42.1:qemu-2.3.1-15.1
openSUSE Leap 42.1:qemu-arm-2.3.1-15.1
openSUSE Leap 42.1:qemu-block-curl-2.3.1-15.1
openSUSE Leap 42.1:qemu-block-rbd-2.3.1-15.1
openSUSE Leap 42.1:qemu-extra-2.3.1-15.1
openSUSE Leap 42.1:qemu-guest-agent-2.3.1-15.1
openSUSE Leap 42.1:qemu-ipxe-1.0.0-15.1
openSUSE Leap 42.1:qemu-kvm-2.3.1-15.1
openSUSE Leap 42.1:qemu-lang-2.3.1-15.1
openSUSE Leap 42.1:qemu-linux-user-2.3.1-15.1
openSUSE Leap 42.1:qemu-ppc-2.3.1-15.1
openSUSE Leap 42.1:qemu-s390-2.3.1-15.1
openSUSE Leap 42.1:qemu-seabios-1.8.1-15.1
openSUSE Leap 42.1:qemu-sgabios-8-15.1
openSUSE Leap 42.1:qemu-testsuite-2.3.1-15.2
openSUSE Leap 42.1:qemu-tools-2.3.1-15.1
openSUSE Leap 42.1:qemu-vgabios-1.8.1-15.1
openSUSE Leap 42.1:qemu-x86-2.3.1-15.1
low
Please Install the update.
https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html
https://www.suse.com/security/cve/CVE-2015-8613.html
CVE-2015-8613
https://bugzilla.suse.com/961358
SUSE Bug 961358
https://bugzilla.suse.com/961556
SUSE Bug 961556
The Human Monitor Interface support in QEMU allows remote attackers to cause a denial of service (out-of-bounds write and application crash).
CVE-2015-8619
openSUSE Leap 42.1:qemu-2.3.1-15.1
openSUSE Leap 42.1:qemu-arm-2.3.1-15.1
openSUSE Leap 42.1:qemu-block-curl-2.3.1-15.1
openSUSE Leap 42.1:qemu-block-rbd-2.3.1-15.1
openSUSE Leap 42.1:qemu-extra-2.3.1-15.1
openSUSE Leap 42.1:qemu-guest-agent-2.3.1-15.1
openSUSE Leap 42.1:qemu-ipxe-1.0.0-15.1
openSUSE Leap 42.1:qemu-kvm-2.3.1-15.1
openSUSE Leap 42.1:qemu-lang-2.3.1-15.1
openSUSE Leap 42.1:qemu-linux-user-2.3.1-15.1
openSUSE Leap 42.1:qemu-ppc-2.3.1-15.1
openSUSE Leap 42.1:qemu-s390-2.3.1-15.1
openSUSE Leap 42.1:qemu-seabios-1.8.1-15.1
openSUSE Leap 42.1:qemu-sgabios-8-15.1
openSUSE Leap 42.1:qemu-testsuite-2.3.1-15.2
openSUSE Leap 42.1:qemu-tools-2.3.1-15.1
openSUSE Leap 42.1:qemu-vgabios-1.8.1-15.1
openSUSE Leap 42.1:qemu-x86-2.3.1-15.1
low
Please Install the update.
https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html
https://www.suse.com/security/cve/CVE-2015-8619.html
CVE-2015-8619
https://bugzilla.suse.com/960334
SUSE Bug 960334
https://bugzilla.suse.com/965269
SUSE Bug 965269
QEMU (aka Quick Emulator) built with the NE2000 device emulation support is vulnerable to an OOB r/w access issue. It could occur while performing 'ioport' r/w operations. A privileged (CAP_SYS_RAWIO) user/process could use this flaw to leak or corrupt QEMU memory bytes.
CVE-2015-8743
openSUSE Leap 42.1:qemu-2.3.1-15.1
openSUSE Leap 42.1:qemu-arm-2.3.1-15.1
openSUSE Leap 42.1:qemu-block-curl-2.3.1-15.1
openSUSE Leap 42.1:qemu-block-rbd-2.3.1-15.1
openSUSE Leap 42.1:qemu-extra-2.3.1-15.1
openSUSE Leap 42.1:qemu-guest-agent-2.3.1-15.1
openSUSE Leap 42.1:qemu-ipxe-1.0.0-15.1
openSUSE Leap 42.1:qemu-kvm-2.3.1-15.1
openSUSE Leap 42.1:qemu-lang-2.3.1-15.1
openSUSE Leap 42.1:qemu-linux-user-2.3.1-15.1
openSUSE Leap 42.1:qemu-ppc-2.3.1-15.1
openSUSE Leap 42.1:qemu-s390-2.3.1-15.1
openSUSE Leap 42.1:qemu-seabios-1.8.1-15.1
openSUSE Leap 42.1:qemu-sgabios-8-15.1
openSUSE Leap 42.1:qemu-testsuite-2.3.1-15.2
openSUSE Leap 42.1:qemu-tools-2.3.1-15.1
openSUSE Leap 42.1:qemu-vgabios-1.8.1-15.1
openSUSE Leap 42.1:qemu-x86-2.3.1-15.1
moderate
3
AV:L/AC:M/Au:S/C:P/I:P/A:N
Please Install the update.
https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html
https://www.suse.com/security/cve/CVE-2015-8743.html
CVE-2015-8743
https://bugzilla.suse.com/960725
SUSE Bug 960725
https://bugzilla.suse.com/960726
SUSE Bug 960726
QEMU (aka Quick Emulator) built with a VMWARE VMXNET3 paravirtual NIC emulator support is vulnerable to crash issue. It occurs when a guest sends a Layer-2 packet smaller than 22 bytes. A privileged (CAP_SYS_RAWIO) guest user could use this flaw to crash the QEMU process instance resulting in DoS.
