--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2019-e9de40d53f
2019-07-09 02:24:19.617230
--------------------------------------------------------------------------------
Name : qemu
Product : Fedora 29
Version : 3.0.1
Release : 4.fc29
URL :
http://www.qemu.org/
Summary : QEMU is a FAST! processor emulator
Description :
QEMU is a generic and open source processor emulator which achieves a good
emulation speed by using dynamic translation. QEMU has two operating modes:
* Full system emulation. In this mode, QEMU emulates a full system (for
example a PC), including a processor and various peripherials. It can be
used to launch different Operating Systems without rebooting the PC or
to debug system code.
* User mode emulation. In this mode, QEMU can launch Linux processes compiled
for one CPU on another CPU.
As QEMU requires no host kernel patches to run, it is safe and easy to use.
--------------------------------------------------------------------------------
Update Information:
* CVE-2019-12155: qxl: null pointer dereference while releasing spice resources
(bz #1712727, bz #1712670) * CVE-2019-5008: NULL pointer dereference in
hw/sparc64/sun4u.c leading to DoS (bz #1705916, bz #1705915) * CVE-2018-20815:
device_tree: heap buffer overflow while loading device tree blob (bz #1693117,
bz #1693101)
--------------------------------------------------------------------------------
ChangeLog:
* Thu Jun 20 2019 Cole Robinson <crobinso(a)redhat.com> - 2:3.0.1-4
- CVE-2019-12155: qxl: null pointer dereference while releasing spice
resources (bz #1712727, bz #1712670)
- CVE-2019-5008: NULL pointer dereference in hw/sparc64/sun4u.c leading to
DoS (bz #1705916, bz #1705915)
- CVE-2018-20815: device_tree: heap buffer overflow while loading device
tree blob (bz #1693117, bz #1693101)
* Tue May 14 2019 Daniel P. Berrang�� <berrange(a)redhat.com> - 2:3.0.1-3
- Define md-clear CPUID bit
- Resolves: rhbz #1710002 (CVE-2018-12126), rhbz #1710004 (CVE-2018-12127),
rhbz #1710003 (CVE-2018-12130), rhbz #1710006 (CVE-2019-11091)
* Wed Apr 17 2019 Cole Robinson <crobinso(a)redhat.com> - 2:3.0.1-2
- Fix nvme endianess issues
* Tue Apr 16 2019 Cole Robinson <crobinso(a)redhat.com> - 2:3.0.1-1
- Update to qemu 3.0.1
* Thu Mar 21 2019 Cole Robinson <crobinso(a)redhat.com> - 2:3.0.0-4
- CVE-2018-19364: 9pfs: use-after-free (bz #1651359)
- CVE-2018-19489: 9pfs: use-after-free renaming files (bz #1653157)
- CVE-2018-16867: usb-mtp: path traversal issue (bz #1656746)
- CVE-2018-16872: usb-mtp: path traversal issue (bz #1659150)
- CVE-2018-20191: pvrdma: uar_read leads to NULL deref (bz #1660315)
- CVE-2019-6778: slirp: heap buffer overflow (bz #1669072)
- CVE-2019-3812: Out-of-bounds read in hw/i2c/i2c-ddc.c allows for memory
disclosure (bz #1678081)
* Tue Dec 18 2018 Adam Williamson <awilliam(a)redhat.com> - 2:3.0.0-3
- Restore patch to drop phantom 86 key from en-us keymap (bz #1658676)
* Fri Nov 16 2018 Cole Robinson <crobinso(a)redhat.com> - 2:3.0.0-2
- Fix cpu model crash on AMD hosts (bz #1640140)
- CVE-2018-15746: seccomp blacklist is not applied to all threads (bz
- Fix assertion in address_space_stw_le_cached (bz #1644728)
- CVE-2018-10839: ne2000: fix possible out of bound access (bz #1636429)
- CVE-2018-17958: rtl8139: fix possible out of bound access (bz #1636729)
- CVE-2018-17962: pcnet: fix possible buffer overflow (bz #1636775)
- CVE-2018-17963: net: ignore packet size greater than INT_MAX (bz #1636782)
- CVE-2018-18849: lsi53c895a: OOB msg buffer access leads to DoS (bz
- CVE-2018-18954: ppc64: Out-of-bounds r/w stack access in pnv_lpc_do_eccb
(bz #1645442)
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #1712670 - CVE-2019-12155 QEMU: qxl: null pointer dereference while releasing
spice resources
https://bugzilla.redhat.com/show_bug.cgi?id=1712670
[ 2 ] Bug #1705915 - CVE-2019-5008 QEMU: NULL pointer dereference in hw/sparc64/sun4u.c
leading to DoS
https://bugzilla.redhat.com/show_bug.cgi?id=1705915
[ 3 ] Bug #1693101 - CVE-2018-20815 QEMU: device_tree: heap buffer overflow while
loading device tree blob
https://bugzilla.redhat.com/show_bug.cgi?id=1693101
--------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2019-e9de40d53f' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------