Login


 
Newsletter
Werbung

Sicherheit: Mehrere Probleme in QEMU
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in QEMU
ID: FEDORA-2016-42778e8c82
Distribution: Fedora
Plattformen: Fedora 23
Datum: So, 24. Januar 2016, 10:51
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8701
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922

Originalnachricht

Name        : qemu
Product : Fedora 23
Version : 2.4.1
Release : 6.fc23
URL : http://www.qemu.org/
Summary : QEMU is a FAST! processor emulator
Description :
QEMU is a generic and open source processor emulator which achieves a good
emulation speed by using dynamic translation. QEMU has two operating modes:

* Full system emulation. In this mode, QEMU emulates a full system (for
example a PC), including a processor and various peripherials. It can be
used to launch different Operating Systems without rebooting the PC or
to debug system code.
* User mode emulation. In this mode, QEMU can launch Linux processes compiled
for one CPU on another CPU.

As QEMU requires no host kernel patches to run, it is safe and easy to use.

-------------------------------------------------------------------------------
-
Update Information:

* CVE-2015-8745: vmxnet3: don't assert reading registers in bar0 (bz
#1295442) *
CVE-2015-8567: net: vmxnet3: host memory leakage (bz #1289818) * CVE-2016-1922:
i386: avoid null pointer dereference (bz #1292766) * CVE-2015-8613: buffer
overflow in megasas_ctrl_get_info (bz #1284008) * CVE-2015-8701: Buffer
overflow
in tx_consume in rocker.c (bz #1293720) * CVE-2015-8743: ne2000: OOB memory
access in ioport r/w functions (bz #1294787) * CVE-2016-1568: Use-after-free
vulnerability in ahci (bz #1297023) * Fix modules.d/kvm.conf example syntax (bz
#1298823)
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1284008 - CVE-2015-8613 Qemu: scsi: stack based buffer overflow in
megasas_ctrl_get_info
https://bugzilla.redhat.com/show_bug.cgi?id=1284008
[ 2 ] Bug #1270876 - CVE-2015-8745 Qemu: net: vmxnet3: reading IMR registers
leads to a crash via assert(2) call
https://bugzilla.redhat.com/show_bug.cgi?id=1270876
[ 3 ] Bug #1289816 - CVE-2015-8568 CVE-2015-8567 Qemu: net: vmxnet3: host
memory leakage
https://bugzilla.redhat.com/show_bug.cgi?id=1289816
[ 4 ] Bug #1283934 - CVE-2016-1922 Qemu: i386: null pointer dereference in
vapic_write()
https://bugzilla.redhat.com/show_bug.cgi?id=1283934
[ 5 ] Bug #1286971 - CVE-2015-8701 Qemu: net: rocker: stack buffer
overflow(off-by-one) in tx_consume routine
https://bugzilla.redhat.com/show_bug.cgi?id=1286971
[ 6 ] Bug #1264929 - CVE-2015-8743 Qemu: net: ne2000: OOB memory access in
ioport r/w functions
https://bugzilla.redhat.com/show_bug.cgi?id=1264929
[ 7 ] Bug #1288532 - CVE-2016-1568 Qemu: ide: ahci use-after-free
vulnerability in aio port commands
https://bugzilla.redhat.com/show_bug.cgi?id=1288532
-------------------------------------------------------------------------------
-

This update can be installed with the "yum" update program. Use
su -c 'yum update qemu' at the command line.
For more information, refer to "Managing Software with yum",
available at https://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung