You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa qemu

Sigurnosni nedostaci programskog paketa qemu

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2016-d3a56228f5
2016-06-06 19:18:36.211449
——————————————————————————–

Name : qemu
Product : Fedora 22
Version : 2.3.1
Release : 15.fc22
URL : http://www.qemu.org/
Summary : QEMU is a FAST! processor emulator
Description :
QEMU is a generic and open source processor emulator which achieves a good
emulation speed by using dynamic translation. QEMU has two operating modes:

* Full system emulation. In this mode, QEMU emulates a full system (for
example a PC), including a processor and various peripherials. It can be
used to launch different Operating Systems without rebooting the PC or
to debug system code.
* User mode emulation. In this mode, QEMU can launch Linux processes compiled
for one CPU on another CPU.

As QEMU requires no host kernel patches to run, it is safe and easy to use.

——————————————————————————–
Update Information:

* CVE-2016-4020: memory leak in kvmvapic.c (bz #1326904) * CVE-2016-4439: scsi:
esb: OOB write #1 (bz #1337503) * CVE-2016-4441: scsi: esb: OOB write #2 (bz
#1337506) * Fix regression installing windows 7 with qxl/vga (bz #1339267)
——————————————————————————–
References:

[ 1 ] Bug #1313686 – CVE-2016-4020 Qemu: i386: leakage of stack memory to guest in kvmvapic.c
https://bugzilla.redhat.com/show_bug.cgi?id=1313686
[ 2 ] Bug #1337502 – CVE-2016-4439 Qemu: scsi: esp: OOB write while writing to ‘s->cmdbuf’ in esp_reg_write
https://bugzilla.redhat.com/show_bug.cgi?id=1337502
[ 3 ] Bug #1337505 – CVE-2016-4441 Qemu: scsi: esp: OOB write while writing to ‘s->cmdbuf’ in get_cmd
https://bugzilla.redhat.com/show_bug.cgi?id=1337505
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update qemu’ at the command line.
For more information, refer to “Managing Software with yum”,
available at https://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://lists.fedoraproject.org/admin/lists/package-announce@lists.fedoraproject.org

AutorMarko Stanec
Cert idNCERT-REF-2016-06-0024-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostatak programskog paketa glibc

Otkriven je sigurnosni nedostatak u programskom paketu glibc za operacijski sustav Fedora. Otkriveni nedostatak potencijalnim napadačima omogućuje prepisivanje stoga. Savjetuje...

Close