{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"moderate"},"category":"csaf_security_advisory","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"Security update for kvm","title":"Title of the patch"},{"category":"description","text":"\nThe kvm qemu vt100 emulation was affected by a problem where specific vt100 \nsequences could have been used by guest users to affect the host. \n(CVE-2012-3515 aka XSA-17).\n\nAlso a temp file race was fixed. (CVE-2012-2652)\n\nSecurity Issue reference:\n\n    * CVE-2012-3515\n      <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3515>\n    * CVE-2012-2652\n      <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2652>\n\n","title":"Description of the patch"},{"category":"details","text":"slessp1-kvm","title":"Patchnames"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"SUSE ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"self","summary":"URL of this CSAF notice","url":"https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_0929-1.json"},{"category":"self","summary":"URL for SUSE-SU-2015:0929-1","url":"https://www.suse.com/support/update/announcement/2015/suse-su-20150929-1/"},{"category":"self","summary":"E-Mail link for SUSE-SU-2015:0929-1","url":"https://lists.suse.com/pipermail/sle-security-updates/2015-May/001402.html"},{"category":"self","summary":"SUSE Bug 598271","url":"https://bugzilla.suse.com/598271"},{"category":"self","summary":"SUSE Bug 598298","url":"https://bugzilla.suse.com/598298"},{"category":"self","summary":"SUSE Bug 599095","url":"https://bugzilla.suse.com/599095"},{"category":"self","summary":"SUSE Bug 603161","url":"https://bugzilla.suse.com/603161"},{"category":"self","summary":"SUSE Bug 603179","url":"https://bugzilla.suse.com/603179"},{"category":"self","summary":"SUSE Bug 610682","url":"https://bugzilla.suse.com/610682"},{"category":"self","summary":"SUSE Bug 619991","url":"https://bugzilla.suse.com/619991"},{"category":"self","summary":"SUSE Bug 621793","url":"https://bugzilla.suse.com/621793"},{"category":"self","summary":"SUSE Bug 626654","url":"https://bugzilla.suse.com/626654"},{"category":"self","summary":"SUSE Bug 637297","url":"https://bugzilla.suse.com/637297"},{"category":"self","summary":"SUSE Bug 689895","url":"https://bugzilla.suse.com/689895"},{"category":"self","summary":"SUSE Bug 690781","url":"https://bugzilla.suse.com/690781"},{"category":"self","summary":"SUSE Bug 695510","url":"https://bugzilla.suse.com/695510"},{"category":"self","summary":"SUSE Bug 695766","url":"https://bugzilla.suse.com/695766"},{"category":"self","summary":"SUSE Bug 698237","url":"https://bugzilla.suse.com/698237"},{"category":"self","summary":"SUSE Bug 701161","url":"https://bugzilla.suse.com/701161"},{"category":"self","summary":"SUSE Bug 702823","url":"https://bugzilla.suse.com/702823"},{"category":"self","summary":"SUSE Bug 704933","url":"https://bugzilla.suse.com/704933"},{"category":"self","summary":"SUSE Bug 705095","url":"https://bugzilla.suse.com/705095"},{"category":"self","summary":"SUSE Bug 705304","url":"https://bugzilla.suse.com/705304"},{"category":"self","summary":"SUSE Bug 740165","url":"https://bugzilla.suse.com/740165"},{"category":"self","summary":"SUSE Bug 764526","url":"https://bugzilla.suse.com/764526"},{"category":"self","summary":"SUSE Bug 777084","url":"https://bugzilla.suse.com/777084"},{"category":"self","summary":"SUSE Bug 877642","url":"https://bugzilla.suse.com/877642"},{"category":"self","summary":"SUSE Bug 877645","url":"https://bugzilla.suse.com/877645"},{"category":"self","summary":"SUSE Bug 929339","url":"https://bugzilla.suse.com/929339"},{"category":"self","summary":"SUSE Bug 932770","url":"https://bugzilla.suse.com/932770"},{"category":"self","summary":"SUSE CVE CVE-2011-1750 page","url":"https://www.suse.com/security/cve/CVE-2011-1750/"},{"category":"self","summary":"SUSE CVE CVE-2011-1751 page","url":"https://www.suse.com/security/cve/CVE-2011-1751/"},{"category":"self","summary":"SUSE CVE CVE-2011-2212 page","url":"https://www.suse.com/security/cve/CVE-2011-2212/"},{"category":"self","summary":"SUSE CVE CVE-2011-2512 page","url":"https://www.suse.com/security/cve/CVE-2011-2512/"},{"category":"self","summary":"SUSE CVE CVE-2011-2527 page","url":"https://www.suse.com/security/cve/CVE-2011-2527/"},{"category":"self","summary":"SUSE CVE CVE-2012-0029 page","url":"https://www.suse.com/security/cve/CVE-2012-0029/"},{"category":"self","summary":"SUSE CVE CVE-2012-2652 page","url":"https://www.suse.com/security/cve/CVE-2012-2652/"},{"category":"self","summary":"SUSE CVE CVE-2012-3515 page","url":"https://www.suse.com/security/cve/CVE-2012-3515/"},{"category":"self","summary":"SUSE CVE CVE-2014-0222 page","url":"https://www.suse.com/security/cve/CVE-2014-0222/"},{"category":"self","summary":"SUSE CVE CVE-2014-0223 page","url":"https://www.suse.com/security/cve/CVE-2014-0223/"},{"category":"self","summary":"SUSE CVE CVE-2015-3209 page","url":"https://www.suse.com/security/cve/CVE-2015-3209/"},{"category":"self","summary":"SUSE CVE CVE-2015-3456 page","url":"https://www.suse.com/security/cve/CVE-2015-3456/"}],"title":"Security update for kvm","tracking":{"current_release_date":"2012-08-31T14:36:20Z","generator":{"date":"2012-08-31T14:36:20Z","engine":{"name":"cve-database.git:bin/generate-csaf.pl","version":"1"}},"id":"SUSE-SU-2015:0929-1","initial_release_date":"2012-08-31T14:36:20Z","revision_history":[{"date":"2012-08-31T14:36:20Z","number":"1","summary":"Current