CVE-2015-8744
openSUSE Leap 42.1:qemu-2.3.1-15.1
openSUSE Leap 42.1:qemu-arm-2.3.1-15.1
openSUSE Leap 42.1:qemu-block-curl-2.3.1-15.1
openSUSE Leap 42.1:qemu-block-rbd-2.3.1-15.1
openSUSE Leap 42.1:qemu-extra-2.3.1-15.1
openSUSE Leap 42.1:qemu-guest-agent-2.3.1-15.1
openSUSE Leap 42.1:qemu-ipxe-1.0.0-15.1
openSUSE Leap 42.1:qemu-kvm-2.3.1-15.1
openSUSE Leap 42.1:qemu-lang-2.3.1-15.1
openSUSE Leap 42.1:qemu-linux-user-2.3.1-15.1
openSUSE Leap 42.1:qemu-ppc-2.3.1-15.1
openSUSE Leap 42.1:qemu-s390-2.3.1-15.1
openSUSE Leap 42.1:qemu-seabios-1.8.1-15.1
openSUSE Leap 42.1:qemu-sgabios-8-15.1
openSUSE Leap 42.1:qemu-testsuite-2.3.1-15.2
openSUSE Leap 42.1:qemu-tools-2.3.1-15.1
openSUSE Leap 42.1:qemu-vgabios-1.8.1-15.1
openSUSE Leap 42.1:qemu-x86-2.3.1-15.1
low
2.3
AV:A/AC:M/Au:S/C:N/I:N/A:P
Please Install the update.
https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html
https://www.suse.com/security/cve/CVE-2015-8744.html
CVE-2015-8744
https://bugzilla.suse.com/960835
SUSE Bug 960835
https://bugzilla.suse.com/960836
SUSE Bug 960836
QEMU (aka Quick Emulator) built with a VMWARE VMXNET3 paravirtual NIC emulator support is vulnerable to crash issue. It could occur while reading Interrupt Mask Registers (IMR). A privileged (CAP_SYS_RAWIO) guest user could use this flaw to crash the QEMU process instance resulting in DoS.
CVE-2015-8745
openSUSE Leap 42.1:qemu-2.3.1-15.1
openSUSE Leap 42.1:qemu-arm-2.3.1-15.1
openSUSE Leap 42.1:qemu-block-curl-2.3.1-15.1
openSUSE Leap 42.1:qemu-block-rbd-2.3.1-15.1
openSUSE Leap 42.1:qemu-extra-2.3.1-15.1
openSUSE Leap 42.1:qemu-guest-agent-2.3.1-15.1
openSUSE Leap 42.1:qemu-ipxe-1.0.0-15.1
openSUSE Leap 42.1:qemu-kvm-2.3.1-15.1
openSUSE Leap 42.1:qemu-lang-2.3.1-15.1
openSUSE Leap 42.1:qemu-linux-user-2.3.1-15.1
openSUSE Leap 42.1:qemu-ppc-2.3.1-15.1
openSUSE Leap 42.1:qemu-s390-2.3.1-15.1
openSUSE Leap 42.1:qemu-seabios-1.8.1-15.1
openSUSE Leap 42.1:qemu-sgabios-8-15.1
openSUSE Leap 42.1:qemu-testsuite-2.3.1-15.2
openSUSE Leap 42.1:qemu-tools-2.3.1-15.1
openSUSE Leap 42.1:qemu-vgabios-1.8.1-15.1
openSUSE Leap 42.1:qemu-x86-2.3.1-15.1
low
1.5
AV:L/AC:M/Au:S/C:N/I:N/A:P
Please Install the update.
https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html
https://www.suse.com/security/cve/CVE-2015-8745.html
CVE-2015-8745
https://bugzilla.suse.com/960707
SUSE Bug 960707
https://bugzilla.suse.com/960708
SUSE Bug 960708
QEMU (aka Quick Emulator) built to use 'address_space_translate' to map an address to a MemoryRegionSection is vulnerable to an OOB r/w access issue. It could occur while doing pci_dma_read/write calls. Affects QEMU versions >= 1.6.0 and <= 2.3.1. A privileged user inside guest could use this flaw to crash the guest instance resulting in DoS.
CVE-2015-8817
openSUSE Leap 42.1:qemu-2.3.1-15.1
openSUSE Leap 42.1:qemu-arm-2.3.1-15.1
openSUSE Leap 42.1:qemu-block-curl-2.3.1-15.1
openSUSE Leap 42.1:qemu-block-rbd-2.3.1-15.1
openSUSE Leap 42.1:qemu-extra-2.3.1-15.1
openSUSE Leap 42.1:qemu-guest-agent-2.3.1-15.1
openSUSE Leap 42.1:qemu-ipxe-1.0.0-15.1
openSUSE Leap 42.1:qemu-kvm-2.3.1-15.1
openSUSE Leap 42.1:qemu-lang-2.3.1-15.1
openSUSE Leap 42.1:qemu-linux-user-2.3.1-15.1
openSUSE Leap 42.1:qemu-ppc-2.3.1-15.1
openSUSE Leap 42.1:qemu-s390-2.3.1-15.1
openSUSE Leap 42.1:qemu-seabios-1.8.1-15.1
openSUSE Leap 42.1:qemu-sgabios-8-15.1
openSUSE Leap 42.1:qemu-testsuite-2.3.1-15.2
openSUSE Leap 42.1:qemu-tools-2.3.1-15.1
openSUSE Leap 42.1:qemu-vgabios-1.8.1-15.1
openSUSE Leap 42.1:qemu-x86-2.3.1-15.1
moderate
Please Install the update.
https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html
https://www.suse.com/security/cve/CVE-2015-8817.html
CVE-2015-8817
https://bugzilla.suse.com/969121
SUSE Bug 969121
https://bugzilla.suse.com/969122
SUSE Bug 969122
https://bugzilla.suse.com/969125
SUSE Bug 969125
https://bugzilla.suse.com/969126
SUSE Bug 969126
The cpu_physical_memory_write_rom_internal function in exec.c in QEMU (aka Quick Emulator) does not properly skip MMIO regions, which allows local privileged guest users to cause a denial of service (guest crash) via unspecified vectors.
