ALT-BU-2015-2686-1
Branch sisyphus update bulletin.
Package kernel-image-std-def updated to version 4.1.10-alt2 for branch sisyphus in task 151280.
Closed bugs
зависание на ядре 4.1.10-std-def
Package kernel-image-std-pae updated to version 4.1.10-alt2 for branch sisyphus in task 151283.
Closed bugs
зависание на ядре 4.1.10-std-def
Closed bugs
Для quvi нужен libquvi-scripts
Package libquvi-scripts updated to version 0.4.19-alt2 for branch sisyphus in task 151299.
Closed bugs
Для quvi нужен libquvi-scripts
Closed vulnerabilities
Modified: 2021-03-23
BDU:2015-11042
Уязвимость библиотеки OpenSSL, позволяющая нарушителю проводить атаки, направленные на снижение стойкости алгоритма шифрования
Modified: 2025-04-12
CVE-2015-4000
The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the "Logjam" issue.
- http://aix.software.ibm.com/aix/efixes/security/sendmail_advisory2.asc
- http://fortiguard.com/advisory/2015-07-09-cve-2015-1793-openssl-alternative-chains-certificate-forgery
- http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2015-008.txt.asc
- http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04876402
- http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04949778
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10681
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727
- http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html
- http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159314.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159351.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160117.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html
- http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00031.html
- http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00032.html
- http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00037.html
- http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00039.html
- http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00040.html
- http://lists.opensuse.org/opensuse-updates/2015-07/msg00016.html
- http://lists.opensuse.org/opensuse-updates/2015-10/msg00011.html
- http://lists.opensuse.org/opensuse-updates/2016-02/msg00094.html
- http://lists.opensuse.org/opensuse-updates/2016-02/msg00097.html
- http://marc.info/?l=bugtraq&m=143506486712441&w=2
- http://marc.info/?l=bugtraq&m=143557934009303&w=2
- http://marc.info/?l=bugtraq&m=143558092609708&w=2
- http://marc.info/?l=bugtraq&m=143628304012255&w=2
- http://marc.info/?l=bugtraq&m=143637549705650&w=2
- http://marc.info/?l=bugtraq&m=143655800220052&w=2
- http://marc.info/?l=bugtraq&m=143880121627664&w=2
- http://marc.info/?l=bugtraq&m=144043644216842&w=2
- http://marc.info/?l=bugtraq&m=144050121701297&w=2
- http://marc.info/?l=bugtraq&m=144060576831314&w=2
- http://marc.info/?l=bugtraq&m=144060606031437&w=2
- http://marc.info/?l=bugtraq&m=144061542602287&w=2
- http://marc.info/?l=bugtraq&m=144069189622016&w=2
- http://marc.info/?l=bugtraq&m=144102017024820&w=2
- http://marc.info/?l=bugtraq&m=144104533800819&w=2
- http://marc.info/?l=bugtraq&m=144493176821532&w=2
- http://marc.info/?l=bugtraq&m=145409266329539&w=2
- http://openwall.com/lists/oss-security/2015/05/20/8
- http://rhn.redhat.com/errata/RHSA-2015-1072.html
- http://rhn.redhat.com/errata/RHSA-2015-1185.html
- http://rhn.redhat.com/errata/RHSA-2015-1197.html
- http://rhn.redhat.com/errata/RHSA-2015-1228.html
- http://rhn.redhat.com/errata/RHSA-2015-1229.html
- http://rhn.redhat.com/errata/RHSA-2015-1230.html
- http://rhn.redhat.com/errata/RHSA-2015-1241.html
- http://rhn.redhat.com/errata/RHSA-2015-1242.html
- http://rhn.redhat.com/errata/RHSA-2015-1243.html
- http://rhn.redhat.com/errata/RHSA-2015-1485.html
- http://rhn.redhat.com/errata/RHSA-2015-1486.html
- http://rhn.redhat.com/errata/RHSA-2015-1488.html
- http://rhn.redhat.com/errata/RHSA-2015-1526.html
- http://rhn.redhat.com/errata/RHSA-2015-1544.html
- http://rhn.redhat.com/errata/RHSA-2015-1604.html
- http://rhn.redhat.com/errata/RHSA-2016-1624.html
- http://rhn.redhat.com/errata/RHSA-2016-2056.html
- http://support.apple.com/kb/HT204941
- http://support.apple.com/kb/HT204942
- http://support.citrix.com/article/CTX201114
- http://www-01.ibm.com/support/docview.wss?uid=swg21959111
- http://www-01.ibm.com/support/docview.wss?uid=swg21959195
- http://www-01.ibm.com/support/docview.wss?uid=swg21959325
- http://www-01.ibm.com/support/docview.wss?uid=swg21959453
- http://www-01.ibm.com/support/docview.wss?uid=swg21959481
- http://www-01.ibm.com/support/docview.wss?uid=swg21959517
- http://www-01.ibm.com/support/docview.wss?uid=swg21959530
- http://www-01.ibm.com/support/docview.wss?uid=swg21959539
- http://www-01.ibm.com/support/docview.wss?uid=swg21959636
- http://www-01.ibm.com/support/docview.wss?uid=swg21959812
- http://www-01.ibm.com/support/docview.wss?uid=swg21960191
- http://www-01.ibm.com/support/docview.wss?uid=swg21961717
- http://www-01.ibm.com/support/docview.wss?uid=swg21962455
- http://www-01.ibm.com/support/docview.wss?uid=swg21962739
- http://www-304.ibm.com/support/docview.wss?uid=swg21958984
- http://www-304.ibm.com/support/docview.wss?uid=swg21959132
- http://www-304.ibm.com/support/docview.wss?uid=swg21960041
- http://www-304.ibm.com/support/docview.wss?uid=swg21960194
- http://www-304.ibm.com/support/docview.wss?uid=swg21960380
- http://www-304.ibm.com/support/docview.wss?uid=swg21960418
- http://www-304.ibm.com/support/docview.wss?uid=swg21962816
- http://www-304.ibm.com/support/docview.wss?uid=swg21967893
- http://www.debian.org/security/2015/dsa-3287
- http://www.debian.org/security/2015/dsa-3300
- http://www.debian.org/security/2015/dsa-3316
- http://www.debian.org/security/2015/dsa-3324
- http://www.debian.org/security/2015/dsa-3339
- http://www.debian.org/security/2016/dsa-3688
- http://www.fortiguard.com/advisory/2015-05-20-logjam-attack
- http://www.mozilla.org/security/announce/2015/mfsa2015-70.html
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.securityfocus.com/bid/74733
- http://www.securityfocus.com/bid/91787
- http://www.securitytracker.com/id/1032474
- http://www.securitytracker.com/id/1032475
- http://www.securitytracker.com/id/1032476
- http://www.securitytracker.com/id/1032637
- http://www.securitytracker.com/id/1032645
- http://www.securitytracker.com/id/1032647
- http://www.securitytracker.com/id/1032648
- http://www.securitytracker.com/id/1032649
- http://www.securitytracker.com/id/1032650
- http://www.securitytracker.com/id/1032651
- http://www.securitytracker.com/id/1032652
- http://www.securitytracker.com/id/1032653
- http://www.securitytracker.com/id/1032654
- http://www.securitytracker.com/id/1032655
- http://www.securitytracker.com/id/1032656
- http://www.securitytracker.com/id/1032688
- http://www.securitytracker.com/id/1032699
