openSUSE Security Update : qemu (openSUSE-SU-2014:0200-1)

This script is Copyright (C) 2014 Tenable Network Security, Inc.


Synopsis :

The remote openSUSE host is missing a security update.

Description :

Running QEMU in a configuration with more than 256 emulated SCSI
devices attached could have caused a buffer overflow when the guest
issues a REPORT LUNS command. Fix this as part of upgrading to the
latest stable version on 13.1. Also fix unintentional building against
gtk2 rather than gtk3 on 13.1, and fix serial retry logic on 12.3.

See also :

http://lists.opensuse.org/opensuse-updates/2014-02/msg00017.html
https://bugzilla.novell.com/show_bug.cgi?id=779727
https://bugzilla.novell.com/show_bug.cgi?id=840607
https://bugzilla.novell.com/show_bug.cgi?id=842006
https://bugzilla.novell.com/show_bug.cgi?id=849587

Solution :

Update the affected qemu packages.

Risk factor :

Medium / CVSS Base Score : 6.0
(CVSS2#AV:L/AC:H/Au:S/C:C/I:C/A:C)

Family: SuSE Local Security Checks

Nessus Plugin ID: 75249 ()

Bugtraq ID:

CVE ID: CVE-2013-4344

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now