[SECURITY] Fedora 16 Update: qemu-0.15.1-8.fc16

updates at fedoraproject.org updates at fedoraproject.org
Wed Oct 17 00:22:05 UTC 2012


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2012-15606
2012-10-08 02:06:05
--------------------------------------------------------------------------------

Name        : qemu
Product     : Fedora 16
Version     : 0.15.1
Release     : 8.fc16
URL         : http://www.qemu.org/
Summary     : QEMU is a FAST! processor emulator
Description :
QEMU is a generic and open source processor emulator which achieves a good
emulation speed by using dynamic translation. QEMU has two operating modes:

 * Full system emulation. In this mode, QEMU emulates a full system (for
   example a PC), including a processor and various peripherials. It can be
   used to launch different Operating Systems without rebooting the PC or
   to debug system code.
 * User mode emulation. In this mode, QEMU can launch Linux processes compiled
   for one CPU on another CPU.

As QEMU requires no host kernel patches to run, it is safe and easy to use.

--------------------------------------------------------------------------------
Update Information:

* CVE-2012-3515 VT100 emulation vulnerability (bz #854600, bz #851252)
--------------------------------------------------------------------------------
ChangeLog:

* Sun Oct  7 2012 Cole Robinson <crobinso at redhat.com> - 0.15.1-8
- CVE-2012-3515 VT100 emulation vulnerability (bz #854600, bz #851252)
* Sun Jul 29 2012 Cole Robinson <crobinso at redhat.com> - 0.15.1-7
- Pull patches from 0.15 stable
- CVE-2012-2652: Possible symlink attacks with -snapshot (bz 825697, bz
  824919)
- Fix systemtap tapsets (bz 831763)
- Fix qmp response race caused by spice server bug (bz 744015)
- Fix text mode screendumps (bz 819155)
- Don't renable ksm on update (bz 815156)
- Fix RPM install error on non-virt machines (bz 660629)
- Obsolete openbios to fix upgrade dependency issues (bz 694802)
- Fix sgabios integration (bz 791344)
* Wed Jul 18 2012 Cole Robinson <crobinso at redhat.com> - 0.15.1-6
- Fix fedora guest hang with virtio console (bz 837925)
* Tue May 29 2012 Cole Robinson <crobinso at redhat.com> - 0.15.1-5
- CVE-2012-0029 e1000 buffer overflow (bz 783984, bz 772075)
- virtio-blk: refuse SG_IO requests with scsi=off (bz 826042)
* Mon Jan 30 2012 Justin M. Forbes <jforbes at redhat.com> - 2:0.15.1-4
- Add vhost-net to kvm.modules
- Fix USB passthrough assert on packet completion (#769625)
* Thu Jan  5 2012 Christophe Fergeau <cfergeau at redhat.com> - 2:0.15.1-3.1
- Backport patches from qemu 1.0 to fix floppy drives (#753863)
* Fri Nov 18 2011 Justin M. Forbes <jforbes at redhat.com> - 2:0.15.1-3
- Enable support for fedora-13 machine type (#748218)
- don't force ksm enable on updates (#754946)
* Thu Nov  3 2011 Justin M. Forbes <jforbes at redhat.com> - 2:0.15.1-2
- Fix POSTIN scriplet failure (#748281)
* Fri Oct 21 2011 Justin M. Forbes <jforbes at redhat.com> - 2:0.15.1-1
- Require seabios-bin >= 0.6.0-2 (#741992)
- Replace init scripts with systemd units (#741920)
- Update to 0.15.1 stable upstream
* Fri Oct 21 2011 Paul Moore <pmoore at redhat.com>
- Enable full relro and PIE (rhbz #738812)
* Wed Oct 12 2011 Daniel P. Berrange <berrange at redhat.com> - 2:0.15.0-6
- Add BR on ceph-devel to enable RBD block device
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #851252 - CVE-2012-3515 qemu: VT100 emulation vulnerability
        https://bugzilla.redhat.com/show_bug.cgi?id=851252
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use 
su -c 'yum update qemu' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------


More information about the package-announce mailing list