CVE-2015-8818
openSUSE Leap 42.1:qemu-2.3.1-15.1
openSUSE Leap 42.1:qemu-arm-2.3.1-15.1
openSUSE Leap 42.1:qemu-block-curl-2.3.1-15.1
openSUSE Leap 42.1:qemu-block-rbd-2.3.1-15.1
openSUSE Leap 42.1:qemu-extra-2.3.1-15.1
openSUSE Leap 42.1:qemu-guest-agent-2.3.1-15.1
openSUSE Leap 42.1:qemu-ipxe-1.0.0-15.1
openSUSE Leap 42.1:qemu-kvm-2.3.1-15.1
openSUSE Leap 42.1:qemu-lang-2.3.1-15.1
openSUSE Leap 42.1:qemu-linux-user-2.3.1-15.1
openSUSE Leap 42.1:qemu-ppc-2.3.1-15.1
openSUSE Leap 42.1:qemu-s390-2.3.1-15.1
openSUSE Leap 42.1:qemu-seabios-1.8.1-15.1
openSUSE Leap 42.1:qemu-sgabios-8-15.1
openSUSE Leap 42.1:qemu-testsuite-2.3.1-15.2
openSUSE Leap 42.1:qemu-tools-2.3.1-15.1
openSUSE Leap 42.1:qemu-vgabios-1.8.1-15.1
openSUSE Leap 42.1:qemu-x86-2.3.1-15.1
moderate
Please Install the update.
https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html
https://www.suse.com/security/cve/CVE-2015-8818.html
CVE-2015-8818
https://bugzilla.suse.com/969122
SUSE Bug 969122
https://bugzilla.suse.com/969125
SUSE Bug 969125
https://bugzilla.suse.com/969126
SUSE Bug 969126
Use-after-free vulnerability in hw/ide/ahci.c in QEMU, when built with IDE AHCI Emulation support, allows guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via an invalid AHCI Native Command Queuing (NCQ) AIO command.
CVE-2016-1568
openSUSE Leap 42.1:qemu-2.3.1-15.1
openSUSE Leap 42.1:qemu-arm-2.3.1-15.1
openSUSE Leap 42.1:qemu-block-curl-2.3.1-15.1
openSUSE Leap 42.1:qemu-block-rbd-2.3.1-15.1
openSUSE Leap 42.1:qemu-extra-2.3.1-15.1
openSUSE Leap 42.1:qemu-guest-agent-2.3.1-15.1
openSUSE Leap 42.1:qemu-ipxe-1.0.0-15.1
openSUSE Leap 42.1:qemu-kvm-2.3.1-15.1
openSUSE Leap 42.1:qemu-lang-2.3.1-15.1
openSUSE Leap 42.1:qemu-linux-user-2.3.1-15.1
openSUSE Leap 42.1:qemu-ppc-2.3.1-15.1
openSUSE Leap 42.1:qemu-s390-2.3.1-15.1
openSUSE Leap 42.1:qemu-seabios-1.8.1-15.1
openSUSE Leap 42.1:qemu-sgabios-8-15.1
openSUSE Leap 42.1:qemu-testsuite-2.3.1-15.2
openSUSE Leap 42.1:qemu-tools-2.3.1-15.1
openSUSE Leap 42.1:qemu-vgabios-1.8.1-15.1
openSUSE Leap 42.1:qemu-x86-2.3.1-15.1
moderate
4.1
AV:L/AC:M/Au:S/C:P/I:P/A:P
Please Install the update.
https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html
https://www.suse.com/security/cve/CVE-2016-1568.html
CVE-2016-1568
https://bugzilla.suse.com/961332
SUSE Bug 961332
https://bugzilla.suse.com/961333
SUSE Bug 961333
The (1) fw_cfg_write and (2) fw_cfg_read functions in hw/nvram/fw_cfg.c in QEMU before 2.4, when built with the Firmware Configuration device emulation support, allow guest OS users with the CAP_SYS_RAWIO privilege to cause a denial of service (out-of-bounds read or write access and process crash) or possibly execute arbitrary code via an invalid current entry value in a firmware configuration.
CVE-2016-1714
openSUSE Leap 42.1:qemu-2.3.1-15.1
openSUSE Leap 42.1:qemu-arm-2.3.1-15.1
openSUSE Leap 42.1:qemu-block-curl-2.3.1-15.1
openSUSE Leap 42.1:qemu-block-rbd-2.3.1-15.1
openSUSE Leap 42.1:qemu-extra-2.3.1-15.1
openSUSE Leap 42.1:qemu-guest-agent-2.3.1-15.1
openSUSE Leap 42.1:qemu-ipxe-1.0.0-15.1
openSUSE Leap 42.1:qemu-kvm-2.3.1-15.1
openSUSE Leap 42.1:qemu-lang-2.3.1-15.1
openSUSE Leap 42.1:qemu-linux-user-2.3.1-15.1
openSUSE Leap 42.1:qemu-ppc-2.3.1-15.1
openSUSE Leap 42.1:qemu-s390-2.3.1-15.1
openSUSE Leap 42.1:qemu-seabios-1.8.1-15.1
openSUSE Leap 42.1:qemu-sgabios-8-15.1
openSUSE Leap 42.1:qemu-testsuite-2.3.1-15.2
openSUSE Leap 42.1:qemu-tools-2.3.1-15.1
openSUSE Leap 42.1:qemu-vgabios-1.8.1-15.1
openSUSE Leap 42.1:qemu-x86-2.3.1-15.1
moderate
4.9
AV:A/AC:M/Au:S/C:P/I:P/A:P
Please Install the update.
https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html
https://www.suse.com/security/cve/CVE-2016-1714.html
CVE-2016-1714
https://bugzilla.suse.com/961691
SUSE Bug 961691
https://bugzilla.suse.com/961692
SUSE Bug 961692
QEMU (aka Quick Emulator) built with the TPR optimization for 32-bit Windows guests support is vulnerable to a null pointer dereference flaw. It occurs while doing I/O port write operations via hmp interface. In that, 'current_cpu' remains null, which leads to the null pointer dereference. A user or process could use this flaw to crash the QEMU instance, resulting in DoS issue.
CVE-2016-1922
openSUSE Leap 42.1:qemu-2.3.1-15.1
openSUSE Leap 42.1:qemu-arm-2.3.1-15.1
openSUSE Leap 42.1:qemu-block-curl-2.3.1-15.1
openSUSE Leap 42.1:qemu-block-rbd-2.3.1-15.1
openSUSE Leap 42.1:qemu-extra-2.3.1-15.1
openSUSE Leap 42.1:qemu-guest-agent-2.3.1-15.1
openSUSE Leap 42.1:qemu-ipxe-1.0.0-15.1
openSUSE Leap 42.1:qemu-kvm-2.3.1-15.1
openSUSE Leap 42.1:qemu-lang-2.3.1-15.1
openSUSE Leap 42.1:qemu-linux-user-2.3.1-15.1
openSUSE Leap 42.1:qemu-ppc-2.3.1-15.1
openSUSE Leap 42.1:qemu-s390-2.3.1-15.1
openSUSE Leap 42.1:qemu-seabios-1.8.1-15.1
openSUSE Leap 42.1:qemu-sgabios-8-15.1
openSUSE Leap 42.1:qemu-testsuite-2.3.1-15.2
openSUSE Leap 42.1:qemu-tools-2.3.1-15.1
openSUSE Leap 42.1:qemu-vgabios-1.8.1-15.1
openSUSE Leap 42.1:qemu-x86-2.3.1-15.1
low
2.9
AV:A/AC:M/Au:N/C:N/I:N/A:P
Please Install the update.
https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html
https://www.suse.com/security/cve/CVE-2016-1922.html
CVE-2016-1922
https://bugzilla.suse.com/962320
SUSE Bug 962320
https://bugzilla.suse.com/962321
SUSE Bug 962321
QEMU (aka Quick Emulator) built with the e1000 NIC emulation support is vulnerable to an infinite loop issue. It could occur while processing data via transmit or receive descriptors, provided the initial receive/transmit descriptor head (TDH/RDH) is set outside the allocated descriptor buffer. A privileged user inside guest could use this flaw to crash the QEMU instance resulting in DoS.
