<?xml version="1.0" encoding="UTF-8"?>
<!--PATCHINFO id="05112c21c454767c8572d5c0784b53c4"!-->
<update status="stable" from="maint-coord@suse.de" type="security" version="1537">
  <id>dbg111-qemu</id>
  <title>QEMU: possible guest escape</title>
  <release>openSUSE 11.1</release>
  <issued date="1257988013"/>
  <references>
    <reference href="https://bugzilla.novell.com/show_bug.cgi?id=547554" id="547554" title="bug number 547554" type="bugzilla"/>
  </references>
  <description>The VNC server of qemu was vulnerable to use-after-free
bugs, that allowed the execution of code on the host system
initiated from the guest system. This can be used to escape
from the guest machine to the host machine. (CVE-2009-3616:
CVSS v2 Base Score: 8.5)
</description>
  <pkglist>
    <collection>
        <package name="qemu-debuginfo" arch="i586" version="0.10.1" release="0.2.1">
          <filename>qemu-debuginfo-0.10.1-0.2.1.i586.rpm</filename>
        </package>
        <package name="qemu-debuginfo" arch="ppc" version="0.10.1" release="0.2.1">
          <filename>qemu-debuginfo-0.10.1-0.2.1.ppc.rpm</filename>
        </package>
        <package name="qemu-debuginfo" arch="x86_64" version="0.10.1" release="0.2.1">
          <filename>qemu-debuginfo-0.10.1-0.2.1.x86_64.rpm</filename>
        </package>
        <package name="qemu-debugsource" arch="i586" version="0.10.1" release="0.2.1">
          <filename>qemu-debugsource-0.10.1-0.2.1.i586.rpm</filename>
        </package>
        <package name="qemu-debugsource" arch="ppc" version="0.10.1" release="0.2.1">
          <filename>qemu-debugsource-0.10.1-0.2.1.ppc.rpm</filename>
        </package>
        <package name="qemu-debugsource" arch="x86_64" version="0.10.1" release="0.2.1">
          <filename>qemu-debugsource-0.10.1-0.2.1.x86_64.rpm</filename>
        </package>
    </collection>
  </pkglist>
</update>