version"}],"status":"final","version":"1"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_version","name":"kvm-0.12.5-1.24.1.i586","product":{"name":"kvm-0.12.5-1.24.1.i586","product_id":"kvm-0.12.5-1.24.1.i586"}}],"category":"architecture","name":"i586"},{"branches":[{"category":"product_version","name":"kvm-0.12.5-1.24.1.x86_64","product":{"name":"kvm-0.12.5-1.24.1.x86_64","product_id":"kvm-0.12.5-1.24.1.x86_64"}}],"category":"architecture","name":"x86_64"},{"branches":[{"category":"product_name","name":"SUSE Linux Enterprise Server 11 SP1-LTSS","product":{"name":"SUSE Linux Enterprise Server 11 SP1-LTSS","product_id":"SUSE Linux Enterprise Server 11 SP1-LTSS","product_identification_helper":{"cpe":"cpe:/o:suse:suse_sles_ltss:11:sp1"}}},{"category":"product_name","name":"SUSE Linux Enterprise Server 11 SP1-TERADATA","product":{"name":"SUSE Linux Enterprise Server 11 SP1-TERADATA","product_id":"SUSE Linux Enterprise Server 11 SP1-TERADATA","product_identification_helper":{"cpe":"cpe:/o:suse:sles:11:sp1:teradata"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"kvm-0.12.5-1.24.1.i586 as component of SUSE Linux Enterprise Server 11 SP1-LTSS","product_id":"SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586"},"product_reference":"kvm-0.12.5-1.24.1.i586","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP1-LTSS"},{"category":"default_component_of","full_product_name":{"name":"kvm-0.12.5-1.24.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP1-LTSS","product_id":"SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64"},"product_reference":"kvm-0.12.5-1.24.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP1-LTSS"},{"category":"default_component_of","full_product_name":{"name":"kvm-0.12.5-1.24.1.i586 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA","product_id":"SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586"},"product_reference":"kvm-0.12.5-1.24.1.i586","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP1-TERADATA"},{"category":"default_component_of","full_product_name":{"name":"kvm-0.12.5-1.24.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA","product_id":"SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64"},"product_reference":"kvm-0.12.5-1.24.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP1-TERADATA"}]},"vulnerabilities":[{"cve":"CVE-2011-1750","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2011-1750"}],"notes":[{"category":"general","text":"Multiple heap-based buffer overflows in the virtio-blk driver (hw/virtio-blk.c) in qemu-kvm 0.14.0 allow local guest users to cause a denial of service (guest crash) and possibly gain privileges via a (1) write request to the virtio_blk_handle_write function or (2) read request to the virtio_blk_handle_read function that is not properly aligned.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586","SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64","SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586","SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2011-1750","url":"https://www.suse.com/security/cve/CVE-2011-1750"},{"category":"external","summary":"SUSE Bug 689895 for CVE-2011-1750","url":"https://bugzilla.suse.com/689895"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586","SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64","SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586","SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64"]}],"threats":[{"category":"impact","date":"2012-08-31T14:36:20Z","details":"important"}],"title":"CVE-2011-1750"},{"cve":"CVE-2011-1751","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2011-1751"}],"notes":[{"category":"general","text":"The pciej_write function in hw/acpi_piix4.c in the PIIX4 Power Management emulation in qemu-kvm does not check if a device is hotpluggable before unplugging the PCI-ISA bridge, which allows privileged guest users to cause a denial of service (guest crash) and possibly execute arbitrary code by sending a crafted value to the 0xae08 (PCI_EJ_BASE) I/O port, which leads to a use-after-free related to \"active qemu timers.\"","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586","SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64","SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586","SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2011-1751","url":"https://www.suse.com/security/cve/CVE-2011-1751"},{"category":"external","summary":"SUSE Bug 690781 for CVE-2011-1751","url":"https://bugzilla.suse.com/690781"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586","SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64","SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586","SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64"]}],"threats":[{"category":"impact","date":"2012-08-31T14:36:20Z","details":"important"}],"title":"CVE-2011-1751"},{"cve":"CVE-2011-2212","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2011-2212"}],"notes":[{"category":"general","text":"Buffer overflow in the virtio subsystem in qemu-kvm 0.14.0 and earlier allows privileged guest users to cause a denial of service (guest crash) or gain privileges via a crafted indirect descriptor related to \"virtqueue in and out requests.