You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa qemu

Sigurnosni nedostaci programskog paketa qemu

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

Fedora Update Notification
2016-02-21 16:23:38.007228

Name : qemu
Product : Fedora 23
Version : 2.4.1
Release : 7.fc23
Summary : QEMU is a FAST! processor emulator
Description :
QEMU is a generic and open source processor emulator which achieves a good
emulation speed by using dynamic translation. QEMU has two operating modes:

* Full system emulation. In this mode, QEMU emulates a full system (for
example a PC), including a processor and various peripherials. It can be
used to launch different Operating Systems without rebooting the PC or
to debug system code.
* User mode emulation. In this mode, QEMU can launch Linux processes compiled
for one CPU on another CPU.

As QEMU requires no host kernel patches to run, it is safe and easy to use.

Update Information:

* CVE-2015-8619: Fix sendkey out of bounds (bz #1292757) * CVE-2016-1981:
infinite loop in e1000 (bz #1299995) * Fix Out-of-bounds read in usb-ehci (bz
#1300234, bz #1299455) * CVE-2016-2197: ahci: null pointer dereference (bz
#1302952) * Fix gdbstub for VSX registers for ppc64 (bz #1304377) * Fix qemu-img
vmdk images to work with VMware (bz #1299185)

[ 1 ] Bug #1299455 – Qemu: usb ehci out-of-bounds read in ehci_process_itd
[ 2 ] Bug #1283926 – CVE-2015-8619 Qemu: hmp: stack based OOB write in hmp_sendkey routine
[ 3 ] Bug #1298570 – CVE-2016-1981 Qemu: net: e1000 infinite loop in start_xmit and e1000_receive_iov routines
[ 4 ] Bug #1302057 – CVE-2016-2197 Qemu: ide: ahci null pointer dereference when using FIS CLB engines

This update can be installed with the “yum” update program. Use
su -c ‘yum update qemu’ at the command line.
For more information, refer to “Managing Software with yum”,
available at

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
package-announce mailing list

AutorMarko Stanec
Cert idNCERT-REF-2016-02-0020-ADV
More in Preporuke
Ranjivost programskog paketa chromium

Otkrivena je kritična ranjivost u programskom paketu chromium za RHEL 6. Ranjivost udaljenom napadaču omogućuje zaobilaženje Blink Same Origin pravila...