- http://www.securitytracker.com/id/1032702
- http://www.securitytracker.com/id/1032727
- http://www.securitytracker.com/id/1032759
- http://www.securitytracker.com/id/1032777
- http://www.securitytracker.com/id/1032778
- http://www.securitytracker.com/id/1032783
- http://www.securitytracker.com/id/1032784
- http://www.securitytracker.com/id/1032856
- http://www.securitytracker.com/id/1032864
- http://www.securitytracker.com/id/1032865
- http://www.securitytracker.com/id/1032871
- http://www.securitytracker.com/id/1032884
- http://www.securitytracker.com/id/1032910
- http://www.securitytracker.com/id/1032932
- http://www.securitytracker.com/id/1032960
- http://www.securitytracker.com/id/1033019
- http://www.securitytracker.com/id/1033064
- http://www.securitytracker.com/id/1033065
- http://www.securitytracker.com/id/1033067
- http://www.securitytracker.com/id/1033208
- http://www.securitytracker.com/id/1033209
- http://www.securitytracker.com/id/1033210
- http://www.securitytracker.com/id/1033222
- http://www.securitytracker.com/id/1033341
- http://www.securitytracker.com/id/1033385
- http://www.securitytracker.com/id/1033416
- http://www.securitytracker.com/id/1033430
- http://www.securitytracker.com/id/1033433
- http://www.securitytracker.com/id/1033513
- http://www.securitytracker.com/id/1033760
- http://www.securitytracker.com/id/1033891
- http://www.securitytracker.com/id/1033991
- http://www.securitytracker.com/id/1034087
- http://www.securitytracker.com/id/1034728
- http://www.securitytracker.com/id/1034884
- http://www.securitytracker.com/id/1036218
- http://www.securitytracker.com/id/1040630
- http://www.solarwinds.com/documentation/storage/storagemanager/docs/ReleaseNotes/releaseNotes.htm
- http://www.ubuntu.com/usn/USN-2656-1
- http://www.ubuntu.com/usn/USN-2656-2
- http://www.ubuntu.com/usn/USN-2673-1
- http://www.ubuntu.com/usn/USN-2696-1
- http://www.ubuntu.com/usn/USN-2706-1
- https://blog.cloudflare.com/logjam-the-latest-tls-vulnerability-explained/
- https://bto.bluecoat.com/security-advisory/sa98
- https://bugzilla.mozilla.org/show_bug.cgi?id=1138554
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.1_release_notes
- https://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04718196
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04918839
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04923929
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04740527
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04953655
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05128722
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193083
- https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes
- https://kc.mcafee.com/corporate/index?page=content&id=SB10122
- https://openssl.org/news/secadv/20150611.txt
- https://puppet.com/security/cve/CVE-2015-4000
- https://security.gentoo.org/glsa/201506-02
- https://security.gentoo.org/glsa/201512-10
- https://security.gentoo.org/glsa/201603-11
- https://security.gentoo.org/glsa/201701-46
- https://security.netapp.com/advisory/ntap-20150619-0001/
- https://support.citrix.com/article/CTX216642
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03831en_us
- https://weakdh.org/
- https://weakdh.org/imperfect-forward-secrecy.pdf
- https://www-304.ibm.com/support/docview.wss?uid=swg21959745
- https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098403
- https://www.openssl.org/blog/blog/2015/05/20/logjam-freak-upcoming-changes/
- https://www.openssl.org/news/secadv_20150611.txt
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.suse.com/security/cve/CVE-2015-4000.html
- http://aix.software.ibm.com/aix/efixes/security/sendmail_advisory2.asc
- http://fortiguard.com/advisory/2015-07-09-cve-2015-1793-openssl-alternative-chains-certificate-forgery
- http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2015-008.txt.asc
- http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04876402
- http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04949778
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10681
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727
- http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html
- http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159314.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159351.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160117.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html
- http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00031.html
- http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00032.html
- http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00037.html
- http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00039.html
- http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00040.html
- http://lists.opensuse.org/opensuse-updates/2015-07/msg00016.html
- http://lists.opensuse.org/opensuse-updates/2015-10/msg00011.html
- http://lists.opensuse.org/opensuse-updates/2016-02/msg00094.html
- http://lists.opensuse.org/opensuse-updates/2016-02/msg00097.html
- http://marc.info/?l=bugtraq&m=143506486712441&w=2
- http://marc.info/?l=bugtraq&m=143557934009303&w=2
- http://marc.info/?l=bugtraq&m=143558092609708&w=2
- http://marc.info/?l=bugtraq&m=143628304012255&w=2
- http://marc.info/?l=bugtraq&m=143637549705650&w=2
- http://marc.info/?l=bugtraq&m=143655800220052&w=2
- http://marc.info/?l=bugtraq&m=143880121627664&w=2
- http://marc.info/?l=bugtraq&m=144043644216842&w=2
- http://marc.info/?l=bugtraq&m=144050121701297&w=2
- http://marc.info/?l=bugtraq&m=144060576831314&w=2
- http://marc.info/?l=bugtraq&m=144060606031437&w=2
- http://marc.info/?l=bugtraq&m=144061542602287&w=2
- http://marc.info/?l=bugtraq&m=144069189622016&w=2
- http://marc.info/?l=bugtraq&m=144102017024820&w=2
- http://marc.info/?l=bugtraq&m=144104533800819&w=2
- http://marc.info/?l=bugtraq&m=144493176821532&w=2
- http://marc.info/?l=bugtraq&m=145409266329539&w=2
- http://openwall.com/lists/oss-security/2015/05/20/8
- http://rhn.redhat.com/errata/RHSA-2015-1072.html
- http://rhn.redhat.com/errata/RHSA-2015-1185.html
- http://rhn.redhat.com/errata/RHSA-2015-1197.html
- http://rhn.redhat.com/errata/RHSA-2015-1228.html
- http://rhn.redhat.com/errata/RHSA-2015-1229.html
- http://rhn.redhat.com/errata/RHSA-2015-1230.html
- http://rhn.redhat.com/errata/RHSA-2015-1241.html
- http://rhn.redhat.com/errata/RHSA-2015-1242.html
- http://rhn.redhat.com/errata/RHSA-2015-1243.html
- http://rhn.redhat.com/errata/RHSA-2015-1485.html
- http://rhn.redhat.com/errata/RHSA-2015-1486.html
- http://rhn.redhat.com/errata/RHSA-2015-1488.html
- http://rhn.redhat.com/errata/RHSA-2015-1526.html
- http://rhn.redhat.com/errata/RHSA-2015-1544.html
- http://rhn.redhat.com/errata/RHSA-2015-1604.html