CVE-2016-1981
openSUSE Leap 42.1:qemu-2.3.1-15.1
openSUSE Leap 42.1:qemu-arm-2.3.1-15.1
openSUSE Leap 42.1:qemu-block-curl-2.3.1-15.1
openSUSE Leap 42.1:qemu-block-rbd-2.3.1-15.1
openSUSE Leap 42.1:qemu-extra-2.3.1-15.1
openSUSE Leap 42.1:qemu-guest-agent-2.3.1-15.1
openSUSE Leap 42.1:qemu-ipxe-1.0.0-15.1
openSUSE Leap 42.1:qemu-kvm-2.3.1-15.1
openSUSE Leap 42.1:qemu-lang-2.3.1-15.1
openSUSE Leap 42.1:qemu-linux-user-2.3.1-15.1
openSUSE Leap 42.1:qemu-ppc-2.3.1-15.1
openSUSE Leap 42.1:qemu-s390-2.3.1-15.1
openSUSE Leap 42.1:qemu-seabios-1.8.1-15.1
openSUSE Leap 42.1:qemu-sgabios-8-15.1
openSUSE Leap 42.1:qemu-testsuite-2.3.1-15.2
openSUSE Leap 42.1:qemu-tools-2.3.1-15.1
openSUSE Leap 42.1:qemu-vgabios-1.8.1-15.1
openSUSE Leap 42.1:qemu-x86-2.3.1-15.1
low
2.3
AV:A/AC:M/Au:S/C:N/I:N/A:P
Please Install the update.
https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html
https://www.suse.com/security/cve/CVE-2016-1981.html
CVE-2016-1981
https://bugzilla.suse.com/963782
SUSE Bug 963782
https://bugzilla.suse.com/963783
SUSE Bug 963783
QEMU (aka Quick Emulator) built with an IDE AHCI emulation support is vulnerable to a null pointer dereference flaw. It occurs while unmapping the Frame Information Structure (FIS) and Command List Block (CLB) entries. A privileged user inside guest could use this flaw to crash the QEMU process instance resulting in DoS.
CVE-2016-2197
openSUSE Leap 42.1:qemu-2.3.1-15.1
openSUSE Leap 42.1:qemu-arm-2.3.1-15.1
openSUSE Leap 42.1:qemu-block-curl-2.3.1-15.1
openSUSE Leap 42.1:qemu-block-rbd-2.3.1-15.1
openSUSE Leap 42.1:qemu-extra-2.3.1-15.1
openSUSE Leap 42.1:qemu-guest-agent-2.3.1-15.1
openSUSE Leap 42.1:qemu-ipxe-1.0.0-15.1
openSUSE Leap 42.1:qemu-kvm-2.3.1-15.1
openSUSE Leap 42.1:qemu-lang-2.3.1-15.1
openSUSE Leap 42.1:qemu-linux-user-2.3.1-15.1
openSUSE Leap 42.1:qemu-ppc-2.3.1-15.1
openSUSE Leap 42.1:qemu-s390-2.3.1-15.1
openSUSE Leap 42.1:qemu-seabios-1.8.1-15.1
openSUSE Leap 42.1:qemu-sgabios-8-15.1
openSUSE Leap 42.1:qemu-testsuite-2.3.1-15.2
openSUSE Leap 42.1:qemu-tools-2.3.1-15.1
openSUSE Leap 42.1:qemu-vgabios-1.8.1-15.1
openSUSE Leap 42.1:qemu-x86-2.3.1-15.1
low
2.3
AV:A/AC:M/Au:S/C:N/I:N/A:P
Please Install the update.
https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html
https://www.suse.com/security/cve/CVE-2016-2197.html
CVE-2016-2197
https://bugzilla.suse.com/964411
SUSE Bug 964411
QEMU (aka Quick Emulator) built with the USB EHCI emulation support is vulnerable to a null pointer dereference flaw. It could occur when an application attempts to write to EHCI capabilities registers. A privileged user inside quest could use this flaw to crash the QEMU process instance resulting in DoS.
CVE-2016-2198
openSUSE Leap 42.1:qemu-2.3.1-15.1
openSUSE Leap 42.1:qemu-arm-2.3.1-15.1
openSUSE Leap 42.1:qemu-block-curl-2.3.1-15.1
openSUSE Leap 42.1:qemu-block-rbd-2.3.1-15.1
openSUSE Leap 42.1:qemu-extra-2.3.1-15.1
openSUSE Leap 42.1:qemu-guest-agent-2.3.1-15.1
openSUSE Leap 42.1:qemu-ipxe-1.0.0-15.1
openSUSE Leap 42.1:qemu-kvm-2.3.1-15.1
openSUSE Leap 42.1:qemu-lang-2.3.1-15.1
openSUSE Leap 42.1:qemu-linux-user-2.3.1-15.1
openSUSE Leap 42.1:qemu-ppc-2.3.1-15.1
openSUSE Leap 42.1:qemu-s390-2.3.1-15.1
openSUSE Leap 42.1:qemu-seabios-1.8.1-15.1
openSUSE Leap 42.1:qemu-sgabios-8-15.1
openSUSE Leap 42.1:qemu-testsuite-2.3.1-15.2
openSUSE Leap 42.1:qemu-tools-2.3.1-15.1
openSUSE Leap 42.1:qemu-vgabios-1.8.1-15.1
openSUSE Leap 42.1:qemu-x86-2.3.1-15.1
low
2.3
AV:A/AC:M/Au:S/C:N/I:N/A:P
Please Install the update.
https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html
https://www.suse.com/security/cve/CVE-2016-2198.html
CVE-2016-2198
https://bugzilla.suse.com/964413
SUSE Bug 964413
https://bugzilla.suse.com/964415
SUSE Bug 964415
Multiple integer overflows in the USB Net device emulator (hw/usb/dev-network.c) in QEMU before 2.5.1 allow local guest OS administrators to cause a denial of service (QEMU process crash) or obtain sensitive host memory information via a remote NDIS control message packet that is mishandled in the (1) rndis_query_response, (2) rndis_set_response, or (3) usb_net_handle_dataout function.
