You are here
Home > Preporuke > Ranjivosti programskog paketa qemu

Ranjivosti programskog paketa qemu

  • Detalji os-a: FED
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2016-e9bba2bb01
2016-01-12 04:16:48.157445
——————————————————————————–

Name : qemu
Product : Fedora 23
Version : 2.4.1
Release : 5.fc23
URL : http://www.qemu.org/
Summary : QEMU is a FAST! processor emulator
Description :
QEMU is a generic and open source processor emulator which achieves a good
emulation speed by using dynamic translation. QEMU has two operating modes:

* Full system emulation. In this mode, QEMU emulates a full system (for
example a PC), including a processor and various peripherials. It can be
used to launch different Operating Systems without rebooting the PC or
to debug system code.
* User mode emulation. In this mode, QEMU can launch Linux processes compiled
for one CPU on another CPU.

As QEMU requires no host kernel patches to run, it is safe and easy to use.

——————————————————————————–
Update Information:

* CVE-2015-7549: pci: null pointer dereference issue (bz #1291138) *
CVE-2015-8558: DoS by infinite loop in ehci_advance_state (bz #1291309) *
CVE-2015-8666: Heap-based buffer overrun during VM migration (bz #1294027) *
CVE-2015-8744: vmxnet3: fix crash with short packets (bz #1295440) *
CVE-2015-8745: vmxnet3: don’t assert reading registers in bar0 (bz #1295442)
——————————————————————————–
References:

[ 1 ] Bug #1291137 – CVE-2015-7549 Qemu: pci: null pointer dereference issue
https://bugzilla.redhat.com/show_bug.cgi?id=1291137
[ 2 ] Bug #1277983 – CVE-2015-8558 Qemu: usb: infinite loop in ehci_advance_state results in DoS
https://bugzilla.redhat.com/show_bug.cgi?id=1277983
[ 3 ] Bug #1283722 – CVE-2015-8666 Qemu: acpi: heap based buffer overrun during VM migration
https://bugzilla.redhat.com/show_bug.cgi?id=1283722
[ 4 ] Bug #1270871 – CVE-2015-8744 Qemu: net: vmxnet3: incorrect l2 header validation leads to a crash via assert(2) call
https://bugzilla.redhat.com/show_bug.cgi?id=1270871
[ 5 ] Bug #1270876 – CVE-2015-8745 Qemu: net: vmxnet3: reading IMR registers leads to a crash via assert(2) call
https://bugzilla.redhat.com/show_bug.cgi?id=1270876
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update qemu’ at the command line.
For more information, refer to “Managing Software with yum”,
available at https://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce

AutorTomislav Protega
Cert idNCERT-REF-2016-01-0015-ADV
CveCVE-2015-7549 CVE-2015-8558 CVE-2015-8666 CVE-2015-8744 CVE-2015-8745
ID izvornikaFEDORA-2016
Proizvodqemu
Izvorhttp://www.redhat.com
Top
More in Preporuke
Ranjivosti programskog paketa oxide-qt

Otkrivene su ranjivosti u u programskoj biblioteci mehanizma web preglednika, oxide-qt, za Ubuntu 14.04 LTS, 15.04 i 15.10. Zahvaćeno je...

Close