openSUSE Security Update: qemu: Fix buffer overflow in console VT100 emulation
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2012:1170-1
Rating:             important
References:         #777084 
Cross-References:   CVE-2012-3515
Affected Products:
                    openSUSE 12.2
                    openSUSE 12.1
                    openSUSE 11.4
______________________________________________________________________________

   An update that fixes one vulnerability is now available.

Description:

   qemu was fixed to add bounds checking for VT100 escape code
   parsing and cursor placement.

   Also qemu was updated on 12.2 and 11.4 to the latest stable
   release (v1.1.1 and v0.14.1 respectively).


Patch Instructions:

   To install this openSUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - openSUSE 12.2:

      zypper in -t patch openSUSE-2012-599

   - openSUSE 12.1:

      zypper in -t patch openSUSE-2012-599

   - openSUSE 11.4:

      zypper in -t patch openSUSE-2012-599

   To bring your system up-to-date, use "zypper patch".


Package List:

   - openSUSE 12.2 (i586 x86_64):

      qemu-1.1.1-3.9.1
      qemu-debuginfo-1.1.1-3.9.1
      qemu-debugsource-1.1.1-3.9.1
      qemu-guest-agent-1.1.1-3.9.1
      qemu-guest-agent-debuginfo-1.1.1-3.9.1
      qemu-linux-user-1.1.1-3.9.1
      qemu-tools-1.1.1-3.9.1
      qemu-tools-debuginfo-1.1.1-3.9.1

   - openSUSE 12.1 (i586 x86_64):

      qemu-0.14.1-7.6.1
      qemu-debuginfo-0.14.1-7.6.1
      qemu-debugsource-0.14.1-7.6.1

   - openSUSE 11.4 (i586 x86_64):

      qemu-0.14.1-1.10.1
      qemu-debuginfo-0.14.1-1.10.1
      qemu-debugsource-0.14.1-1.10.1


References:

   https://www.suse.com/security/cve/CVE-2012-3515.html
   https://bugzilla.novell.com/777084

-- 

openSUSE: 2012:1170-1: important: qemu

September 14, 2012
An update that fixes one vulnerability is now available.

Description

qemu was fixed to add bounds checking for VT100 escape code parsing and cursor placement. Also qemu was updated on 12.2 and 11.4 to the latest stable release (v1.1.1 and v0.14.1 respectively).

 

Patch

Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 12.2: zypper in -t patch openSUSE-2012-599 - openSUSE 12.1: zypper in -t patch openSUSE-2012-599 - openSUSE 11.4: zypper in -t patch openSUSE-2012-599 To bring your system up-to-date, use "zypper patch".


Package List

- openSUSE 12.2 (i586 x86_64): qemu-1.1.1-3.9.1 qemu-debuginfo-1.1.1-3.9.1 qemu-debugsource-1.1.1-3.9.1 qemu-guest-agent-1.1.1-3.9.1 qemu-guest-agent-debuginfo-1.1.1-3.9.1 qemu-linux-user-1.1.1-3.9.1 qemu-tools-1.1.1-3.9.1 qemu-tools-debuginfo-1.1.1-3.9.1 - openSUSE 12.1 (i586 x86_64): qemu-0.14.1-7.6.1 qemu-debuginfo-0.14.1-7.6.1 qemu-debugsource-0.14.1-7.6.1 - openSUSE 11.4 (i586 x86_64): qemu-0.14.1-1.10.1 qemu-debuginfo-0.14.1-1.10.1 qemu-debugsource-0.14.1-1.10.1


References

https://www.suse.com/security/cve/CVE-2012-3515.html https://bugzilla.novell.com/777084--


Severity
Announcement ID: openSUSE-SU-2012:1170-1
Rating: important
Affected Products: openSUSE 12.2 openSUSE 12.1 openSUSE 11.4

Related News