SUSE Security Update: Security update for gstreamer-0_10-plugins-bad
______________________________________________________________________________
Announcement ID: SUSE-SU-2015:0921-1
Rating: important
References: #927559
Cross-References: CVE-2015-0797
Affected Products:
SUSE Linux Enterprise Desktop 11 SP3
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
gstreamer-0_10-plugins-bad was updated to fix a security issue, a buffer
overflow in mp4 parsing (bnc#927559 CVE-2015-0797).
Security Issues:
* CVE-2015-0797
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797>
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Desktop 11 SP3:
zypper in -t patch sledsp3-gstreamer-0_10-plugins-bad=10643
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64):
gstreamer-0_10-plugins-bad-0.10.22-7.11.1
gstreamer-0_10-plugins-bad-lang-0.10.22-7.11.1
libgstbasecamerabinsrc-0_10-0-0.10.22-7.11.1
libgstbasevideo-0_10-0-0.10.22-7.11.1
libgstphotography-0_10-0-0.10.22-7.11.1
libgstsignalprocessor-0_10-0-0.10.22-7.11.1
libgstvdp-0_10-0-0.10.22-7.11.1
- SUSE Linux Enterprise Desktop 11 SP3 (x86_64):
libgstbasecamerabinsrc-0_10-0-32bit-0.10.22-7.11.1
libgstbasevideo-0_10-0-32bit-0.10.22-7.11.1
libgstphotography-0_10-0-32bit-0.10.22-7.11.1
libgstsignalprocessor-0_10-0-32bit-0.10.22-7.11.1
libgstvdp-0_10-0-32bit-0.10.22-7.11.1
References:
https://www.suse.com/security/cve/CVE-2015-0797.htmlhttps://bugzilla.suse.com/927559https://download.suse.com/patch/finder/?keywords=f7ccd0598b1d14e206c07e7685…
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
SUSE Security Update: Security update for qemu
______________________________________________________________________________
Announcement ID: SUSE-SU-2015:0896-1
Rating: important
References: #886378 #924018 #929339
Cross-References: CVE-2015-1779 CVE-2015-3456
Affected Products:
SUSE Linux Enterprise Server 12
SUSE Linux Enterprise Desktop 12
______________________________________________________________________________
An update that solves two vulnerabilities and has one
errata is now available.
Description:
qemu / kvm was updated to fix a security issue and some bugs.
Security issue fixed:
* CVE-2015-3456: Fixed a buffer overflow in the floppy drive emulation,
which could be used to denial of service attacks or potential code
execution against the host.
* CVE-2015-1779: Fixed insufficient resource limiting in the VNC
websockets decoder.
Bugs fixed:
- qemu truncates vhd images in virt-rescue (bsc#886378)
- Update kvm-supported.txt with the current rbd support status.
- enable rbd build on x86_64 (qemu-block-rbd package) (FATE#318349)
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server 12:
zypper in -t patch SUSE-SLE-SERVER-12-2015-200=1
- SUSE Linux Enterprise Desktop 12:
zypper in -t patch SUSE-SLE-DESKTOP-12-2015-200=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64):
qemu-2.0.2-46.1
qemu-block-curl-2.0.2-46.1
qemu-block-curl-debuginfo-2.0.2-46.1
qemu-debugsource-2.0.2-46.1
qemu-guest-agent-2.0.2-46.1
qemu-guest-agent-debuginfo-2.0.2-46.1
qemu-lang-2.0.2-46.1
qemu-tools-2.0.2-46.1
qemu-tools-debuginfo-2.0.2-46.1