- http://rhn.redhat.com/errata/RHSA-2016-1624.html
- http://rhn.redhat.com/errata/RHSA-2016-2056.html
- http://support.apple.com/kb/HT204941
- http://support.apple.com/kb/HT204942
- http://support.citrix.com/article/CTX201114
- http://www-01.ibm.com/support/docview.wss?uid=swg21959111
- http://www-01.ibm.com/support/docview.wss?uid=swg21959195
- http://www-01.ibm.com/support/docview.wss?uid=swg21959325
- http://www-01.ibm.com/support/docview.wss?uid=swg21959453
- http://www-01.ibm.com/support/docview.wss?uid=swg21959481
- http://www-01.ibm.com/support/docview.wss?uid=swg21959517
- http://www-01.ibm.com/support/docview.wss?uid=swg21959530
- http://www-01.ibm.com/support/docview.wss?uid=swg21959539
- http://www-01.ibm.com/support/docview.wss?uid=swg21959636
- http://www-01.ibm.com/support/docview.wss?uid=swg21959812
- http://www-01.ibm.com/support/docview.wss?uid=swg21960191
- http://www-01.ibm.com/support/docview.wss?uid=swg21961717
- http://www-01.ibm.com/support/docview.wss?uid=swg21962455
- http://www-01.ibm.com/support/docview.wss?uid=swg21962739
- http://www-304.ibm.com/support/docview.wss?uid=swg21958984
- http://www-304.ibm.com/support/docview.wss?uid=swg21959132
- http://www-304.ibm.com/support/docview.wss?uid=swg21960041
- http://www-304.ibm.com/support/docview.wss?uid=swg21960194
- http://www-304.ibm.com/support/docview.wss?uid=swg21960380
- http://www-304.ibm.com/support/docview.wss?uid=swg21960418
- http://www-304.ibm.com/support/docview.wss?uid=swg21962816
- http://www-304.ibm.com/support/docview.wss?uid=swg21967893
- http://www.debian.org/security/2015/dsa-3287
- http://www.debian.org/security/2015/dsa-3300
- http://www.debian.org/security/2015/dsa-3316
- http://www.debian.org/security/2015/dsa-3324
- http://www.debian.org/security/2015/dsa-3339
- http://www.debian.org/security/2016/dsa-3688
- http://www.fortiguard.com/advisory/2015-05-20-logjam-attack
- http://www.mozilla.org/security/announce/2015/mfsa2015-70.html
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.securityfocus.com/bid/74733
- http://www.securityfocus.com/bid/91787
- http://www.securitytracker.com/id/1032474
- http://www.securitytracker.com/id/1032475
- http://www.securitytracker.com/id/1032476
- http://www.securitytracker.com/id/1032637
- http://www.securitytracker.com/id/1032645
- http://www.securitytracker.com/id/1032647
- http://www.securitytracker.com/id/1032648
- http://www.securitytracker.com/id/1032649
- http://www.securitytracker.com/id/1032650
- http://www.securitytracker.com/id/1032651
- http://www.securitytracker.com/id/1032652
- http://www.securitytracker.com/id/1032653
- http://www.securitytracker.com/id/1032654
- http://www.securitytracker.com/id/1032655
- http://www.securitytracker.com/id/1032656
- http://www.securitytracker.com/id/1032688
- http://www.securitytracker.com/id/1032699
- http://www.securitytracker.com/id/1032702
- http://www.securitytracker.com/id/1032727
- http://www.securitytracker.com/id/1032759
- http://www.securitytracker.com/id/1032777
- http://www.securitytracker.com/id/1032778
- http://www.securitytracker.com/id/1032783
- http://www.securitytracker.com/id/1032784
- http://www.securitytracker.com/id/1032856
- http://www.securitytracker.com/id/1032864
- http://www.securitytracker.com/id/1032865
- http://www.securitytracker.com/id/1032871
- http://www.securitytracker.com/id/1032884
- http://www.securitytracker.com/id/1032910
- http://www.securitytracker.com/id/1032932
- http://www.securitytracker.com/id/1032960
- http://www.securitytracker.com/id/1033019
- http://www.securitytracker.com/id/1033064
- http://www.securitytracker.com/id/1033065
- http://www.securitytracker.com/id/1033067
- http://www.securitytracker.com/id/1033208
- http://www.securitytracker.com/id/1033209
- http://www.securitytracker.com/id/1033210
- http://www.securitytracker.com/id/1033222
- http://www.securitytracker.com/id/1033341
- http://www.securitytracker.com/id/1033385
- http://www.securitytracker.com/id/1033416
- http://www.securitytracker.com/id/1033430
- http://www.securitytracker.com/id/1033433
- http://www.securitytracker.com/id/1033513
- http://www.securitytracker.com/id/1033760
- http://www.securitytracker.com/id/1033891
- http://www.securitytracker.com/id/1033991
- http://www.securitytracker.com/id/1034087
- http://www.securitytracker.com/id/1034728
- http://www.securitytracker.com/id/1034884
- http://www.securitytracker.com/id/1036218
- http://www.securitytracker.com/id/1040630
- http://www.solarwinds.com/documentation/storage/storagemanager/docs/ReleaseNotes/releaseNotes.htm
- http://www.ubuntu.com/usn/USN-2656-1
- http://www.ubuntu.com/usn/USN-2656-2
- http://www.ubuntu.com/usn/USN-2673-1
- http://www.ubuntu.com/usn/USN-2696-1
- http://www.ubuntu.com/usn/USN-2706-1
- https://blog.cloudflare.com/logjam-the-latest-tls-vulnerability-explained/
- https://bto.bluecoat.com/security-advisory/sa98
- https://bugzilla.mozilla.org/show_bug.cgi?id=1138554
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.1_release_notes
- https://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04718196
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04918839
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04923929
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04740527
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04953655
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05128722
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193083
- https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes
- https://kc.mcafee.com/corporate/index?page=content&id=SB10122
- https://openssl.org/news/secadv/20150611.txt
- https://puppet.com/security/cve/CVE-2015-4000
- https://security.gentoo.org/glsa/201506-02
- https://security.gentoo.org/glsa/201512-10
- https://security.gentoo.org/glsa/201603-11
- https://security.gentoo.org/glsa/201701-46
- https://security.netapp.com/advisory/ntap-20150619-0001/
- https://support.citrix.com/article/CTX216642
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03831en_us
- https://weakdh.org/
- https://weakdh.org/imperfect-forward-secrecy.pdf
- https://www-304.ibm.com/support/docview.wss?uid=swg21959745
- https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098403
- https://www.openssl.org/blog/blog/2015/05/20/logjam-freak-upcoming-changes/
- https://www.openssl.org/news/secadv_20150611.txt
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.suse.com/security/cve/CVE-2015-4000.html
Closed vulnerabilities
Modified: 2025-04-12
CVE-2015-5260
Heap-based buffer overflow in SPICE before 0.12.6 allows guest OS users to cause a denial of service (heap-based memory corruption and QEMU-KVM crash) or possibly execute arbitrary code on the host via QXL commands related to the surface_id parameter.
