Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in QEMU
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in QEMU
ID: FEDORA-2014-6288
Distribution: Fedora
Plattformen: Fedora 20
Datum: Fr, 16. Mai 2014, 13:36
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4148
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4149
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4150
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4151
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4526
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4527
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4529
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4530
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4531
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4533
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4534
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4535
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4536
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4537
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4538
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4539
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4540
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4541
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4542
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6399
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0182
Applikationen: QEMU

Originalnachricht

Name        : qemu
Product : Fedora 20
Version : 1.6.2
Release : 5.fc20
URL : http://www.qemu.org/
Summary : QEMU is a FAST! processor emulator
Description :
QEMU is a generic and open source processor emulator which achieves a good
emulation speed by using dynamic translation. QEMU has two operating modes:

* Full system emulation. In this mode, QEMU emulates a full system (for
example a PC), including a processor and various peripherials. It can be
used to launch different Operating Systems without rebooting the PC or
to debug system code.
* User mode emulation. In this mode, QEMU can launch Linux processes compiled
for one CPU on another CPU.

As QEMU requires no host kernel patches to run, it is safe and easy to use.

-------------------------------------------------------------------------------
-
Update Information:

* Migration CVEs: CVE-2014-0182 etc.
-------------------------------------------------------------------------------
-
ChangeLog:

* Sun May 11 2014 Cole Robinson <crobinso@redhat.com> - 2:1.6.2-5
- Migration CVEs: CVE-2014-0182 etc.
* Tue Apr 29 2014 Cole Robinson <crobinso@redhat.com> - 2:1.6.2-4
- Fix arm sd warnings with latest kernel (bz #1091548)
- Fix regression in CVE backport that affects openstack (thanks lbezdick)
* Fri Apr 25 2014 Cole Robinson <crobinso@redhat.com> - 2:1.6.2-3
- Fix guest startup crashes from autotest (bz #1081610)
* Thu Apr 24 2014 Cole Robinson <crobinso@redhat.com> - 2:1.6.2-2
- Block/image format validation CVE-2014-0142 - 2014-0148 (bz #1078201, bz
- CVE-2014-0150: virtio-net: buffer overflow in virtio_net_handle_mac()
function (bz #1086775, bz #1078846)
- CVE-2013-4544: vmxnet3: bounds checking buffer overrun (bz #1087513, bz
- CVE-2014-2894: out of bounds buffer accesses, guest triggerable via IDE
SMART (bz #1087981, bz #1087971)
* Wed Mar 19 2014 Cole Robinson <crobinso@redhat.com> - 2:1.6.2-1
- Fix bogus libcacard dep on gluster (bz #987441)
- Fix mouse with -display gtk -vga qxl (bz #1051724)
- Change gtk quit accelerator to ctrl+shift+q (bz #1062393)
- Fix crash during virtio-scsi hotplug (bz #1051611)
* Wed Dec 18 2013 Cole Robinson <crobinso@redhat.com> - 2:1.6.1-3
- Add kill() to seccomp whitelist, fix AC97 with -sandbox on (bz #1043521)
- Changing streaming mode default to off for spice (bz #1038336)
- Fix guest scsi verify command (bz #1001617)
- Fix performance regression after save/restore (bz #917723)
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1088986 - CVE-2014-0182 qemu: virtio: out-of-bounds buffer write
on state load with invalid config_len
https://bugzilla.redhat.com/show_bug.cgi?id=1088986
[ 2 ] Bug #1066405 - CVE-2013-4534 qemu: openpic: buffer overrun on incoming
migration
https://bugzilla.redhat.com/show_bug.cgi?id=1066405
[ 3 ] Bug #1066404 - CVE-2013-4533 qemu: pxa2xx: buffer overrun on incoming
migration
https://bugzilla.redhat.com/show_bug.cgi?id=1066404
[ 4 ] Bug #1066401 - CVE-2013-4535 CVE-2013-4536 qemu: virtio: insufficient
validation of num_sg when mapping
https://bugzilla.redhat.com/show_bug.cgi?id=1066401
[ 5 ] Bug #1066394 - CVE-2013-4537 qemu: ssi-sd: buffer overrun on invalid
state load
https://bugzilla.redhat.com/show_bug.cgi?id=1066394
[ 6 ] Bug #1066393 - CVE-2013-4538 qemu: ssd0323: fix buffer overun on
invalid state load
https://bugzilla.redhat.com/show_bug.cgi?id=1066393
[ 7 ] Bug #1066387 - CVE-2013-4539 qemu: tsc210x: buffer overrun on invalid
state load
https://bugzilla.redhat.com/show_bug.cgi?id=1066387
[ 8 ] Bug #1066386 - CVE-2013-4540 qemu: zaurus: buffer overrun on invalid
state load
https://bugzilla.redhat.com/show_bug.cgi?id=1066386
[ 9 ] Bug #1066384 - CVE-2013-4541 qemu: usb: insufficient sanity checking of
setup_index+setup_len in post_load
https://bugzilla.redhat.com/show_bug.cgi?id=1066384
[ 10 ] Bug #1066382 - CVE-2013-4542 qemu: virtio-scsi: buffer overrun on
invalid state load
https://bugzilla.redhat.com/show_bug.cgi?id=1066382
[ 11 ] Bug #1066361 - CVE-2013-6399 qemu: virtio: buffer overrun on incoming
migration
https://bugzilla.redhat.com/show_bug.cgi?id=1066361
[ 12 ] Bug #1066357 - CVE-2013-4531 qemu: target-arm/machine.c: fix buffer
overflow on invalid state load
https://bugzilla.redhat.com/show_bug.cgi?id=1066357
[ 13 ] Bug #1066354 - CVE-2013-4530 qemu: pl022: fix buffer overun on invalid
state load
https://bugzilla.redhat.com/show_bug.cgi?id=1066354
[ 14 ] Bug #1066353 - CVE-2013-4529 qemu: hw/pci/pcie_aer.c: buffer overrun
on invalid state load
https://bugzilla.redhat.com/show_bug.cgi?id=1066353
[ 15 ] Bug #1066347 - CVE-2013-4527 qemu: hpet: buffer overrun on invalid
state load
https://bugzilla.redhat.com/show_bug.cgi?id=1066347
[ 16 ] Bug #1066345 - CVE-2013-4526 qemu: ahci: fix buffer overrun on invalid
state load
https://bugzilla.redhat.com/show_bug.cgi?id=1066345
[ 17 ] Bug #1066342 - CVE-2013-4151 qemu: virtio: out-of-bounds buffer write
on invalid state load
https://bugzilla.redhat.com/show_bug.cgi?id=1066342
[ 18 ] Bug #1066340 - CVE-2013-4150 qemu: virtio-net: out-of-bounds buffer
write on invalid state load
https://bugzilla.redhat.com/show_bug.cgi?id=1066340
[ 19 ] Bug #1066337 - CVE-2013-4149 qemu: virtio-net: out-of-bounds buffer
write on load
https://bugzilla.redhat.com/show_bug.cgi?id=1066337
[ 20 ] Bug #1066334 - CVE-2013-4148 qemu: virtio-net: buffer overflow on
invalid state load
https://bugzilla.redhat.com/show_bug.cgi?id=1066334
-------------------------------------------------------------------------------
-

This update can be installed with the "yum" update program. Use
su -c 'yum update qemu' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Pro-Linux
Gewinnspiel
Neue Nachrichten
Werbung