- SUSE Linux Enterprise Server 12 (s390x x86_64):
qemu-kvm-2.0.2-46.1
- SUSE Linux Enterprise Server 12 (ppc64le):
qemu-ppc-2.0.2-46.1
qemu-ppc-debuginfo-2.0.2-46.1
- SUSE Linux Enterprise Server 12 (noarch):
qemu-ipxe-1.0.0-46.1
qemu-seabios-1.7.4-46.1
qemu-sgabios-8-46.1
qemu-vgabios-1.7.4-46.1
- SUSE Linux Enterprise Server 12 (x86_64):
qemu-block-rbd-2.0.2-46.1
qemu-block-rbd-debuginfo-2.0.2-46.1
qemu-x86-2.0.2-46.1
qemu-x86-debuginfo-2.0.2-46.1
- SUSE Linux Enterprise Server 12 (s390x):
qemu-s390-2.0.2-46.1
qemu-s390-debuginfo-2.0.2-46.1
- SUSE Linux Enterprise Desktop 12 (x86_64):
qemu-2.0.2-46.1
qemu-block-curl-2.0.2-46.1
qemu-block-curl-debuginfo-2.0.2-46.1
qemu-debugsource-2.0.2-46.1
qemu-kvm-2.0.2-46.1
qemu-tools-2.0.2-46.1
qemu-tools-debuginfo-2.0.2-46.1
qemu-x86-2.0.2-46.1
qemu-x86-debuginfo-2.0.2-46.1
- SUSE Linux Enterprise Desktop 12 (noarch):
qemu-ipxe-1.0.0-46.1
qemu-seabios-1.7.4-46.1
qemu-sgabios-8-46.1
qemu-vgabios-1.7.4-46.1
References:
https://www.suse.com/security/cve/CVE-2015-1779.htmlhttps://www.suse.com/security/cve/CVE-2015-3456.htmlhttps://bugzilla.suse.com/886378https://bugzilla.suse.com/924018https://bugzilla.suse.com/929339
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
openSUSE Security Update: Security update for qemu
______________________________________________________________________________
Announcement ID: openSUSE-SU-2015:0894-1
Rating: important
References: #929339
Cross-References: CVE-2015-3456
Affected Products:
openSUSE 13.1
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
qemu was updated to fix a security issue:
* CVE-2015-3456: Fixed a buffer overflow in the floppy drive emulation,
which could be used to denial of service attacks or potential code
execution against the host.
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 13.1:
zypper in -t patch openSUSE-2015-363=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 13.1 (i586 x86_64):
qemu-1.6.2-4.8.1
qemu-debuginfo-1.6.2-4.8.1
qemu-debugsource-1.6.2-4.8.1
qemu-guest-agent-1.6.2-4.8.1
qemu-guest-agent-debuginfo-1.6.2-4.8.1
qemu-lang-1.6.2-4.8.1
qemu-linux-user-1.6.2-4.8.1
qemu-linux-user-debuginfo-1.6.2-4.8.1
qemu-linux-user-debugsource-1.6.2-4.8.1
qemu-tools-1.6.2-4.8.1
qemu-tools-debuginfo-1.6.2-4.8.1
- openSUSE 13.1 (noarch):
qemu-ipxe-1.0.0-4.8.1
qemu-seabios-1.7.2.2-4.8.1
qemu-sgabios-8-4.8.1
qemu-vgabios-0.6c-4.8.1
References:
https://www.suse.com/security/cve/CVE-2015-3456.htmlhttps://bugzilla.suse.com/929339
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
openSUSE Security Update: Security update for qemu
______________________________________________________________________________
Announcement ID: openSUSE-SU-2015:0893-1
Rating: important
References: #929339
Cross-References: CVE-2015-3456
Affected Products:
openSUSE 13.2
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
Qemu was updated to v2.1.3: See http://wiki.qemu-project.org/ChangeLog/2.1
for more information.
This update includes a security fix:
* CVE-2015-3456: Fixed a buffer overflow in the floppy drive emulation,
which could be used to denial of service attacks or potential code
execution against the host.
