[SECURITY] Fedora 20 Update: qemu-1.6.2-6.fc20

updates at fedoraproject.org updates at fedoraproject.org
Tue Jun 10 02:56:05 UTC 2014


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2014-6970
2014-06-01 21:22:07
--------------------------------------------------------------------------------

Name        : qemu
Product     : Fedora 20
Version     : 1.6.2
Release     : 6.fc20
URL         : http://www.qemu.org/
Summary     : QEMU is a FAST! processor emulator
Description :
QEMU is a generic and open source processor emulator which achieves a good
emulation speed by using dynamic translation. QEMU has two operating modes:

 * Full system emulation. In this mode, QEMU emulates a full system (for
   example a PC), including a processor and various peripherials. It can be
   used to launch different Operating Systems without rebooting the PC or
   to debug system code.
 * User mode emulation. In this mode, QEMU can launch Linux processes compiled
   for one CPU on another CPU.

As QEMU requires no host kernel patches to run, it is safe and easy to use.

--------------------------------------------------------------------------------
Update Information:

* QCOW1 validation CVEs: CVE-2014-0222, CVE-2014-0223 (bz #1097232, bz #1097238, bz #1097222, bz #1097216)
* CVE-2014-3461: Issues in USB post load checks (bz #1097260, bz #1096821)
--------------------------------------------------------------------------------
ChangeLog:

* Sat May 31 2014 Cole Robinson <crobinso at redhat.com> - 2:1.6.2-6
- QCOW1 validation CVEs: CVE-2014-0222, CVE-2014-0223 (bz #1097232, bz
  - CVE-2014-3461: Issues in USB post load checks (bz #1097260, bz #1096821)
* Sun May 11 2014 Cole Robinson <crobinso at redhat.com> - 2:1.6.2-5
- Migration CVEs: CVE-2014-0182 etc.
* Tue Apr 29 2014 Cole Robinson <crobinso at redhat.com> - 2:1.6.2-4
- Fix arm sd warnings with latest kernel (bz #1091548)
- Fix regression in CVE backport that affects openstack (thanks lbezdick)
* Fri Apr 25 2014 Cole Robinson <crobinso at redhat.com> - 2:1.6.2-3
- Fix guest startup crashes from autotest (bz #1081610)
* Thu Apr 24 2014 Cole Robinson <crobinso at redhat.com> - 2:1.6.2-2
- Block/image format validation CVE-2014-0142 - 2014-0148 (bz #1078201, bz
      - CVE-2014-0150: virtio-net: buffer overflow in virtio_net_handle_mac()
  function (bz #1086775, bz #1078846)
- CVE-2013-4544: vmxnet3: bounds checking buffer overrun (bz #1087513, bz
  - CVE-2014-2894: out of bounds buffer accesses, guest triggerable via IDE
  SMART (bz #1087981, bz #1087971)
* Wed Mar 19 2014 Cole Robinson <crobinso at redhat.com> - 2:1.6.2-1
- Fix bogus libcacard dep on gluster (bz #987441)
- Fix mouse with -display gtk -vga qxl (bz #1051724)
- Change gtk quit accelerator to ctrl+shift+q (bz #1062393)
- Fix crash during virtio-scsi hotplug (bz #1051611)
* Wed Dec 18 2013 Cole Robinson <crobinso at redhat.com> - 2:1.6.1-3
- Add kill() to seccomp whitelist, fix AC97 with -sandbox on (bz #1043521)
- Changing streaming mode default to off for spice (bz #1038336)
- Fix guest scsi verify command (bz #1001617)
- Fix performance regression after save/restore (bz #917723)
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1097222 - CVE-2014-0223 Qemu: qcow1: validate image size to avoid out-of-bounds memory access
        https://bugzilla.redhat.com/show_bug.cgi?id=1097222
  [ 2 ] Bug #1097216 - CVE-2014-0222 Qemu: qcow1: validate L2 table size to avoid integer overflows
        https://bugzilla.redhat.com/show_bug.cgi?id=1097216
  [ 3 ] Bug #1096821 - CVE-2014-3461 Qemu: usb: fix up post load checks
        https://bugzilla.redhat.com/show_bug.cgi?id=1096821
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use
su -c 'yum update qemu' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------


More information about the package-announce mailing list