- http://lists.freedesktop.org/archives/spice-devel/2015-October/022191.html
- http://rhn.redhat.com/errata/RHSA-2015-1889.html
- http://rhn.redhat.com/errata/RHSA-2015-1890.html
- http://www.debian.org/security/2015/dsa-3371
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/77019
- http://www.securitytracker.com/id/1033753
- http://www.ubuntu.com/usn/USN-2766-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1260822
- https://security.gentoo.org/glsa/201606-05
- http://lists.freedesktop.org/archives/spice-devel/2015-October/022191.html
- http://rhn.redhat.com/errata/RHSA-2015-1889.html
- http://rhn.redhat.com/errata/RHSA-2015-1890.html
- http://www.debian.org/security/2015/dsa-3371
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/77019
- http://www.securitytracker.com/id/1033753
- http://www.ubuntu.com/usn/USN-2766-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1260822
- https://security.gentoo.org/glsa/201606-05
Modified: 2025-04-12
CVE-2015-5261
Heap-based buffer overflow in SPICE before 0.12.6 allows guest OS users to read and write to arbitrary memory locations on the host via guest QXL commands related to surface creation.
- http://lists.freedesktop.org/archives/spice-devel/2015-October/022191.html
- http://rhn.redhat.com/errata/RHSA-2015-1889.html
- http://rhn.redhat.com/errata/RHSA-2015-1890.html
- http://www.debian.org/security/2015/dsa-3371
- http://www.openwall.com/lists/oss-security/2015/10/06/4
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securitytracker.com/id/1033753
- http://www.ubuntu.com/usn/USN-2766-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1261889
- https://security.gentoo.org/glsa/201606-05
- http://lists.freedesktop.org/archives/spice-devel/2015-October/022191.html
- http://rhn.redhat.com/errata/RHSA-2015-1889.html
- http://rhn.redhat.com/errata/RHSA-2015-1890.html
- http://www.debian.org/security/2015/dsa-3371
- http://www.openwall.com/lists/oss-security/2015/10/06/4
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securitytracker.com/id/1033753
- http://www.ubuntu.com/usn/USN-2766-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1261889
- https://security.gentoo.org/glsa/201606-05
Closed vulnerabilities
Modified: 2021-03-23
BDU:2015-10394
Уязвимость эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю выполнить произвольный код
Modified: 2021-03-23
BDU:2015-10395
Уязвимость гипервизора Xen, позволяющая нарушителю выполнить произвольный код
Modified: 2021-03-23
BDU:2015-10460
Уязвимость эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю повысить свои привилегии, вызвать отказ в обслуживании или получить доступ к защищаемой информации
Modified: 2021-03-23
BDU:2015-11288
Уязвимость эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю выполнить произвольный код на хостовой операционной системе
Modified: 2021-03-23
BDU:2015-11298
Уязвимость эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2021-03-23
BDU:2015-11313
Уязвимость гипервизора Xen, позволяющая нарушителю выполнить произвольный код
Modified: 2021-03-23
BDU:2015-11547
Уязвимость эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
Modified: 2025-04-12
CVE-2015-3209
Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160669.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160677.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160685.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00020.html
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00027.html
- http://rhn.redhat.com/errata/RHSA-2015-1087.html
- http://rhn.redhat.com/errata/RHSA-2015-1088.html
- http://rhn.redhat.com/errata/RHSA-2015-1089.html
- http://rhn.redhat.com/errata/RHSA-2015-1189.html
- http://www.debian.org/security/2015/dsa-3284
- http://www.debian.org/security/2015/dsa-3285
- http://www.debian.org/security/2015/dsa-3286
- http://www.securityfocus.com/bid/75123
- http://www.securitytracker.com/id/1032545
- http://www.ubuntu.com/usn/USN-2630-1
- http://xenbits.xen.org/xsa/advisory-135.html
- https://kb.juniper.net/JSA10783
- https://security.gentoo.org/glsa/201510-02
- https://security.gentoo.org/glsa/201604-03
- https://www.arista.com/en/support/advisories-notices/security-advisories/1180-security-advisory-13
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160669.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160677.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160685.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00020.html
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00027.html
- http://rhn.redhat.com/errata/RHSA-2015-1087.html
- http://rhn.redhat.com/errata/RHSA-2015-1088.html
- http://rhn.redhat.com/errata/RHSA-2015-1089.html
- http://rhn.redhat.com/errata/RHSA-2015-1189.html
- http://www.debian.org/security/2015/dsa-3284
- http://www.debian.org/security/2015/dsa-3285
- http://www.debian.org/security/2015/dsa-3286
- http://www.securityfocus.com/bid/75123
- http://www.securitytracker.com/id/1032545
- http://www.ubuntu.com/usn/USN-2630-1
- http://xenbits.xen.org/xsa/advisory-135.html
- https://kb.juniper.net/JSA10783
- https://security.gentoo.org/glsa/201510-02
- https://security.gentoo.org/glsa/201604-03
- https://www.arista.com/en/support/advisories-notices/security-advisories/1180-security-advisory-13
Modified: 2025-04-12
CVE-2015-3214
The pit_ioport_read in i8254.c in the Linux kernel before 2.6.33 and QEMU before 2.3.1 does not distinguish between read lengths and write lengths, which might allow guest OS users to execute arbitrary code on the host OS by triggering use of an invalid index.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ee73f656a604d5aa9df86a97102e4e462dd79924
- http://mirror.linux.org.au/linux/kernel/v2.6/ChangeLog-2.6.33
- http://rhn.redhat.com/errata/RHSA-2015-1507.html
- http://rhn.redhat.com/errata/RHSA-2015-1508.html
- http://rhn.redhat.com/errata/RHSA-2015-1512.html
- http://www.debian.org/security/2015/dsa-3348
- http://www.openwall.com/lists/oss-security/2015/06/25/7
- http://www.securityfocus.com/bid/75273
- http://www.securitytracker.com/id/1032598
- https://bugzilla.redhat.com/show_bug.cgi?id=1229640
- https://github.com/torvalds/linux/commit/ee73f656a604d5aa9df86a97102e4e462dd79924
- https://security.gentoo.org/glsa/201510-02
- https://support.lenovo.com/product_security/qemu
- https://support.lenovo.com/us/en/product_security/qemu
- https://www.arista.com/en/support/advisories-notices/security-advisories/1180-security-advisory-13
- https://www.exploit-db.com/exploits/37990/
