SUSE-SU-2016:0020-1: important: Security update for kvm

sle-updates at sle-updates at
Tue Jan 5 07:11:07 MST 2016

   SUSE Security Update: Security update for kvm

Announcement ID:    SUSE-SU-2016:0020-1
Rating:             important
References:         #947164 #950590 #953187 #956829 #957162 
Cross-References:   CVE-2015-7512 CVE-2015-8345
Affected Products:
                    SUSE Linux Enterprise Server 11-SP3
                    SUSE Linux Enterprise Desktop 11-SP3

   An update that solves two vulnerabilities and has three
   fixes is now available.


   This update for kvm fixes the following issues:

   Security issues fixed:
   - CVE-2015-7512: The receive packet size is now checked in the emulated
     pcnet driver, eliminating buffer overflow and potential security issue
     by malicious guest systems. (bsc#957162)
   - CVE-2015-8345: A infinite loop in processing command block list was
     fixed that could be exploit by malicious guest systems (bsc#956829).

   Bugs fixed:
   - Fix cases of wrong clock values in kvmclock timekeeping (bsc#947164 and
   - Enforce pxe rom sizes to ensure migration compatibility. (bsc#950590)

Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Server 11-SP3:

      zypper in -t patch slessp3-kvm-12294=1

   - SUSE Linux Enterprise Desktop 11-SP3:

      zypper in -t patch sledsp3-kvm-12294=1

   To bring your system up-to-date, use "zypper patch".

Package List:

   - SUSE Linux Enterprise Server 11-SP3 (i586 s390x x86_64):


   - SUSE Linux Enterprise Desktop 11-SP3 (i586 x86_64):



More information about the sle-updates mailing list