CVE-2016-2538
openSUSE Leap 42.1:qemu-2.3.1-15.1
openSUSE Leap 42.1:qemu-arm-2.3.1-15.1
openSUSE Leap 42.1:qemu-block-curl-2.3.1-15.1
openSUSE Leap 42.1:qemu-block-rbd-2.3.1-15.1
openSUSE Leap 42.1:qemu-extra-2.3.1-15.1
openSUSE Leap 42.1:qemu-guest-agent-2.3.1-15.1
openSUSE Leap 42.1:qemu-ipxe-1.0.0-15.1
openSUSE Leap 42.1:qemu-kvm-2.3.1-15.1
openSUSE Leap 42.1:qemu-lang-2.3.1-15.1
openSUSE Leap 42.1:qemu-linux-user-2.3.1-15.1
openSUSE Leap 42.1:qemu-ppc-2.3.1-15.1
openSUSE Leap 42.1:qemu-s390-2.3.1-15.1
openSUSE Leap 42.1:qemu-seabios-1.8.1-15.1
openSUSE Leap 42.1:qemu-sgabios-8-15.1
openSUSE Leap 42.1:qemu-testsuite-2.3.1-15.2
openSUSE Leap 42.1:qemu-tools-2.3.1-15.1
openSUSE Leap 42.1:qemu-vgabios-1.8.1-15.1
openSUSE Leap 42.1:qemu-x86-2.3.1-15.1
low
Please Install the update.
https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html
https://www.suse.com/security/cve/CVE-2016-2538.html
CVE-2016-2538
https://bugzilla.suse.com/967969
SUSE Bug 967969
https://bugzilla.suse.com/968004
SUSE Bug 968004
The ne2000_receive function in the NE2000 NIC emulation support (hw/net/ne2000.c) in QEMU before 2.5.1 allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via crafted values for the PSTART and PSTOP registers, involving ring buffer control.
CVE-2016-2841
openSUSE Leap 42.1:qemu-2.3.1-15.1
openSUSE Leap 42.1:qemu-arm-2.3.1-15.1
openSUSE Leap 42.1:qemu-block-curl-2.3.1-15.1
openSUSE Leap 42.1:qemu-block-rbd-2.3.1-15.1
openSUSE Leap 42.1:qemu-extra-2.3.1-15.1
openSUSE Leap 42.1:qemu-guest-agent-2.3.1-15.1
openSUSE Leap 42.1:qemu-ipxe-1.0.0-15.1
openSUSE Leap 42.1:qemu-kvm-2.3.1-15.1
openSUSE Leap 42.1:qemu-lang-2.3.1-15.1
openSUSE Leap 42.1:qemu-linux-user-2.3.1-15.1
openSUSE Leap 42.1:qemu-ppc-2.3.1-15.1
openSUSE Leap 42.1:qemu-s390-2.3.1-15.1
openSUSE Leap 42.1:qemu-seabios-1.8.1-15.1
openSUSE Leap 42.1:qemu-sgabios-8-15.1
openSUSE Leap 42.1:qemu-testsuite-2.3.1-15.2
openSUSE Leap 42.1:qemu-tools-2.3.1-15.1
openSUSE Leap 42.1:qemu-vgabios-1.8.1-15.1
openSUSE Leap 42.1:qemu-x86-2.3.1-15.1
low
2.3
AV:A/AC:M/Au:S/C:N/I:N/A:P
Please Install the update.
https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html
https://www.suse.com/security/cve/CVE-2016-2841.html
CVE-2016-2841
https://bugzilla.suse.com/969350
SUSE Bug 969350
https://bugzilla.suse.com/969351
SUSE Bug 969351
The net_checksum_calculate function in net/checksum.c in QEMU allows local guest OS users to cause a denial of service (out-of-bounds heap read and crash) via the payload length in a crafted packet.
CVE-2016-2857
openSUSE Leap 42.1:qemu-2.3.1-15.1
openSUSE Leap 42.1:qemu-arm-2.3.1-15.1
openSUSE Leap 42.1:qemu-block-curl-2.3.1-15.1
openSUSE Leap 42.1:qemu-block-rbd-2.3.1-15.1
openSUSE Leap 42.1:qemu-extra-2.3.1-15.1
openSUSE Leap 42.1:qemu-guest-agent-2.3.1-15.1
openSUSE Leap 42.1:qemu-ipxe-1.0.0-15.1
openSUSE Leap 42.1:qemu-kvm-2.3.1-15.1
openSUSE Leap 42.1:qemu-lang-2.3.1-15.1
openSUSE Leap 42.1:qemu-linux-user-2.3.1-15.1
openSUSE Leap 42.1:qemu-ppc-2.3.1-15.1
openSUSE Leap 42.1:qemu-s390-2.3.1-15.1
openSUSE Leap 42.1:qemu-seabios-1.8.1-15.1
openSUSE Leap 42.1:qemu-sgabios-8-15.1
openSUSE Leap 42.1:qemu-testsuite-2.3.1-15.2
openSUSE Leap 42.1:qemu-tools-2.3.1-15.1
openSUSE Leap 42.1:qemu-vgabios-1.8.1-15.1
openSUSE Leap 42.1:qemu-x86-2.3.1-15.1
moderate
3
AV:L/AC:M/Au:S/C:P/I:N/A:P
Please Install the update.
https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html
https://www.suse.com/security/cve/CVE-2016-2857.html
CVE-2016-2857
https://bugzilla.suse.com/970037
SUSE Bug 970037
QEMU, when built with the Pseudo Random Number Generator (PRNG) back-end support, allows local guest OS users to cause a denial of service (process crash) via an entropy request, which triggers arbitrary stack based allocation and memory corruption.
