Búsqueda de    
Vulnerabilidad   
    Buscar 219043 Descripciones CVE y
99761 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.850916
Categoría:SuSE Local Security Checks
Título:SUSE: Security Advisory for qemu (SUSE-SU-2015:0896-1)
Resumen:The remote host is missing an update for the 'qemu'; package(s) announced via the referenced advisory.
Descripción:Summary:
The remote host is missing an update for the 'qemu'
package(s) announced via the referenced advisory.

Vulnerability Insight:
qemu / kvm was updated to fix a security issue and some bugs.

Security issue fixed:

* CVE-2015-3456: Fixed a buffer overflow in the floppy drive emulation,
which could be used to denial of service attacks or potential code
execution against the host.

* CVE-2015-1779: Fixed insufficient resource limiting in the VNC
websockets decoder.


Bugs fixed:

- qemu truncates vhd images in virt-rescue (bsc#886378)

- Update kvm-supported.txt with the current rbd support status.

- enable rbd build on x86_64 (qemu-block-rbd package) (FATE#318349)

Affected Software/OS:
qemu on SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Desktop 12

Solution:
Please install the updated package(s).

CVSS Score:
7.8

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2015-1779
BugTraq ID: 73303
http://www.securityfocus.com/bid/73303
Debian Security Information: DSA-3259 (Google Search)
http://www.debian.org/security/2015/dsa-3259
http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154656.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155196.html
https://security.gentoo.org/glsa/201602-01
https://lists.gnu.org/archive/html/qemu-devel/2015-03/msg04894.html
https://lists.gnu.org/archive/html/qemu-devel/2015-03/msg04896.html
https://lists.gnu.org/archive/html/qemu-devel/2015-03/msg04895.html
http://www.openwall.com/lists/oss-security/2015/03/24/9
http://www.openwall.com/lists/oss-security/2015/04/09/6
RedHat Security Advisories: RHSA-2015:1931
http://rhn.redhat.com/errata/RHSA-2015-1931.html
RedHat Security Advisories: RHSA-2015:1943
http://rhn.redhat.com/errata/RHSA-2015-1943.html
http://www.securitytracker.com/id/1033975
SuSE Security Announcement: SUSE-SU-2015:0870 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00033.html
SuSE Security Announcement: SUSE-SU-2015:0896 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00042.html
http://www.ubuntu.com/usn/USN-2608-1
Common Vulnerability Exposure (CVE) ID: CVE-2015-3456
BugTraq ID: 74640
http://www.securityfocus.com/bid/74640
Debian Security Information: DSA-3262 (Google Search)
http://www.debian.org/security/2015/dsa-3262
Debian Security Information: DSA-3274 (Google Search)
http://www.debian.org/security/2015/dsa-3274
https://www.exploit-db.com/exploits/37053/
http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158072.html
https://security.gentoo.org/glsa/201604-03
https://security.gentoo.org/glsa/201612-27
HPdes Security Advisory: HPSBMU03336
http://marc.info/?l=bugtraq&m=143229451215900&w=2
HPdes Security Advisory: HPSBMU03349
http://marc.info/?l=bugtraq&m=143387998230996&w=2
HPdes Security Advisory: SSRT102076
http://venom.crowdstrike.com/
RedHat Security Advisories: RHSA-2015:0998
http://rhn.redhat.com/errata/RHSA-2015-0998.html
RedHat Security Advisories: RHSA-2015:0999
http://rhn.redhat.com/errata/RHSA-2015-0999.html
RedHat Security Advisories: RHSA-2015:1000
http://rhn.redhat.com/errata/RHSA-2015-1000.html
RedHat Security Advisories: RHSA-2015:1001
http://rhn.redhat.com/errata/RHSA-2015-1001.html
RedHat Security Advisories: RHSA-2015:1002
http://rhn.redhat.com/errata/RHSA-2015-1002.html
RedHat Security Advisories: RHSA-2015:1003
http://rhn.redhat.com/errata/RHSA-2015-1003.html
RedHat Security Advisories: RHSA-2015:1004
http://rhn.redhat.com/errata/RHSA-2015-1004.html
RedHat Security Advisories: RHSA-2015:1011
http://rhn.redhat.com/errata/RHSA-2015-1011.html
http://www.securitytracker.com/id/1032306
http://www.securitytracker.com/id/1032311
http://www.securitytracker.com/id/1032917
SuSE Security Announcement: SUSE-SU-2015:0889 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00009.html
SuSE Security Announcement: SUSE-SU-2015:0923 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00018.html
SuSE Security Announcement: SUSE-SU-2015:0927 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00019.html
SuSE Security Announcement: SUSE-SU-2015:0929 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00021.html
SuSE Security Announcement: openSUSE-SU-2015:0893 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00013.html
SuSE Security Announcement: openSUSE-SU-2015:0894 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00014.html
SuSE Security Announcement: openSUSE-SU-2015:0983 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00001.html
SuSE Security Announcement: openSUSE-SU-2015:1400 (Google Search)
http://lists.opensuse.org/opensuse-updates/2015-08/msg00021.html
CopyrightCopyright (C) 2015 Greenbone Networks GmbH

Esta es sólo una de 99761 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2024 E-Soft Inc. Todos los derechos reservados.