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 13.2:
zypper in -t patch openSUSE-2015-364=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 13.2 (i586 x86_64):
libcacard-debugsource-2.1.3-4.1
libcacard-devel-2.1.3-4.1
libcacard0-2.1.3-4.1
libcacard0-debuginfo-2.1.3-4.1
qemu-2.1.3-4.1
qemu-arm-2.1.3-4.1
qemu-arm-debuginfo-2.1.3-4.1
qemu-block-curl-2.1.3-4.1
qemu-block-curl-debuginfo-2.1.3-4.1
qemu-debugsource-2.1.3-4.1
qemu-extra-2.1.3-4.1
qemu-extra-debuginfo-2.1.3-4.1
qemu-guest-agent-2.1.3-4.1
qemu-guest-agent-debuginfo-2.1.3-4.1
qemu-ksm-2.1.3-4.1
qemu-kvm-2.1.3-4.1
qemu-lang-2.1.3-4.1
qemu-linux-user-2.1.3-4.1
qemu-linux-user-debuginfo-2.1.3-4.1
qemu-linux-user-debugsource-2.1.3-4.1
qemu-ppc-2.1.3-4.1
qemu-ppc-debuginfo-2.1.3-4.1
qemu-s390-2.1.3-4.1
qemu-s390-debuginfo-2.1.3-4.1
qemu-tools-2.1.3-4.1
qemu-tools-debuginfo-2.1.3-4.1
qemu-x86-2.1.3-4.1
qemu-x86-debuginfo-2.1.3-4.1
- openSUSE 13.2 (noarch):
qemu-ipxe-1.0.0-4.1
qemu-seabios-1.7.5-4.1
qemu-sgabios-8-4.1
qemu-vgabios-1.7.5-4.1
References:
https://www.suse.com/security/cve/CVE-2015-3456.htmlhttps://bugzilla.suse.com/929339
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
SUSE Security Update: Security update for spice
______________________________________________________________________________
Announcement ID: SUSE-SU-2015:0884-2
Rating: important
References: #848279
Cross-References: CVE-2013-4282
Affected Products:
SUSE Linux Enterprise Software Development Kit 12
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
The remote desktop software SPICE was updated to address one security
issue.
The following vulnerabilitiy was fixed:
* A stack-based buffer overflow in the password handling code allowed
remote attackers to cause a denial of service (crash) via a long
password in a SPICE ticket. (bsc#848279, CVE-2013-4282)
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 12:
zypper in -t patch SUSE-SLE-SDK-12-2015-199=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 12 (x86_64):
libspice-server-devel-0.12.4-6.1
spice-debugsource-0.12.4-6.1
References:
https://www.suse.com/security/cve/CVE-2013-4282.htmlhttps://bugzilla.suse.com/848279
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
SUSE Security Update: Security update for KVM
______________________________________________________________________________
Announcement ID: SUSE-SU-2015:0889-1
Rating: important
References: #929339
Cross-References: CVE-2015-3456
Affected Products:
SUSE Linux Enterprise Server 11 SP3
SUSE Linux Enterprise Desktop 11 SP3
______________________________________________________________________________
An update that fixes one vulnerability is now available. It
includes one version update.
Description:
KVM was updated to fix a buffer overflow in the floppy drive emulation,
which could be used to carry out denial of service attacks or potential
code execution against the host. This vulnerability is also known as
VENOM. (CVE-2015-3456)
Security Issues:
* CVE-2015-3456
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456>
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server 11 SP3:
zypper in -t patch slessp3-kvm=10672
- SUSE Linux Enterprise Desktop 11 SP3:
zypper in -t patch sledsp3-kvm=10672
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server 11 SP3 (i586 s390x x86_64) [New Version: 1.4.2]:
kvm-1.4.2-0.22.27.1
- SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64) [New Version: 1.4.2]:
kvm-1.4.2-0.22.27.1
References:
https://www.suse.com/security/cve/CVE-2015-3456.htmlhttps://bugzilla.suse.com/929339https://download.suse.com/patch/finder/?keywords=0004a1b76b4d8709b2022934a3…
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
SUSE Security Update: Security update for spice
______________________________________________________________________________
Announcement ID: SUSE-SU-2015:0884-1
Rating: important
References: #848279
Cross-References: CVE-2013-4282
Affected Products:
SUSE Linux Enterprise Server 12
SUSE Linux Enterprise Desktop 12
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
The remote desktop software SPICE was updated to address one security
issue.
The following vulnerabilitiy was fixed:
* A stack-based buffer overflow in the password handling code allowed
remote attackers to cause a denial of service (crash) via a long
password in a SPICE ticket. (bsc#848279, CVE-2013-4282)
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server 12:
zypper in -t patch SUSE-SLE-SERVER-12-2015-199=1
- SUSE Linux Enterprise Desktop 12:
zypper in -t patch SUSE-SLE-DESKTOP-12-2015-199=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server 12 (x86_64):
libspice-server1-0.12.4-6.1
libspice-server1-debuginfo-0.12.4-6.1
spice-debugsource-0.12.4-6.1
- SUSE Linux Enterprise Desktop 12 (x86_64):
libspice-server1-0.12.4-6.1
libspice-server1-debuginfo-0.12.4-6.1
spice-debugsource-0.12.4-6.1
References:
https://www.suse.com/security/cve/CVE-2013-4282.htmlhttps://bugzilla.suse.com/848279
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org