\"","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586","SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64","SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586","SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2011-2212","url":"https://www.suse.com/security/cve/CVE-2011-2212"},{"category":"external","summary":"SUSE Bug 701161 for CVE-2011-2212","url":"https://bugzilla.suse.com/701161"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586","SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64","SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586","SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64"]}],"threats":[{"category":"impact","date":"2012-08-31T14:36:20Z","details":"important"}],"title":"CVE-2011-2212"},{"cve":"CVE-2011-2512","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2011-2512"}],"notes":[{"category":"general","text":"The virtio_queue_notify in qemu-kvm 0.14.0 and earlier does not properly validate the virtqueue number, which allows guest users to cause a denial of service (guest crash) and possibly execute arbitrary code via a negative number in the Queue Notify field of the Virtio Header, which bypasses a signed comparison.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586","SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64","SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586","SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2011-2512","url":"https://www.suse.com/security/cve/CVE-2011-2512"},{"category":"external","summary":"SUSE Bug 702823 for CVE-2011-2512","url":"https://bugzilla.suse.com/702823"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586","SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64","SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586","SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64"]}],"threats":[{"category":"impact","date":"2012-08-31T14:36:20Z","details":"moderate"}],"title":"CVE-2011-2512"},{"cve":"CVE-2011-2527","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2011-2527"}],"notes":[{"category":"general","text":"The change_process_uid function in os-posix.c in Qemu 0.14.0 and earlier does not properly drop group privileges when the -runas option is used, which allows local guest users to access restricted files on the host.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586","SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64","SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586","SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2011-2527","url":"https://www.suse.com/security/cve/CVE-2011-2527"},{"category":"external","summary":"SUSE Bug 705304 for CVE-2011-2527","url":"https://bugzilla.suse.com/705304"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586","SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64","SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586","SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64"]}],"threats":[{"category":"impact","date":"2012-08-31T14:36:20Z","details":"low"}],"title":"CVE-2011-2527"},{"cve":"CVE-2012-0029","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2012-0029"}],"notes":[{"category":"general","text":"Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586","SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64","SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586","SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2012-0029","url":"https://www.suse.com/security/cve/CVE-2012-0029"},{"category":"external","summary":"SUSE Bug 740165 for CVE-2012-0029","url":"https://bugzilla.suse.com/740165"},{"category":"external","summary":"SUSE Bug 747331 for CVE-2012-0029","url":"https://bugzilla.suse.com/747331"},{"category":"external","summary":"SUSE Bug 757537 for CVE-2012-0029","url":"https://bugzilla.suse.com/757537"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586","SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64","SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586","SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64"]}],"threats":[{"category":"impact","date":"2012-08-31T14:36:20Z","details":"important"}],"title":"CVE-2012-0029"},{"cve":"CVE-2012-2652","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2012-2652"}],"notes":[{"category":"general","text":"The bdrv_open function in Qemu 1.0 does not properly handle the failure of the mkstemp function, when in snapshot node, which allows local users to overwrite or read arbitrary files via a symlink attack on an unspecified temporary file.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586","SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64","SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586","SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2012-2652","url":"https://www.suse.com/security/cve/CVE-2012-2652"},{"category":"external","summary":"SUSE Bug 764526 for CVE-2012-2652","url":"https://bugzilla.suse.com/764526"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586","SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64","SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586","SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64"]}],"threats":[{"category":"impact","date":"2012-08-31T14:36:20Z","details":"moderate"}],"title":"CVE-2012-2652"},{"cve":"CVE-2012-3515","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2012-3515"}],"notes":[{"category":"general","text":"Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a \"device model's address space.