- https://www.mail-archive.com/qemu-devel%40nongnu.org/msg304138.html
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ee73f656a604d5aa9df86a97102e4e462dd79924
- http://mirror.linux.org.au/linux/kernel/v2.6/ChangeLog-2.6.33
- http://rhn.redhat.com/errata/RHSA-2015-1507.html
- http://rhn.redhat.com/errata/RHSA-2015-1508.html
- http://rhn.redhat.com/errata/RHSA-2015-1512.html
- http://www.debian.org/security/2015/dsa-3348
- http://www.openwall.com/lists/oss-security/2015/06/25/7
- http://www.securityfocus.com/bid/75273
- http://www.securitytracker.com/id/1032598
- https://bugzilla.redhat.com/show_bug.cgi?id=1229640
- https://github.com/torvalds/linux/commit/ee73f656a604d5aa9df86a97102e4e462dd79924
- https://security.gentoo.org/glsa/201510-02
- https://support.lenovo.com/product_security/qemu
- https://support.lenovo.com/us/en/product_security/qemu
- https://www.arista.com/en/support/advisories-notices/security-advisories/1180-security-advisory-13
- https://www.exploit-db.com/exploits/37990/
- https://www.mail-archive.com/qemu-devel%40nongnu.org/msg304138.html
Modified: 2025-04-12
CVE-2015-3456
The Floppy Disk Controller (FDC) in QEMU, as used in Xen 4.5.x and earlier and KVM, allows local guest users to cause a denial of service (out-of-bounds write and guest crash) or possibly execute arbitrary code via the (1) FD_CMD_READ_ID, (2) FD_CMD_DRIVE_SPECIFICATION_COMMAND, or other unspecified commands, aka VENOM.
- http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=e907746266721f305d67bc0718795fedee2e824c
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10693
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158072.html
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00013.html
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00019.html
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00042.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00001.html
- http://lists.opensuse.org/opensuse-updates/2015-08/msg00021.html
- http://marc.info/?l=bugtraq&m=143229451215900&w=2
- http://marc.info/?l=bugtraq&m=143387998230996&w=2
- http://rhn.redhat.com/errata/RHSA-2015-0998.html
- http://rhn.redhat.com/errata/RHSA-2015-0999.html
- http://rhn.redhat.com/errata/RHSA-2015-1000.html
- http://rhn.redhat.com/errata/RHSA-2015-1001.html
- http://rhn.redhat.com/errata/RHSA-2015-1002.html
- http://rhn.redhat.com/errata/RHSA-2015-1003.html
- http://rhn.redhat.com/errata/RHSA-2015-1004.html
- http://rhn.redhat.com/errata/RHSA-2015-1011.html
- http://support.citrix.com/article/CTX201078
- http://venom.crowdstrike.com/
- http://www.debian.org/security/2015/dsa-3259
- http://www.debian.org/security/2015/dsa-3262
- http://www.debian.org/security/2015/dsa-3274
- http://www.fortiguard.com/advisory/2015-05-19-cve-2015-3456-venom-vulnerability
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.securityfocus.com/bid/74640
- http://www.securitytracker.com/id/1032306
- http://www.securitytracker.com/id/1032311
- http://www.securitytracker.com/id/1032917
- http://www.ubuntu.com/usn/USN-2608-1
- http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-438937.htm
- http://xenbits.xen.org/xsa/advisory-133.html
- https://access.redhat.com/articles/1444903
- https://bto.bluecoat.com/security-advisory/sa95
- https://kb.juniper.net/JSA10783
- https://kc.mcafee.com/corporate/index?page=content&id=SB10118
- https://security.gentoo.org/glsa/201602-01
- https://security.gentoo.org/glsa/201604-03
- https://security.gentoo.org/glsa/201612-27
- https://securityblog.redhat.com/2015/05/13/venom-dont-get-bitten/
- https://support.lenovo.com/us/en/product_security/venom
- https://www.arista.com/en/support/advisories-notices/security-advisories/1128-security-advisory-10
- https://www.exploit-db.com/exploits/37053/
- https://www.suse.com/security/cve/CVE-2015-3456.html
- http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=e907746266721f305d67bc0718795fedee2e824c
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10693
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158072.html
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00013.html
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00019.html
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00042.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00001.html
- http://lists.opensuse.org/opensuse-updates/2015-08/msg00021.html
- http://marc.info/?l=bugtraq&m=143229451215900&w=2
- http://marc.info/?l=bugtraq&m=143387998230996&w=2
- http://rhn.redhat.com/errata/RHSA-2015-0998.html
- http://rhn.redhat.com/errata/RHSA-2015-0999.html
- http://rhn.redhat.com/errata/RHSA-2015-1000.html
- http://rhn.redhat.com/errata/RHSA-2015-1001.html
- http://rhn.redhat.com/errata/RHSA-2015-1002.html
- http://rhn.redhat.com/errata/RHSA-2015-1003.html
- http://rhn.redhat.com/errata/RHSA-2015-1004.html
- http://rhn.redhat.com/errata/RHSA-2015-1011.html
- http://support.citrix.com/article/CTX201078
- http://venom.crowdstrike.com/
- http://www.debian.org/security/2015/dsa-3259
- http://www.debian.org/security/2015/dsa-3262
- http://www.debian.org/security/2015/dsa-3274
- http://www.fortiguard.com/advisory/2015-05-19-cve-2015-3456-venom-vulnerability
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.securityfocus.com/bid/74640
- http://www.securitytracker.com/id/1032306
- http://www.securitytracker.com/id/1032311
- http://www.securitytracker.com/id/1032917
- http://www.ubuntu.com/usn/USN-2608-1
- http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-438937.htm
- http://xenbits.xen.org/xsa/advisory-133.html
- https://access.redhat.com/articles/1444903
- https://bto.bluecoat.com/security-advisory/sa95
- https://kb.juniper.net/JSA10783
- https://kc.mcafee.com/corporate/index?page=content&id=SB10118
- https://security.gentoo.org/glsa/201602-01
- https://security.gentoo.org/glsa/201604-03
- https://security.gentoo.org/glsa/201612-27
- https://securityblog.redhat.com/2015/05/13/venom-dont-get-bitten/
- https://support.lenovo.com/us/en/product_security/venom
- https://www.arista.com/en/support/advisories-notices/security-advisories/1128-security-advisory-10
- https://www.exploit-db.com/exploits/37053/
- https://www.suse.com/security/cve/CVE-2015-3456.html
Modified: 2025-04-12
CVE-2015-4037
The slirp_smb function in net/slirp.c in QEMU 2.3.0 and earlier creates temporary files with predictable names, which allows local users to cause a denial of service (instantiation failure) by creating /tmp/qemu-smb.*-* files before the program.
