SUSE Security Update: Security update for kvm
______________________________________________________________________________

Announcement ID:    SUSE-SU-2012:1205-1
Rating:             important
References:         #770153 #772586 #777084 
Cross-References:   CVE-2012-3515
Affected Products:
                    SUSE Linux Enterprise Server 11 SP2
                    SUSE Linux Enterprise Desktop 11 SP2
______________________________________________________________________________

   An update that solves one vulnerability and has two fixes
   is now available.

Description:


   The kvm qemu vt100 emulation was affected by a problem
   where specific vt100  sequences could have been used by
   guest users to affect the host.  (CVE-2012-3515 aka XSA-17).

   Also the following non security bugs have been fixed:

   * permit qemu-kvm -device "?" even when no /dev/kvm
   (bnc#772586)
   * SLES11SP2 KVM Virtio: on kvm guest, scsi inquiry was
   still ok on the disabled subpaths. (bnc#770153)

   Security Issue reference:

   * CVE-2012-3515
   


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Server 11 SP2:

      zypper in -t patch slessp2-kvm-6755

   - SUSE Linux Enterprise Desktop 11 SP2:

      zypper in -t patch sledsp2-kvm-6755

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Server 11 SP2 (i586 x86_64):

      kvm-0.15.1-0.23.1

   - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64):

      kvm-0.15.1-0.23.1


References:

   https://www.suse.com/security/cve/CVE-2012-3515.html
   https://bugzilla.novell.com/770153
   https://bugzilla.novell.com/772586
   https://bugzilla.novell.com/777084
   https://login.microfocus.com/nidp/app/login

SuSE: 2012:1205-1: important: kvm

September 18, 2012
An update that solves one vulnerability and has two fixes An update that solves one vulnerability and has two fixes An update that solves one vulnerability and has two fixes is now...

Summary

The kvm qemu vt100 emulation was affected by a problem where specific vt100 sequences could have been used by guest users to affect the host. (CVE-2012-3515 aka XSA-17). Also the following non security bugs have been fixed: * permit qemu-kvm -device "?" even when no /dev/kvm (bnc#772586) * SLES11SP2 KVM Virtio: on kvm guest, scsi inquiry was still ok on the disabled subpaths. (bnc#770153) Security Issue reference: * CVE-2012-3515 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp2-kvm-6755 - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp2-kvm-6755 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP2 (i586 x86_64): kvm-0.15.1-0.23.1 - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64): kvm-0.15.1-0.23.1

References

#770153 #772586 #777084

Cross- CVE-2012-3515

Affected Products:

SUSE Linux Enterprise Server 11 SP2

SUSE Linux Enterprise Desktop 11 SP2

https://www.suse.com/security/cve/CVE-2012-3515.html

https://bugzilla.novell.com/770153

https://bugzilla.novell.com/772586

https://bugzilla.novell.com/777084

https://login.microfocus.com/nidp/app/login

Severity
Announcement ID: SUSE-SU-2012:1205-1
Rating: important

Related News