\"","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586","SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64","SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586","SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2012-3515","url":"https://www.suse.com/security/cve/CVE-2012-3515"},{"category":"external","summary":"SUSE Bug 777084 for CVE-2012-3515","url":"https://bugzilla.suse.com/777084"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586","SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64","SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586","SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64"]}],"threats":[{"category":"impact","date":"2012-08-31T14:36:20Z","details":"important"}],"title":"CVE-2012-3515"},{"cve":"CVE-2014-0222","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2014-0222"}],"notes":[{"category":"general","text":"Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586","SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64","SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586","SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2014-0222","url":"https://www.suse.com/security/cve/CVE-2014-0222"},{"category":"external","summary":"SUSE Bug 1072223 for CVE-2014-0222","url":"https://bugzilla.suse.com/1072223"},{"category":"external","summary":"SUSE Bug 877642 for CVE-2014-0222","url":"https://bugzilla.suse.com/877642"},{"category":"external","summary":"SUSE Bug 950367 for CVE-2014-0222","url":"https://bugzilla.suse.com/950367"},{"category":"external","summary":"SUSE Bug 964925 for CVE-2014-0222","url":"https://bugzilla.suse.com/964925"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586","SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64","SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586","SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64"]}],"threats":[{"category":"impact","date":"2012-08-31T14:36:20Z","details":"moderate"}],"title":"CVE-2014-0222"},{"cve":"CVE-2014-0223","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2014-0223"}],"notes":[{"category":"general","text":"Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a large image size, which triggers a buffer overflow or out-of-bounds read.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586","SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64","SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586","SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2014-0223","url":"https://www.suse.com/security/cve/CVE-2014-0223"},{"category":"external","summary":"SUSE Bug 877645 for CVE-2014-0223","url":"https://bugzilla.suse.com/877645"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586","SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64","SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586","SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64"]}],"threats":[{"category":"impact","date":"2012-08-31T14:36:20Z","details":"moderate"}],"title":"CVE-2014-0223"},{"cve":"CVE-2015-3209","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2015-3209"}],"notes":[{"category":"general","text":"Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586","SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64","SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586","SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2015-3209","url":"https://www.suse.com/security/cve/CVE-2015-3209"},{"category":"external","summary":"SUSE Bug 932267 for CVE-2015-3209","url":"https://bugzilla.suse.com/932267"},{"category":"external","summary":"SUSE Bug 932770 for CVE-2015-3209","url":"https://bugzilla.suse.com/932770"},{"category":"external","summary":"SUSE Bug 932823 for CVE-2015-3209","url":"https://bugzilla.suse.com/932823"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586","SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64","SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586","SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64"]}],"threats":[{"category":"impact","date":"2012-08-31T14:36:20Z","details":"important"}],"title":"CVE-2015-3209"},{"cve":"CVE-2015-3456","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2015-3456"}],"notes":[{"category":"general","text":"The Floppy Disk Controller (FDC) in QEMU, as used in Xen 4.5.x and earlier and KVM, allows local guest users to cause a denial of service (out-of-bounds write and guest crash) or possibly execute arbitrary code via the (1) FD_CMD_READ_ID, (2) FD_CMD_DRIVE_SPECIFICATION_COMMAND, or other unspecified commands, aka VENOM.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586","SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64","SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586","SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2015-3456","url":"https://www.suse.com/security/cve/CVE-2015-3456"},{"category":"external","summary":"SUSE Bug 929339 for CVE-2015-3456","url":"https://bugzilla.suse.com/929339"},{"category":"external","summary":"SUSE Bug 932770 for CVE-2015-3456","url":"https://bugzilla.suse.com/932770"},{"category":"external","summary":"SUSE Bug 935900 for CVE-2015-3456","url":"https://bugzilla.suse.com/935900"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.i586","SUSE Linux Enterprise Server 11 SP1-LTSS:kvm-0.12.5-1.24.1.x86_64","SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.i586","SUSE Linux Enterprise Server 11 SP1-TERADATA:kvm-0.12.5-1.24.1.x86_64"]}],"threats":[{"category":"impact","date":"2012-08-31T14:36:20Z","details":"moderate"}],"title":"CVE-2015-3456"}]}