Red Hat Security Advisory 2015-0998-01

Red Hat Security Advisory 2015-0998-01 – KVM is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm package provides the user-space component for running virtual machines using KVM. An out-of-bounds memory access flaw was found in the way QEMU’s virtual Floppy Disk Controller handled FIFO buffer access while processing certain FDC commands. A privileged guest user could use this flaw to crash the guest or, potentially, execute arbitrary code on the host with the privileges of the host’s QEMU process corresponding to the guest.

Red Hat Security Advisory 2015-1002-01

Red Hat Security Advisory 2015-1002-01 – The xen packages contain administration tools and the xend service for managing the kernel-xen kernel for virtualization on Red Hat Enterprise Linux. An out-of-bounds memory access flaw was found in the way QEMU’s virtual Floppy Disk Controller handled FIFO buffer access while processing certain FDC commands. A privileged guest user could use this flaw to crash the guest or, potentially, execute arbitrary code on the host with the privileges of the host’s QEMU process corresponding to the guest.

Red Hat Security Advisory 2015-1003-01

Red Hat Security Advisory 2015-1003-01 – KVM is a full virtualization solution for Linux on AMD64 and Intel 64 systems. An out-of-bounds memory access flaw was found in the way QEMU’s virtual Floppy Disk Controller handled FIFO buffer access while processing certain FDC commands. A privileged guest user could use this flaw to crash the guest or, potentially, execute arbitrary code on the host with the privileges of the host’s QEMU process corresponding to the guest.

Ubuntu Security Notice USN-2608-1

Ubuntu Security Notice 2608-1 – Jason Geffner discovered that QEMU incorrectly handled the virtual floppy driver. This issue is known as VENOM. A malicious guest could use this issue to cause a denial of service, or possibly execute arbitrary code on the host as the user running the QEMU process. In the default installation, when QEMU is used with libvirt, attackers would be isolated by the libvirt AppArmor profile. Daniel P. Berrange discovered that QEMU incorrectly handled VNC websockets. A remote attacker could use this issue to cause QEMU to consume memory, resulting in a denial of service. This issue only affected Ubuntu 14.04 LTS, Ubuntu 14.10 and Ubuntu 15.04. Various other issues were also addressed.

CVE-2015-3456

The Floppy Disk Controller (FDC) in QEMU, as used in Xen 4.5.x and earlier and KVM, allows local guest users to cause a denial of service (out-of-bounds write and guest crash) or possibly execute arbitrary code via the (1) FD_CMD_READ_ID, (2) FD_CMD_DRIVE_SPECIFICATION_COMMAND, or other unspecified commands, aka VENOM.

CESA-2015:1003 Important CentOS 5 kvm SecurityUpdate

CentOS Errata and Security Advisory 2015:1003 Important

Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-1003.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 


x86_64:
1207b343118a6fdb23ebd56cecbadee6d8dec3a63afac898dab6528716457df4  kmod-kvm-83-272.el5.centos.x86_64.rpm
1396f4ccb7fd43156fc56ce14469f59609ee1620466560cbdb876c33970df5d6  kmod-kvm-debug-83-272.el5.centos.x86_64.rpm
2e0218f216a85edf1ea12d0daf665e003faba13774ae165d88010c2bd3594d8c  kvm-83-272.el5.centos.x86_64.rpm
bfa8d6952299a4190525c97cf0a25c38b40fdad2fc6d6a363a3e52c286f7bc10  kvm-qemu-img-83-272.el5.centos.x86_64.rpm
c3016d77a7f28eb7d826ed9d0ad84e541ad51a504008d331dcb8fca11bfeff22  kvm-tools-83-272.el5.centos.x86_64.rpm

Source:
a2bcb8ee1e7b08249352c79ae33df472831849694b5559d746c43241f949782b  kvm-83-272.el5.centos.src.rpm



Wireshark Analyzer 1.12.5

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers.

SAP LZC/LZH Compression Denial Of Service

Core Security Technologies Advisory – SAP products make use of a proprietary implementation of the Lempel-Ziv-Thomas (LZC) adaptive dictionary compression algorithm and the Lempel-Ziv-Huffman (LZH) compression algorithm. These compression algorithms are used across several SAP products and programs. Vulnerabilities were found in the decompression routines that could be triggered in different scenarios, and could lead to execution of arbitrary code and denial of service conditions.