CVE-2016-2858
openSUSE Leap 42.1:qemu-2.3.1-15.1
openSUSE Leap 42.1:qemu-arm-2.3.1-15.1
openSUSE Leap 42.1:qemu-block-curl-2.3.1-15.1
openSUSE Leap 42.1:qemu-block-rbd-2.3.1-15.1
openSUSE Leap 42.1:qemu-extra-2.3.1-15.1
openSUSE Leap 42.1:qemu-guest-agent-2.3.1-15.1
openSUSE Leap 42.1:qemu-ipxe-1.0.0-15.1
openSUSE Leap 42.1:qemu-kvm-2.3.1-15.1
openSUSE Leap 42.1:qemu-lang-2.3.1-15.1
openSUSE Leap 42.1:qemu-linux-user-2.3.1-15.1
openSUSE Leap 42.1:qemu-ppc-2.3.1-15.1
openSUSE Leap 42.1:qemu-s390-2.3.1-15.1
openSUSE Leap 42.1:qemu-seabios-1.8.1-15.1
openSUSE Leap 42.1:qemu-sgabios-8-15.1
openSUSE Leap 42.1:qemu-testsuite-2.3.1-15.2
openSUSE Leap 42.1:qemu-tools-2.3.1-15.1
openSUSE Leap 42.1:qemu-vgabios-1.8.1-15.1
openSUSE Leap 42.1:qemu-x86-2.3.1-15.1
moderate
1.5
AV:L/AC:M/Au:S/C:N/I:N/A:P
Please Install the update.
https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html
https://www.suse.com/security/cve/CVE-2016-2858.html
CVE-2016-2858
https://bugzilla.suse.com/970036
SUSE Bug 970036
The VGA module in QEMU improperly performs bounds checking on banked access to video memory, which allows local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the "Dark Portal" issue.
CVE-2016-3710
openSUSE Leap 42.1:qemu-2.3.1-15.1
openSUSE Leap 42.1:qemu-arm-2.3.1-15.1
openSUSE Leap 42.1:qemu-block-curl-2.3.1-15.1
openSUSE Leap 42.1:qemu-block-rbd-2.3.1-15.1
openSUSE Leap 42.1:qemu-extra-2.3.1-15.1
openSUSE Leap 42.1:qemu-guest-agent-2.3.1-15.1
openSUSE Leap 42.1:qemu-ipxe-1.0.0-15.1
openSUSE Leap 42.1:qemu-kvm-2.3.1-15.1
openSUSE Leap 42.1:qemu-lang-2.3.1-15.1
openSUSE Leap 42.1:qemu-linux-user-2.3.1-15.1
openSUSE Leap 42.1:qemu-ppc-2.3.1-15.1
openSUSE Leap 42.1:qemu-s390-2.3.1-15.1
openSUSE Leap 42.1:qemu-seabios-1.8.1-15.1
openSUSE Leap 42.1:qemu-sgabios-8-15.1
openSUSE Leap 42.1:qemu-testsuite-2.3.1-15.2
openSUSE Leap 42.1:qemu-tools-2.3.1-15.1
openSUSE Leap 42.1:qemu-vgabios-1.8.1-15.1
openSUSE Leap 42.1:qemu-x86-2.3.1-15.1
moderate
3.5
AV:L/AC:H/Au:S/C:P/I:P/A:P
Please Install the update.
https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html
https://www.suse.com/security/cve/CVE-2016-3710.html
CVE-2016-3710
https://bugzilla.suse.com/978158
SUSE Bug 978158
https://bugzilla.suse.com/978164
SUSE Bug 978164
https://bugzilla.suse.com/978167
SUSE Bug 978167
Integer overflow in the VGA module in QEMU allows local guest OS users to cause a denial of service (out-of-bounds read and QEMU process crash) by editing VGA registers in VBE mode.
CVE-2016-3712
openSUSE Leap 42.1:qemu-2.3.1-15.1
openSUSE Leap 42.1:qemu-arm-2.3.1-15.1
openSUSE Leap 42.1:qemu-block-curl-2.3.1-15.1
openSUSE Leap 42.1:qemu-block-rbd-2.3.1-15.1
openSUSE Leap 42.1:qemu-extra-2.3.1-15.1
openSUSE Leap 42.1:qemu-guest-agent-2.3.1-15.1
openSUSE Leap 42.1:qemu-ipxe-1.0.0-15.1
openSUSE Leap 42.1:qemu-kvm-2.3.1-15.1
openSUSE Leap 42.1:qemu-lang-2.3.1-15.1
openSUSE Leap 42.1:qemu-linux-user-2.3.1-15.1
openSUSE Leap 42.1:qemu-ppc-2.3.1-15.1
openSUSE Leap 42.1:qemu-s390-2.3.1-15.1
openSUSE Leap 42.1:qemu-seabios-1.8.1-15.1
openSUSE Leap 42.1:qemu-sgabios-8-15.1
openSUSE Leap 42.1:qemu-testsuite-2.3.1-15.2
openSUSE Leap 42.1:qemu-tools-2.3.1-15.1
openSUSE Leap 42.1:qemu-vgabios-1.8.1-15.1
openSUSE Leap 42.1:qemu-x86-2.3.1-15.1
moderate
1.5
AV:L/AC:M/Au:S/C:N/I:N/A:P
Please Install the update.
https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html
https://www.suse.com/security/cve/CVE-2016-3712.html
CVE-2016-3712
https://bugzilla.suse.com/978160
SUSE Bug 978160
https://bugzilla.suse.com/978164
SUSE Bug 978164
https://bugzilla.suse.com/978167
SUSE Bug 978167
Buffer overflow in the stellaris_enet_receive function in hw/net/stellaris_enet.c in QEMU, when the Stellaris ethernet controller is configured to accept large packets, allows remote attackers to cause a denial of service (QEMU crash) via a large packet.
