Login
Login-Name Passwort


 
Newsletter
Werbung

Sicherheit: Mehrere Probleme in qemu
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in qemu
ID: FEDORA-2017-9149114fba
Distribution: Fedora
Plattformen: Fedora 26
Datum: Di, 7. November 2017, 23:26
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11434
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12809
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14167
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13672
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268

Originalnachricht

-------------------------------------------------------------------------------
-
Fedora Update Notification
FEDORA-2017-9149114fba
2017-11-07 21:00:14.741722
-------------------------------------------------------------------------------
-

Name : qemu
Product : Fedora 26
Version : 2.9.1
Release : 2.fc26
URL : http://www.qemu.org/
Summary : QEMU is a FAST! processor emulator
Description :
QEMU is a generic and open source processor emulator which achieves a good
emulation speed by using dynamic translation. QEMU has two operating modes:

* Full system emulation. In this mode, QEMU emulates a full system (for
example a PC), including a processor and various peripherials. It can be
used to launch different Operating Systems without rebooting the PC or
to debug system code.
* User mode emulation. In this mode, QEMU can launch Linux processes compiled
for one CPU on another CPU.

As QEMU requires no host kernel patches to run, it is safe and easy to use.

-------------------------------------------------------------------------------
-
Update Information:

* Fix usb3 drive issues with windows guests (bz #1493196) * CVE-2017-15038: 9p:
information disclosure when reading extended attributes (bz #1499111) *
CVE-2017-15268: potential memory exhaustion via websock connection to VNC (bz
#1496882) * CVE-2017-14167: multiboot OOB access while loading kernel image (bz
#1489376) * CVE-2017-13672: vga: OOB read access during display update (bz
#1486561) * CVE-2017-12809: flushing of empty CDROM drives leads to NULL deref
(bz #1483536) * CVE-2017-11434 slirp: out-of-bounds read while parsing dhcp
options (bz #1472612) * Fix sending multimedia keys through spice (bz #1471758)
* Another ppc64le binfmt fix (bz #1500526)
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1499110 - CVE-2017-15038 Qemu: 9p: virtfs: information disclosure
when reading extended attributes
https://bugzilla.redhat.com/show_bug.cgi?id=1499110
[ 2 ] Bug #1496879 - CVE-2017-15268 Qemu: I/O: potential memory exhaustion
via websock connection to VNC
https://bugzilla.redhat.com/show_bug.cgi?id=1496879
[ 3 ] Bug #1489375 - CVE-2017-14167 Qemu: i386: multiboot OOB access while
loading kernel image
https://bugzilla.redhat.com/show_bug.cgi?id=1489375
[ 4 ] Bug #1486560 - CVE-2017-13672 Qemu: vga: OOB read access during display
update
https://bugzilla.redhat.com/show_bug.cgi?id=1486560
[ 5 ] Bug #1483534 - CVE-2017-12809 Qemu: ide: flushing of empty CDROM drives
leads to NULL dereference
https://bugzilla.redhat.com/show_bug.cgi?id=1483534
[ 6 ] Bug #1472611 - CVE-2017-11434 Qemu: slirp: out-of-bounds read while
parsing dhcp options
https://bugzilla.redhat.com/show_bug.cgi?id=1472611
-------------------------------------------------------------------------------
-

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade qemu' at the command line.
For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Pro-Linux
Pro-Linux @Twitter
Neue Nachrichten
Werbung