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160058.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160414.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00015.html
- http://lists.opensuse.org/opensuse-updates/2015-11/msg00063.html
- http://www.debian.org/security/2015/dsa-3284
- http://www.debian.org/security/2015/dsa-3285
- http://www.openwall.com/lists/oss-security/2015/05/13/7
- http://www.openwall.com/lists/oss-security/2015/05/16/5
- http://www.openwall.com/lists/oss-security/2015/05/23/4
- http://www.securityfocus.com/bid/74809
- http://www.securitytracker.com/id/1032547
- http://www.ubuntu.com/usn/USN-2630-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1222892
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160058.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160414.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00015.html
- http://lists.opensuse.org/opensuse-updates/2015-11/msg00063.html
- http://www.debian.org/security/2015/dsa-3284
- http://www.debian.org/security/2015/dsa-3285
- http://www.openwall.com/lists/oss-security/2015/05/13/7
- http://www.openwall.com/lists/oss-security/2015/05/16/5
- http://www.openwall.com/lists/oss-security/2015/05/23/4
- http://www.securityfocus.com/bid/74809
- http://www.securitytracker.com/id/1032547
- http://www.ubuntu.com/usn/USN-2630-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1222892
Modified: 2025-04-12
CVE-2015-4106
QEMU does not properly restrict write access to the PCI config space for certain PCI pass-through devices, which might allow local x86 HVM guests to gain privileges, cause a denial of service (host crash), obtain sensitive information, or possibly have other unspecified impact via unknown vectors.
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160154.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160171.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160685.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html
- http://support.citrix.com/article/CTX201145
- http://www.debian.org/security/2015/dsa-3284
- http://www.debian.org/security/2015/dsa-3286
- http://www.securityfocus.com/bid/74949
- http://www.securitytracker.com/id/1032467
- http://www.ubuntu.com/usn/USN-2630-1
- http://xenbits.xen.org/xsa/advisory-131.html
- https://security.gentoo.org/glsa/201604-03
- https://support.citrix.com/article/CTX206006
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160154.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160171.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160685.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html
- http://support.citrix.com/article/CTX201145
- http://www.debian.org/security/2015/dsa-3284
- http://www.debian.org/security/2015/dsa-3286
- http://www.securityfocus.com/bid/74949
- http://www.securitytracker.com/id/1032467
- http://www.ubuntu.com/usn/USN-2630-1
- http://xenbits.xen.org/xsa/advisory-131.html
- https://security.gentoo.org/glsa/201604-03
- https://support.citrix.com/article/CTX206006
Modified: 2025-04-12
CVE-2015-5154
Heap-based buffer overflow in the IDE subsystem in QEMU, as used in Xen 4.5.x and earlier, when the container has a CDROM drive enabled, allows local guest users to execute arbitrary code on the host via unspecified ATAPI commands.
- http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163472.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163658.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163681.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00041.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00042.html
- http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00020.html
- http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00022.html
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00019.html
- http://rhn.redhat.com/errata/RHSA-2015-1507.html
- http://rhn.redhat.com/errata/RHSA-2015-1508.html
- http://rhn.redhat.com/errata/RHSA-2015-1512.html
- http://support.citrix.com/article/CTX201593
- http://www.debian.org/security/2015/dsa-3348
- http://www.securityfocus.com/bid/76048
- http://www.securitytracker.com/id/1033074
- http://xenbits.xen.org/xsa/advisory-138.html
- https://security.gentoo.org/glsa/201510-02
- https://security.gentoo.org/glsa/201604-03
- http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163472.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163658.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163681.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00041.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00042.html
- http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00020.html
- http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00022.html
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00019.html
- http://rhn.redhat.com/errata/RHSA-2015-1507.html
- http://rhn.redhat.com/errata/RHSA-2015-1508.html
- http://rhn.redhat.com/errata/RHSA-2015-1512.html
- http://support.citrix.com/article/CTX201593
- http://www.debian.org/security/2015/dsa-3348
- http://www.securityfocus.com/bid/76048
- http://www.securitytracker.com/id/1033074
- http://xenbits.xen.org/xsa/advisory-138.html
- https://security.gentoo.org/glsa/201510-02
- https://security.gentoo.org/glsa/201604-03
Modified: 2025-04-12
CVE-2015-5158
Stack-based buffer overflow in hw/scsi/scsi-bus.c in QEMU, when built with SCSI-device emulation support, allows guest OS users with CAP_SYS_RAWIO permissions to cause a denial of service (instance crash) via an invalid opcode in a SCSI command descriptor block.
- http://www.securityfocus.com/bid/76016
- http://www.securitytracker.com/id/1033095
- https://lists.nongnu.org/archive/html/qemu-devel/2015-07/msg04558.html
- https://security.gentoo.org/glsa/201510-02
- http://www.securityfocus.com/bid/76016
- http://www.securitytracker.com/id/1033095
- https://lists.nongnu.org/archive/html/qemu-devel/2015-07/msg04558.html
- https://security.gentoo.org/glsa/201510-02
Modified: 2025-04-12
CVE-2015-5225
Buffer overflow in the vnc_refresh_server_surface function in the VNC display driver in QEMU before 2.4.0.1 allows guest users to cause a denial of service (heap memory corruption and process crash) or possibly execute arbitrary code on the host via unspecified vectors, related to refreshing the server display surface.
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169039.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165484.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-September/166798.html
- http://rhn.redhat.com/errata/RHSA-2015-1772.html
- http://rhn.redhat.com/errata/RHSA-2015-1837.html
- http://www.debian.org/security/2015/dsa-3348
- http://www.openwall.com/lists/oss-security/2015/08/21/6
- http://www.securityfocus.com/bid/76506
- http://www.securitytracker.com/id/1033547
- https://lists.gnu.org/archive/html/qemu-devel/2015-08/msg02495.html
- https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg05832.html
- https://security.gentoo.org/glsa/201602-01
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169039.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165484.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-September/166798.html
- http://rhn.redhat.com/errata/RHSA-2015-1772.html
- http://rhn.redhat.com/errata/RHSA-2015-1837.html
- http://www.debian.org/security/2015/dsa-3348
- http://www.openwall.com/lists/oss-security/2015/08/21/6
- http://www.securityfocus.com/bid/76506
- http://www.securitytracker.com/id/1033547
- https://lists.gnu.org/archive/html/qemu-devel/2015-08/msg02495.html
- https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg05832.html
- https://security.gentoo.org/glsa/201602-01
Modified: 2024-11-21
CVE-2015-5278
The ne2000_receive function in hw/net/ne2000.c in QEMU before 2.4.0.1 allows attackers to cause a denial of service (infinite loop and instance crash) or possibly execute arbitrary code via vectors related to receiving packets.
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168077.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168646.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168671.html
- http://www.openwall.com/lists/oss-security/2015/09/15/2
- http://www.ubuntu.com/usn/USN-2745-1
- https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg03985.html
- https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg05832.html
- https://www.arista.com/en/support/advisories-notices/security-advisories/1188-security-advisory-14
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168077.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168646.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168671.html
- http://www.openwall.com/lists/oss-security/2015/09/15/2
- http://www.ubuntu.com/usn/USN-2745-1
- https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg03985.html
- https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg05832.html
- https://www.arista.com/en/support/advisories-notices/security-advisories/1188-security-advisory-14
Modified: 2025-04-12
CVE-2015-5279
Heap-based buffer overflow in the ne2000_receive function in hw/net/ne2000.c in QEMU before 2.4.0.1 allows guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via vectors related to receiving packets.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=7aa2bcad0ca837dd6d4bf4fa38a80314b4a6b755
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169036.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169039.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167369.html
- http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00019.html
- http://rhn.redhat.com/errata/RHSA-2015-1896.html
- http://rhn.redhat.com/errata/RHSA-2015-1923.html
- http://rhn.redhat.com/errata/RHSA-2015-1924.html
- http://rhn.redhat.com/errata/RHSA-2015-1925.html
- http://www.debian.org/security/2015/dsa-3361
- http://www.debian.org/security/2015/dsa-3362
- http://www.openwall.com/lists/oss-security/2015/09/15/3
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/76746
- http://www.securitytracker.com/id/1033569
- https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg03984.html
- https://security.gentoo.org/glsa/201602-01
- https://www.arista.com/en/support/advisories-notices/security-advisories/1188-security-advisory-14
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=7aa2bcad0ca837dd6d4bf4fa38a80314b4a6b755
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169036.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169039.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167369.html
- http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00019.html
- http://rhn.redhat.com/errata/RHSA-2015-1896.html
- http://rhn.redhat.com/errata/RHSA-2015-1923.html
- http://rhn.redhat.com/errata/RHSA-2015-1924.html
- http://rhn.redhat.com/errata/RHSA-2015-1925.html
- http://www.debian.org/security/2015/dsa-3361
- http://www.debian.org/security/2015/dsa-3362
- http://www.openwall.com/lists/oss-security/2015/09/15/3
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/76746
- http://www.securitytracker.com/id/1033569
- https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg03984.html
- https://security.gentoo.org/glsa/201602-01
- https://www.arista.com/en/support/advisories-notices/security-advisories/1188-security-advisory-14
Modified: 2024-11-21
CVE-2015-5745
Buffer overflow in the send_control_msg function in hw/char/virtio-serial-bus.c in QEMU before 2.4.0 allows guest users to cause a denial of service (QEMU process crash) via a crafted virtio control message.
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168077.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168646.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168671.html
- http://www.openwall.com/lists/oss-security/2015/08/06/3
- http://www.openwall.com/lists/oss-security/2015/08/06/5
- https://github.com/qemu/qemu/commit/7882080388be5088e72c425b02223c02e6cb4295
- https://lists.gnu.org/archive/html/qemu-devel/2015-07/msg05458.html
- https://www.arista.com/en/support/advisories-notices/security-advisories/1180-security-advisory-13
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168077.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168646.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168671.html
- http://www.openwall.com/lists/oss-security/2015/08/06/3
- http://www.openwall.com/lists/oss-security/2015/08/06/5
- https://github.com/qemu/qemu/commit/7882080388be5088e72c425b02223c02e6cb4295
- https://lists.gnu.org/archive/html/qemu-devel/2015-07/msg05458.html
- https://www.arista.com/en/support/advisories-notices/security-advisories/1180-security-advisory-13
Modified: 2024-11-21
CVE-2015-6815
The process_tx_desc function in hw/net/e1000.c in QEMU before 2.4.0.1 does not properly process transmit descriptor data when sending a network packet, which allows attackers to cause a denial of service (infinite loop and guest crash) via unspecified vectors.