CVE-2016-4001
openSUSE Leap 42.1:qemu-2.3.1-15.1
openSUSE Leap 42.1:qemu-arm-2.3.1-15.1
openSUSE Leap 42.1:qemu-block-curl-2.3.1-15.1
openSUSE Leap 42.1:qemu-block-rbd-2.3.1-15.1
openSUSE Leap 42.1:qemu-extra-2.3.1-15.1
openSUSE Leap 42.1:qemu-guest-agent-2.3.1-15.1
openSUSE Leap 42.1:qemu-ipxe-1.0.0-15.1
openSUSE Leap 42.1:qemu-kvm-2.3.1-15.1
openSUSE Leap 42.1:qemu-lang-2.3.1-15.1
openSUSE Leap 42.1:qemu-linux-user-2.3.1-15.1
openSUSE Leap 42.1:qemu-ppc-2.3.1-15.1
openSUSE Leap 42.1:qemu-s390-2.3.1-15.1
openSUSE Leap 42.1:qemu-seabios-1.8.1-15.1
openSUSE Leap 42.1:qemu-sgabios-8-15.1
openSUSE Leap 42.1:qemu-testsuite-2.3.1-15.2
openSUSE Leap 42.1:qemu-tools-2.3.1-15.1
openSUSE Leap 42.1:qemu-vgabios-1.8.1-15.1
openSUSE Leap 42.1:qemu-x86-2.3.1-15.1
moderate
5
AV:N/AC:L/Au:N/C:N/I:N/A:P
Please Install the update.
https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html
https://www.suse.com/security/cve/CVE-2016-4001.html
CVE-2016-4001
https://bugzilla.suse.com/975128
SUSE Bug 975128
https://bugzilla.suse.com/975130
SUSE Bug 975130
Buffer overflow in the mipsnet_receive function in hw/net/mipsnet.c in QEMU, when the guest NIC is configured to accept large packets, allows remote attackers to cause a denial of service (memory corruption and QEMU crash) or possibly execute arbitrary code via a packet larger than 1514 bytes.
CVE-2016-4002
openSUSE Leap 42.1:qemu-2.3.1-15.1
openSUSE Leap 42.1:qemu-arm-2.3.1-15.1
openSUSE Leap 42.1:qemu-block-curl-2.3.1-15.1
openSUSE Leap 42.1:qemu-block-rbd-2.3.1-15.1
openSUSE Leap 42.1:qemu-extra-2.3.1-15.1
openSUSE Leap 42.1:qemu-guest-agent-2.3.1-15.1
openSUSE Leap 42.1:qemu-ipxe-1.0.0-15.1
openSUSE Leap 42.1:qemu-kvm-2.3.1-15.1
openSUSE Leap 42.1:qemu-lang-2.3.1-15.1
openSUSE Leap 42.1:qemu-linux-user-2.3.1-15.1
openSUSE Leap 42.1:qemu-ppc-2.3.1-15.1
openSUSE Leap 42.1:qemu-s390-2.3.1-15.1
openSUSE Leap 42.1:qemu-seabios-1.8.1-15.1
openSUSE Leap 42.1:qemu-sgabios-8-15.1
openSUSE Leap 42.1:qemu-testsuite-2.3.1-15.2
openSUSE Leap 42.1:qemu-tools-2.3.1-15.1
openSUSE Leap 42.1:qemu-vgabios-1.8.1-15.1
openSUSE Leap 42.1:qemu-x86-2.3.1-15.1
moderate
5
AV:N/AC:L/Au:N/C:N/I:N/A:P
Please Install the update.
https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html
https://www.suse.com/security/cve/CVE-2016-4002.html
CVE-2016-4002
https://bugzilla.suse.com/975136
SUSE Bug 975136
https://bugzilla.suse.com/975138
SUSE Bug 975138
The patch_instruction function in hw/i386/kvmvapic.c in QEMU does not initialize the imm32 variable, which allows local guest OS administrators to obtain sensitive information from host stack memory by accessing the Task Priority Register (TPR).
CVE-2016-4020
openSUSE Leap 42.1:qemu-2.3.1-15.1
openSUSE Leap 42.1:qemu-arm-2.3.1-15.1
openSUSE Leap 42.1:qemu-block-curl-2.3.1-15.1
openSUSE Leap 42.1:qemu-block-rbd-2.3.1-15.1
openSUSE Leap 42.1:qemu-extra-2.3.1-15.1
openSUSE Leap 42.1:qemu-guest-agent-2.3.1-15.1
openSUSE Leap 42.1:qemu-ipxe-1.0.0-15.1
openSUSE Leap 42.1:qemu-kvm-2.3.1-15.1
openSUSE Leap 42.1:qemu-lang-2.3.1-15.1
openSUSE Leap 42.1:qemu-linux-user-2.3.1-15.1
openSUSE Leap 42.1:qemu-ppc-2.3.1-15.1
openSUSE Leap 42.1:qemu-s390-2.3.1-15.1
openSUSE Leap 42.1:qemu-seabios-1.8.1-15.1
openSUSE Leap 42.1:qemu-sgabios-8-15.1
openSUSE Leap 42.1:qemu-testsuite-2.3.1-15.2
openSUSE Leap 42.1:qemu-tools-2.3.1-15.1
openSUSE Leap 42.1:qemu-vgabios-1.8.1-15.1
openSUSE Leap 42.1:qemu-x86-2.3.1-15.1
low
1.5
AV:L/AC:M/Au:S/C:P/I:N/A:N
Please Install the update.
https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html
https://www.suse.com/security/cve/CVE-2016-4020.html
CVE-2016-4020
https://bugzilla.suse.com/975700
SUSE Bug 975700
https://bugzilla.suse.com/975907
SUSE Bug 975907
The ehci_advance_state function in hw/usb/hcd-ehci.c in QEMU allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via a circular split isochronous transfer descriptor (siTD) list, a related issue to CVE-2015-8558.
CVE-2016-4037
openSUSE Leap 42.1:qemu-2.3.1-15.1
openSUSE Leap 42.1:qemu-arm-2.3.1-15.1
openSUSE Leap 42.1:qemu-block-curl-2.3.1-15.1
openSUSE Leap 42.1:qemu-block-rbd-2.3.1-15.1
openSUSE Leap 42.1:qemu-extra-2.3.1-15.1
openSUSE Leap 42.1:qemu-guest-agent-2.3.1-15.1
openSUSE Leap 42.1:qemu-ipxe-1.0.0-15.1
openSUSE Leap 42.1:qemu-kvm-2.3.1-15.1
openSUSE Leap 42.1:qemu-lang-2.3.1-15.1
openSUSE Leap 42.1:qemu-linux-user-2.3.1-15.1
openSUSE Leap 42.1:qemu-ppc-2.3.1-15.1
openSUSE Leap 42.1:qemu-s390-2.3.1-15.1
openSUSE Leap 42.1:qemu-seabios-1.8.1-15.1
openSUSE Leap 42.1:qemu-sgabios-8-15.1
openSUSE Leap 42.1:qemu-testsuite-2.3.1-15.2
openSUSE Leap 42.1:qemu-tools-2.3.1-15.1
openSUSE Leap 42.1:qemu-vgabios-1.8.1-15.1
openSUSE Leap 42.1:qemu-x86-2.3.1-15.1
low
1.5
AV:L/AC:M/Au:S/C:N/I:N/A:P
Please Install the update.
https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html
https://www.suse.com/security/cve/CVE-2016-4037.html
CVE-2016-4037
https://bugzilla.suse.com/959005
SUSE Bug 959005
https://bugzilla.suse.com/959006
SUSE Bug 959006
https://bugzilla.suse.com/976109
SUSE Bug 976109
https://bugzilla.suse.com/976111
SUSE Bug 976111
The esp_reg_write function in hw/scsi/esp.c in the 53C9X Fast SCSI Controller (FSC) support in QEMU does not properly check command buffer length, which allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or potentially execute arbitrary code on the QEMU host via unspecified vectors.
CVE-2016-4439
openSUSE Leap 42.1:qemu-2.3.1-15.1
openSUSE Leap 42.1:qemu-arm-2.3.1-15.1
openSUSE Leap 42.1:qemu-block-curl-2.3.1-15.1
openSUSE Leap 42.1:qemu-block-rbd-2.3.1-15.1
openSUSE Leap 42.1:qemu-extra-2.3.1-15.1
openSUSE Leap 42.1:qemu-guest-agent-2.3.1-15.1
openSUSE Leap 42.1:qemu-ipxe-1.0.0-15.1
openSUSE Leap 42.1:qemu-kvm-2.3.1-15.1
openSUSE Leap 42.1:qemu-lang-2.3.1-15.1
openSUSE Leap 42.1:qemu-linux-user-2.3.1-15.1
openSUSE Leap 42.1:qemu-ppc-2.3.1-15.1
openSUSE Leap 42.1:qemu-s390-2.3.1-15.1
openSUSE Leap 42.1:qemu-seabios-1.8.1-15.1
openSUSE Leap 42.1:qemu-sgabios-8-15.1
openSUSE Leap 42.1:qemu-testsuite-2.3.1-15.2
openSUSE Leap 42.1:qemu-tools-2.3.1-15.1
openSUSE Leap 42.1:qemu-vgabios-1.8.1-15.1
openSUSE Leap 42.1:qemu-x86-2.3.1-15.1
moderate
3.5
AV:L/AC:H/Au:S/C:P/I:P/A:P
Please Install the update.
https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html
https://www.suse.com/security/cve/CVE-2016-4439.html
CVE-2016-4439
https://bugzilla.suse.com/980711
SUSE Bug 980711
https://bugzilla.suse.com/980716
SUSE Bug 980716
The get_cmd function in hw/scsi/esp.c in the 53C9X Fast SCSI Controller (FSC) support in QEMU does not properly check DMA length, which allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via unspecified vectors, involving an SCSI command.
CVE-2016-4441
openSUSE Leap 42.1:qemu-2.3.1-15.1
openSUSE Leap 42.1:qemu-arm-2.3.1-15.1
openSUSE Leap 42.1:qemu-block-curl-2.3.1-15.1
openSUSE Leap 42.1:qemu-block-rbd-2.3.1-15.1
openSUSE Leap 42.1:qemu-extra-2.3.1-15.1
openSUSE Leap 42.1:qemu-guest-agent-2.3.1-15.1
openSUSE Leap 42.1:qemu-ipxe-1.0.0-15.1
openSUSE Leap 42.1:qemu-kvm-2.3.1-15.1
openSUSE Leap 42.1:qemu-lang-2.3.1-15.1
openSUSE Leap 42.1:qemu-linux-user-2.3.1-15.1
openSUSE Leap 42.1:qemu-ppc-2.3.1-15.1
openSUSE Leap 42.1:qemu-s390-2.3.1-15.1
openSUSE Leap 42.1:qemu-seabios-1.8.1-15.1
openSUSE Leap 42.1:qemu-sgabios-8-15.1
openSUSE Leap 42.1:qemu-testsuite-2.3.1-15.2
openSUSE Leap 42.1:qemu-tools-2.3.1-15.1
openSUSE Leap 42.1:qemu-vgabios-1.8.1-15.1
openSUSE Leap 42.1:qemu-x86-2.3.1-15.1
moderate
3.5
AV:L/AC:H/Au:S/C:P/I:P/A:P
Please Install the update.
https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html
https://www.suse.com/security/cve/CVE-2016-4441.html
CVE-2016-4441
https://bugzilla.suse.com/980723
SUSE Bug 980723
https://bugzilla.suse.com/980724
SUSE Bug 980724
QEMU (aka Quick Emulator), when built with VMWARE PVSCSI paravirtual SCSI bus emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds array access) via vectors related to the (1) PVSCSI_CMD_SETUP_RINGS or (2) PVSCSI_CMD_SETUP_MSG_RING SCSI command.
CVE-2016-4952
openSUSE Leap 42.1:qemu-2.3.1-15.1
openSUSE Leap 42.1:qemu-arm-2.3.1-15.1
openSUSE Leap 42.1:qemu-block-curl-2.3.1-15.1
openSUSE Leap 42.1:qemu-block-rbd-2.3.1-15.1
openSUSE Leap 42.1:qemu-extra-2.3.1-15.1
openSUSE Leap 42.1:qemu-guest-agent-2.3.1-15.1
openSUSE Leap 42.1:qemu-ipxe-1.0.0-15.1
openSUSE Leap 42.1:qemu-kvm-2.3.1-15.1
openSUSE Leap 42.1:qemu-lang-2.3.1-15.1
openSUSE Leap 42.1:qemu-linux-user-2.3.1-15.1
openSUSE Leap 42.1:qemu-ppc-2.3.1-15.1
openSUSE Leap 42.1:qemu-s390-2.3.1-15.1
openSUSE Leap 42.1:qemu-seabios-1.8.1-15.1
openSUSE Leap 42.1:qemu-sgabios-8-15.1
openSUSE Leap 42.1:qemu-testsuite-2.3.1-15.2
openSUSE Leap 42.1:qemu-tools-2.3.1-15.1
openSUSE Leap 42.1:qemu-vgabios-1.8.1-15.1
openSUSE Leap 42.1:qemu-x86-2.3.1-15.1
moderate
3
AV:L/AC:M/Au:S/C:N/I:P/A:P
Please Install the update.
https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html
https://www.suse.com/security/cve/CVE-2016-4952.html
CVE-2016-4952
https://bugzilla.suse.com/981266
SUSE Bug 981266
https://bugzilla.suse.com/981276
SUSE Bug 981276