SUSE-SU-2014:0816-1: moderate: Security update for KVM

sle-updates at sle-updates at
Wed Jun 18 11:04:13 MDT 2014

   SUSE Security Update: Security update for KVM

Announcement ID:    SUSE-SU-2014:0816-1
Rating:             moderate
References:         #864391 #864649 #864650 #864653 #864655 #864665 
                    #864671 #864673 #864678 #864682 #864769 #864796 
                    #864801 #864802 #864804 #864805 #864811 #864812 
                    #864814 #873235 #874749 #874788 
Cross-References:   CVE-2014-0150 CVE-2014-2894
Affected Products:
                    SUSE Linux Enterprise Server 11 SP3
                    SUSE Linux Enterprise Desktop 11 SP3

   An update that solves two vulnerabilities and has 20 fixes
   is now available. It includes one version update.


   Several security issues in KVM have been fixed. Some issues could have
   resulted in arbitrary code execution or crash of the kvm host.

       * virtio-net: buffer overflow in virtio_net_handle_mac() function
       * Fixed out of bounds buffer accesses, guest triggerable via IDE SMART

         Fixed various virtio-net buffer overflows


         Fixed ahci buffer overrun (CVE-2013-4526)

       * Fixed hpet buffer overrun (CVE-2013-4527)
       * Fixed a PCIE-AER buffer overrun (CVE-2013-4529)
       * Fixed a buffer overrun in pl022 (CVE-2013-4530)
       * Fixed a vmstate buffer overflow (CVE-2013-4531)
       * Fixed a pxa2xx buffer overrun (CVE-2013-4533)
       * Fixed a openpic buffer overrun (CVE-2013-4534)
       * Validate virtio num_sg mapping (CVE-2013-4535 / CVE-2013-4536)
       * Fixed ssi-sd buffer overrun (CVE-2013-4537)
       * Fixed ssd0323 buffer overrun (CVE-2013-4538)
       * Fixed tsc210x buffer overrun (CVE-2013-4539)
       * Fixed Zaurus buffer overrun (CVE-2013-4540)
       * Some USB sanity checking added (CVE-2013-4541)
       * Fixed virtio scsi buffer overrun (CVE-2013-4542)
       * Fixed another virtio buffer overrun (CVE-2013-6399)
       * Validate config_len on load in virtio (CVE-2014-0182)

   Security Issue references:

       * CVE-2014-0150
       * CVE-2014-2894

Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Server 11 SP3:

      zypper in -t patch slessp3-kvm-9302

   - SUSE Linux Enterprise Desktop 11 SP3:

      zypper in -t patch sledsp3-kvm-9302

   To bring your system up-to-date, use "zypper patch".

Package List:

   - SUSE Linux Enterprise Server 11 SP3 (i586 s390x x86_64) [New Version: 1.4.2]:


   - SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64) [New Version: 1.4.2]:



More information about the sle-updates mailing list