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168077.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168646.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168671.html
- http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00011.html
- http://www.openwall.com/lists/oss-security/2015/09/04/4
- http://www.openwall.com/lists/oss-security/2015/09/05/5
- http://www.ubuntu.com/usn/USN-2745-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1260076
- https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg01199.html
- https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg05832.html
- https://www.arista.com/en/support/advisories-notices/security-advisories/1188-security-advisory-14
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168077.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168646.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168671.html
- http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00011.html
- http://www.openwall.com/lists/oss-security/2015/09/04/4
- http://www.openwall.com/lists/oss-security/2015/09/05/5
- http://www.ubuntu.com/usn/USN-2745-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1260076
- https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg01199.html
- https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg05832.html
- https://www.arista.com/en/support/advisories-notices/security-advisories/1188-security-advisory-14
Modified: 2025-04-12
CVE-2015-8817
QEMU (aka Quick Emulator) built to use 'address_space_translate' to map an address to a MemoryRegionSection is vulnerable to an OOB r/w access issue. It could occur while doing pci_dma_read/write calls. Affects QEMU versions >= 1.6.0 and <= 2.3.1. A privileged user inside guest could use this flaw to crash the guest instance resulting in DoS.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=23820dbfc79d1c9dce090b4c555994f2bb6a69b3
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=c3c1bb99d1c11978d9ce94d1bdcf0705378c1459
- http://rhn.redhat.com/errata/RHSA-2016-2670.html
- http://rhn.redhat.com/errata/RHSA-2016-2671.html
- http://rhn.redhat.com/errata/RHSA-2016-2704.html
- http://rhn.redhat.com/errata/RHSA-2016-2705.html
- http://rhn.redhat.com/errata/RHSA-2016-2706.html
- http://www.openwall.com/lists/oss-security/2016/03/01/1
- http://www.openwall.com/lists/oss-security/2016/03/01/10
- https://bugzilla.redhat.com/show_bug.cgi?id=1300771
- https://lists.gnu.org/archive/html/qemu-stable/2016-01/msg00060.html
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=23820dbfc79d1c9dce090b4c555994f2bb6a69b3
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=c3c1bb99d1c11978d9ce94d1bdcf0705378c1459
- http://rhn.redhat.com/errata/RHSA-2016-2670.html
- http://rhn.redhat.com/errata/RHSA-2016-2671.html
- http://rhn.redhat.com/errata/RHSA-2016-2704.html
- http://rhn.redhat.com/errata/RHSA-2016-2705.html
- http://rhn.redhat.com/errata/RHSA-2016-2706.html
- http://www.openwall.com/lists/oss-security/2016/03/01/1
- http://www.openwall.com/lists/oss-security/2016/03/01/10
- https://bugzilla.redhat.com/show_bug.cgi?id=1300771
- https://lists.gnu.org/archive/html/qemu-stable/2016-01/msg00060.html
Modified: 2025-04-12
CVE-2015-8818
The cpu_physical_memory_write_rom_internal function in exec.c in QEMU (aka Quick Emulator) does not properly skip MMIO regions, which allows local privileged guest users to cause a denial of service (guest crash) via unspecified vectors.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=b242e0e0e2969c044a318e56f7988bbd84de1f63
- http://rhn.redhat.com/errata/RHSA-2016-2670.html
- http://rhn.redhat.com/errata/RHSA-2016-2671.html
- http://rhn.redhat.com/errata/RHSA-2016-2704.html
- http://rhn.redhat.com/errata/RHSA-2016-2705.html
- http://rhn.redhat.com/errata/RHSA-2016-2706.html
- http://www.openwall.com/lists/oss-security/2016/03/01/1
- http://www.openwall.com/lists/oss-security/2016/03/01/10
- https://bugzilla.redhat.com/show_bug.cgi?id=1300771
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=b242e0e0e2969c044a318e56f7988bbd84de1f63
- http://rhn.redhat.com/errata/RHSA-2016-2670.html
- http://rhn.redhat.com/errata/RHSA-2016-2671.html
- http://rhn.redhat.com/errata/RHSA-2016-2704.html
- http://rhn.redhat.com/errata/RHSA-2016-2705.html
- http://rhn.redhat.com/errata/RHSA-2016-2706.html
- http://www.openwall.com/lists/oss-security/2016/03/01/1
- http://www.openwall.com/lists/oss-security/2016/03/01/10
- https://bugzilla.redhat.com/show_bug.cgi?id=1300771
Modified: 2025-04-12
CVE-2016-1714
The (1) fw_cfg_write and (2) fw_cfg_read functions in hw/nvram/fw_cfg.c in QEMU before 2.4, when built with the Firmware Configuration device emulation support, allow guest OS users with the CAP_SYS_RAWIO privilege to cause a denial of service (out-of-bounds read or write access and process crash) or possibly execute arbitrary code via an invalid current entry value in a firmware configuration.
- http://rhn.redhat.com/errata/RHSA-2016-0081.html
- http://rhn.redhat.com/errata/RHSA-2016-0082.html
- http://rhn.redhat.com/errata/RHSA-2016-0083.html
- http://rhn.redhat.com/errata/RHSA-2016-0084.html
- http://rhn.redhat.com/errata/RHSA-2016-0085.html
- http://rhn.redhat.com/errata/RHSA-2016-0086.html
- http://rhn.redhat.com/errata/RHSA-2016-0087.html
- http://rhn.redhat.com/errata/RHSA-2016-0088.html
- http://www.debian.org/security/2016/dsa-3469
- http://www.debian.org/security/2016/dsa-3470
- http://www.debian.org/security/2016/dsa-3471
- http://www.openwall.com/lists/oss-security/2016/01/11/7
- http://www.openwall.com/lists/oss-security/2016/01/12/10
- http://www.openwall.com/lists/oss-security/2016/01/12/11
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.securityfocus.com/bid/80250
- http://www.securitytracker.com/id/1034858
- https://lists.gnu.org/archive/html/qemu-devel/2016-01/msg00428.html
- https://security.gentoo.org/glsa/201604-01
- http://rhn.redhat.com/errata/RHSA-2016-0081.html
- http://rhn.redhat.com/errata/RHSA-2016-0082.html
- http://rhn.redhat.com/errata/RHSA-2016-0083.html
- http://rhn.redhat.com/errata/RHSA-2016-0084.html
- http://rhn.redhat.com/errata/RHSA-2016-0085.html
- http://rhn.redhat.com/errata/RHSA-2016-0086.html
- http://rhn.redhat.com/errata/RHSA-2016-0087.html
- http://rhn.redhat.com/errata/RHSA-2016-0088.html
- http://www.debian.org/security/2016/dsa-3469
- http://www.debian.org/security/2016/dsa-3470
- http://www.debian.org/security/2016/dsa-3471
- http://www.openwall.com/lists/oss-security/2016/01/11/7
- http://www.openwall.com/lists/oss-security/2016/01/12/10
- http://www.openwall.com/lists/oss-security/2016/01/12/11
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.securityfocus.com/bid/80250
- http://www.securitytracker.com/id/1034858
- https://lists.gnu.org/archive/html/qemu-devel/2016-01/msg00428.html
- https://security.gentoo.org/glsa/201604-01