Fedora 22: qemu Security Update

    Date21 Apr 2015
    CategoryFedora
    80
    Posted ByLinuxSecurity Advisories
    * Rebased to version 2.3.0-rc2 * Don't install ksm services as executable (bz #1192720) * Skip hanging tests on s390 (bz #1206057) * CVE-2015-1779 vnc: insufficient resource limiting in VNC websockets decoder (bz #1205051, bz #1199572)
    --------------------------------------------------------------------------------
    Fedora Update Notification
    FEDORA-2015-5541
    2015-04-04 15:19:13
    --------------------------------------------------------------------------------
    
    Name        : qemu
    Product     : Fedora 22
    Version     : 2.3.0
    Release     : 0.3.rc2.fc22
    URL         : http://www.qemu.org/
    Summary     : QEMU is a FAST! processor emulator
    Description :
    QEMU is a generic and open source processor emulator which achieves a good
    emulation speed by using dynamic translation. QEMU has two operating modes:
    
     * Full system emulation. In this mode, QEMU emulates a full system (for
       example a PC), including a processor and various peripherials. It can be
       used to launch different Operating Systems without rebooting the PC or
       to debug system code.
     * User mode emulation. In this mode, QEMU can launch Linux processes compiled
       for one CPU on another CPU.
    
    As QEMU requires no host kernel patches to run, it is safe and easy to use.
    
    --------------------------------------------------------------------------------
    Update Information:
    
    * Rebased to version 2.3.0-rc2
    * Don't install ksm services as executable (bz #1192720)
    * Skip hanging tests on s390 (bz #1206057)
    * CVE-2015-1779 vnc: insufficient resource limiting in VNC websockets decoder (bz #1205051, bz #1199572)
    --------------------------------------------------------------------------------
    References:
    
      [ 1 ] Bug #1199572 - CVE-2015-1779 qemu: vnc: insufficient resource limiting in VNC websockets decoder
            https://bugzilla.redhat.com/show_bug.cgi?id=1199572
    --------------------------------------------------------------------------------
    
    This update can be installed with the "yum" update program.  Use
    su -c 'yum update qemu' at the command line.
    For more information, refer to "Managing Software with yum",
    available at http://docs.fedoraproject.org/yum/.
    
    All packages are signed with the Fedora Project GPG key.  More details on the
    GPG keys used by the Fedora Project can be found at
    https://fedoraproject.org/keys
    --------------------------------------------------------------------------------
    _______________________________________________
    package-announce mailing list
    This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://admin.fedoraproject.org/mailman/listinfo/package-announce
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"5","type":"x","order":"1","pct":62.5,"resources":[]},{"id":"88","title":"Should be more technical","votes":"2","type":"x","order":"2","pct":25,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"1","type":"x","order":"3","pct":12.5,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.