Login
Login-Name Passwort


 
Newsletter
Werbung

Sicherheit: Mehrere Probleme in QEMU
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in QEMU
ID: FEDORA-2016-bfaf6a133b
Distribution: Fedora
Plattformen: Fedora 22
Datum: Sa, 9. April 2016, 10:24
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2857
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2392
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2841
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2538

Originalnachricht

Name        : qemu
Product : Fedora 22
Version : 2.3.1
Release : 13.fc22
URL : http://www.qemu.org/
Summary : QEMU is a FAST! processor emulator
Description :
QEMU is a generic and open source processor emulator which achieves a good
emulation speed by using dynamic translation. QEMU has two operating modes:

* Full system emulation. In this mode, QEMU emulates a full system (for
example a PC), including a processor and various peripherials. It can be
used to launch different Operating Systems without rebooting the PC or
to debug system code.
* User mode emulation. In this mode, QEMU can launch Linux processes compiled
for one CPU on another CPU.

As QEMU requires no host kernel patches to run, it is safe and easy to use.

-------------------------------------------------------------------------------
-
Update Information:

* CVE-2016-2538: Integer overflow in usb module (bz #1305815) * CVE-2016-2841:
ne2000: infinite loop (bz #1304047) * CVE-2016-2857: net: out of bounds read
(bz
#1309564) * CVE-2016-2392: usb: null pointer dereference (bz #1307115) * spice:
fix spice_chr_add_watch() crash (bz #1315049)
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1303120 - CVE-2016-2538 Qemu: usb: integer overflow in remote NDIS
control message handling
https://bugzilla.redhat.com/show_bug.cgi?id=1303120
[ 2 ] Bug #1303106 - CVE-2016-2841 Qemu: net: ne2000: infinite loop in
ne2000_receive
https://bugzilla.redhat.com/show_bug.cgi?id=1303106
[ 3 ] Bug #1296567 - CVE-2016-2857 Qemu: net: out of bounds read in
net_checksum_calculate()
https://bugzilla.redhat.com/show_bug.cgi?id=1296567
[ 4 ] Bug #1302299 - CVE-2016-2392 Qemu: usb: null pointer dereference in
remote NDIS control message handling
https://bugzilla.redhat.com/show_bug.cgi?id=1302299
-------------------------------------------------------------------------------
-

This update can be installed with the "yum" update program. Use
su -c 'yum update qemu' at the command line.
For more information, refer to "Managing Software with yum",
available at https://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung