--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2015-13402
2015-08-13 14:44:07
--------------------------------------------------------------------------------

Name        : qemu
Product     : Fedora 22
Version     : 2.3.1
Release     : 1.fc22
URL         : https://www.qemu.org/
Summary     : QEMU is a FAST! processor emulator
Description :
QEMU is a generic and open source processor emulator which achieves a good
emulation speed by using dynamic translation. QEMU has two operating modes:

 * Full system emulation. In this mode, QEMU emulates a full system (for
   example a PC), including a processor and various peripherials. It can be
   used to launch different Operating Systems without rebooting the PC or
   to debug system code.
 * User mode emulation. In this mode, QEMU can launch Linux processes compiled
   for one CPU on another CPU.

As QEMU requires no host kernel patches to run, it is safe and easy to use.

--------------------------------------------------------------------------------
Update Information:

* Rebased to version 2.3.1
* Fix crash in qemu_spice_create_display (bz #1163047)
* Fix qemu-img map crash for unaligned image (bz #1229394)
* CVE-2015-3209: pcnet: multi-tmd buffer overflow in the tx path (bz #1230536)
* CVE-2015-3214: i8254: out-of-bounds memory access (bz #1243728)
* CVE-2015-5158: scsi stack buffer overflow (bz #1246025)
* CVE-2015-5154: ide: atapi: heap overflow during I/O buffer memory access (bz #1247141)
* CVE-2015-5166: BlockBackend object use after free issue (bz #1249758)
* CVE-2015-5745: buffer overflow in virtio-serial (bz #1251160)
* CVE-2015-5165: rtl8139 uninitialized heap memory information leakage to guest (bz #1249755)
--------------------------------------------------------------------------------
ChangeLog:

* Tue Aug 11 2015 Cole Robinson  - 2:2.3.1-1
- Rebased to version 2.3.1
* Tue Aug 11 2015 Cole Robinson  - 2:2.3.0-7
- Fix crash in qemu_spice_create_display (bz #1163047)
- Fix qemu-img map crash for unaligned image (bz #1229394)
- CVE-2015-3209: pcnet: multi-tmd buffer overflow in the tx path (bz #1230536)
- CVE-2015-3214: i8254: out-of-bounds memory access (bz #1243728)
- CVE-2015-5158: scsi stack buffer overflow (bz #1246025)
- CVE-2015-5154: ide: atapi: heap overflow during I/O buffer memory access (bz
  - CVE-2015-5166: BlockBackend object use after free issue (bz #1249758)
- CVE-2015-5745: buffer overflow in virtio-serial (bz #1251160)
- CVE-2015-5165: rtl8139 uninitialized heap memory information leakage to
  guest (bz #1249755)
* Mon Jul 20 2015 Richard W.M. Jones  - 2:2.3.0-6
- Fix: qemu-img: error while compressing sector : Input/output error (bz #1214855)
* Fri Jun  5 2015 Cole Robinson  - 2:2.3.0-5
- CVE-2015-4037: insecure temporary file use in /net/slirp.c (bz #1222894)
* Wed May 13 2015 Cole Robinson  - 2:2.3.0-4
- CVE-2015-3456: (VENOM) fdc: out-of-bounds fifo buffer memory access (bz
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1225882 - CVE-2015-3209 qemu: pcnet: multi-tmd buffer overflow in the tx path
        https://bugzilla.redhat.com/show_bug.cgi?id=1225882
  [ 2 ] Bug #1229640 - CVE-2015-3214 qemu/kvm: i8254: out-of-bounds memory access in pit_ioport_read function
        https://bugzilla.redhat.com/show_bug.cgi?id=1229640
  [ 3 ] Bug #1244332 - CVE-2015-5158 Qemu: scsi stack buffer overflow
        https://bugzilla.redhat.com/show_bug.cgi?id=1244332
  [ 4 ] Bug #1243563 - CVE-2015-5154 qemu: ide: atapi: heap overflow during I/O buffer memory access
        https://bugzilla.redhat.com/show_bug.cgi?id=1243563
  [ 5 ] Bug #1248997 - CVE-2015-5166 Qemu: BlockBackend object use after free issue (XSA-139)
        https://bugzilla.redhat.com/show_bug.cgi?id=1248997
  [ 6 ] Bug #1251157 - CVE-2015-5745 kernel: qemu buffer overflow in virtio-serial
        https://bugzilla.redhat.com/show_bug.cgi?id=1251157
  [ 7 ] Bug #1248760 - CVE-2015-5165 Qemu: rtl8139 uninitialized heap memory information leakage to guest (XSA-140)
        https://bugzilla.redhat.com/show_bug.cgi?id=1248760
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use
su -c 'yum update qemu' at the command line.
For more information, refer to "Managing Software with yum",
available at .

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/security/
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://lists.fedoraproject.org/admin/lists/package-announce.lists.fedoraproject.org/

Fedora 22: qemu Security Update 2015-13402

August 18, 2015
* Rebased to version 2.3.1 * Fix crash in qemu_spice_create_display (bz #1163047) * Fix qemu-img map crash for unaligned image (bz #1229394) * CVE-2015-3209: pcnet: multi-tmd buffe...

Summary

QEMU is a generic and open source processor emulator which achieves a good

emulation speed by using dynamic translation. QEMU has two operating modes:

* Full system emulation. In this mode, QEMU emulates a full system (for

example a PC), including a processor and various peripherials. It can be

used to launch different Operating Systems without rebooting the PC or

to debug system code.

* User mode emulation. In this mode, QEMU can launch Linux processes compiled

for one CPU on another CPU.

As QEMU requires no host kernel patches to run, it is safe and easy to use.

Update Information:

* Rebased to version 2.3.1 * Fix crash in qemu_spice_create_display (bz #1163047) * Fix qemu-img map crash for unaligned image (bz #1229394) * CVE-2015-3209: pcnet: multi-tmd buffer overflow in the tx path (bz #1230536) * CVE-2015-3214: i8254: out-of-bounds memory access (bz #1243728) * CVE-2015-5158: scsi stack buffer overflow (bz #1246025) * CVE-2015-5154: ide: atapi: heap overflow during I/O buffer memory access (bz #1247141) * CVE-2015-5166: BlockBackend object use after free issue (bz #1249758) * CVE-2015-5745: buffer overflow in virtio-serial (bz #1251160) * CVE-2015-5165: rtl8139 uninitialized heap memory information leakage to guest (bz #1249755)

Change Log

* Tue Aug 11 2015 Cole Robinson - 2:2.3.1-1 - Rebased to version 2.3.1 * Tue Aug 11 2015 Cole Robinson - 2:2.3.0-7 - Fix crash in qemu_spice_create_display (bz #1163047) - Fix qemu-img map crash for unaligned image (bz #1229394) - CVE-2015-3209: pcnet: multi-tmd buffer overflow in the tx path (bz #1230536) - CVE-2015-3214: i8254: out-of-bounds memory access (bz #1243728) - CVE-2015-5158: scsi stack buffer overflow (bz #1246025) - CVE-2015-5154: ide: atapi: heap overflow during I/O buffer memory access (bz - CVE-2015-5166: BlockBackend object use after free issue (bz #1249758) - CVE-2015-5745: buffer overflow in virtio-serial (bz #1251160) - CVE-2015-5165: rtl8139 uninitialized heap memory information leakage to guest (bz #1249755) * Mon Jul 20 2015 Richard W.M. Jones - 2:2.3.0-6 - Fix: qemu-img: error while compressing sector : Input/output error (bz #1214855) * Fri Jun 5 2015 Cole Robinson - 2:2.3.0-5 - CVE-2015-4037: insecure temporary file use in /net/slirp.c (bz #1222894) * Wed May 13 2015 Cole Robinson - 2:2.3.0-4 - CVE-2015-3456: (VENOM) fdc: out-of-bounds fifo buffer memory access (bz

References

[ 1 ] Bug #1225882 - CVE-2015-3209 qemu: pcnet: multi-tmd buffer overflow in the tx path https://bugzilla.redhat.com/show_bug.cgi?id=1225882 [ 2 ] Bug #1229640 - CVE-2015-3214 qemu/kvm: i8254: out-of-bounds memory access in pit_ioport_read function https://bugzilla.redhat.com/show_bug.cgi?id=1229640 [ 3 ] Bug #1244332 - CVE-2015-5158 Qemu: scsi stack buffer overflow https://bugzilla.redhat.com/show_bug.cgi?id=1244332 [ 4 ] Bug #1243563 - CVE-2015-5154 qemu: ide: atapi: heap overflow during I/O buffer memory access https://bugzilla.redhat.com/show_bug.cgi?id=1243563 [ 5 ] Bug #1248997 - CVE-2015-5166 Qemu: BlockBackend object use after free issue (XSA-139) https://bugzilla.redhat.com/show_bug.cgi?id=1248997 [ 6 ] Bug #1251157 - CVE-2015-5745 kernel: qemu buffer overflow in virtio-serial https://bugzilla.redhat.com/show_bug.cgi?id=1251157 [ 7 ] Bug #1248760 - CVE-2015-5165 Qemu: rtl8139 uninitialized heap memory information leakage to guest (XSA-140) https://bugzilla.redhat.com/show_bug.cgi?id=1248760

Update Instructions

This update can be installed with the "yum" update program. Use su -c 'yum update qemu' at the command line. For more information, refer to "Managing Software with yum", available at .

Severity
Name : qemu
Product : Fedora 22
Version : 2.3.1
Release : 1.fc22
URL : https://www.qemu.org/
Summary : QEMU is a FAST! processor emulator

Related News