--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2016-3d3218ec41
2016-10-18 11:24:07.147798
--------------------------------------------------------------------------------

Name        : qemu
Product     : Fedora 25
Version     : 2.7.0
Release     : 4.fc25
URL         : https://www.qemu.org/
Summary     : QEMU is a FAST! processor emulator
Description :
QEMU is a generic and open source processor emulator which achieves a good
emulation speed by using dynamic translation. QEMU has two operating modes:

 * Full system emulation. In this mode, QEMU emulates a full system (for
   example a PC), including a processor and various peripherials. It can be
   used to launch different Operating Systems without rebooting the PC or
   to debug system code.
 * User mode emulation. In this mode, QEMU can launch Linux processes compiled
   for one CPU on another CPU.

As QEMU requires no host kernel patches to run, it is safe and easy to use.

--------------------------------------------------------------------------------
Update Information:

* CVE-2016-7155: pvscsi: OOB read and infinite loop (bz #1373463) *
CVE-2016-7156: pvscsi: infinite loop when building SG list (bz #1373480) *
CVE-2016-7156: pvscsi: infinite loop when processing IO requests (bz #1373480) *
CVE-2016-7170: vmware_vga: OOB stack memory access (bz #1374709) *
CVE-2016-7157: mptsas: invalid memory access (bz #1373505) * CVE-2016-7466: usb:
xhci memory leakage during device unplug (bz #1377838) * CVE-2016-7423: scsi:
mptsas: OOB access (bz #1376777) * CVE-2016-7422: virtio: null pointer
dereference (bz #1376756) * CVE-2016-7908: net: Infinite loop in mcf_fec_do_tx
(bz #1381193) * CVE-2016-8576: usb: xHCI: infinite loop vulnerability (bz
#1382322) * CVE-2016-7995: usb: hcd-ehci: memory leak (bz #1382669)
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1373462 - CVE-2016-7155 Qemu: scsi: pvscsi: OOB read and infinite loop while setting descriptor rings
        https://bugzilla.redhat.com/show_bug.cgi?id=1373462
  [ 2 ] Bug #1373478 - CVE-2016-7156 Qemu: scsi: pvscsi: infintie loop when building SG list
        https://bugzilla.redhat.com/show_bug.cgi?id=1373478
  [ 3 ] Bug #1374702 - CVE-2016-7170 Qemu: vmware_vga: OOB stack memory access when processing svga command
        https://bugzilla.redhat.com/show_bug.cgi?id=1374702
  [ 4 ] Bug #1373504 - CVE-2016-7157 Qemu: scsi: mptsas: invalid memory access while building configuration pages
        https://bugzilla.redhat.com/show_bug.cgi?id=1373504
  [ 5 ] Bug #1377837 - CVE-2016-7466 Qemu: usb: xhci memory leakage during device unplug
        https://bugzilla.redhat.com/show_bug.cgi?id=1377837
  [ 6 ] Bug #1376776 - CVE-2016-7423 Qemu: scsi: mptsas: OOB access when freeing MPTSASRequest object
        https://bugzilla.redhat.com/show_bug.cgi?id=1376776
  [ 7 ] Bug #1376755 - CVE-2016-7422 Qemu: virtio: null pointer dereference in virtqueu_map_desc
        https://bugzilla.redhat.com/show_bug.cgi?id=1376755
  [ 8 ] Bug #1327465 - CVE-2016-7908 Qemu: net: Infinite loop in mcf_fec_do_tx()
        https://bugzilla.redhat.com/show_bug.cgi?id=1327465
  [ 9 ] Bug #1333425 - CVE-2016-8576 Qemu: usb: xHCI: infinite loop vulnerability in xhci_ring_fetch
        https://bugzilla.redhat.com/show_bug.cgi?id=1333425
  [ 10 ] Bug #1382668 - CVE-2016-7995 Qemu: usb: hcd-ehci: memory leak in ehci_process_itd
        https://bugzilla.redhat.com/show_bug.cgi?id=1382668
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program. Use
su -c 'yum update qemu' at the command line.
For more information, refer to "Managing Software with yum",
available at .

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/security/
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org

Fedora 25: qemu Security Update 2016-3d3218ec41

October 18, 2016
* CVE-2016-7155: pvscsi: OOB read and infinite loop (bz #1373463) * CVE-2016-7156: pvscsi: infinite loop when building SG list (bz #1373480) * CVE-2016-7156: pvscsi: infinite loop ...

Summary

QEMU is a generic and open source processor emulator which achieves a good

emulation speed by using dynamic translation. QEMU has two operating modes:

* Full system emulation. In this mode, QEMU emulates a full system (for

example a PC), including a processor and various peripherials. It can be

used to launch different Operating Systems without rebooting the PC or

to debug system code.

* User mode emulation. In this mode, QEMU can launch Linux processes compiled

for one CPU on another CPU.

As QEMU requires no host kernel patches to run, it is safe and easy to use.

Update Information:

* CVE-2016-7155: pvscsi: OOB read and infinite loop (bz #1373463) * CVE-2016-7156: pvscsi: infinite loop when building SG list (bz #1373480) * CVE-2016-7156: pvscsi: infinite loop when processing IO requests (bz #1373480) * CVE-2016-7170: vmware_vga: OOB stack memory access (bz #1374709) * CVE-2016-7157: mptsas: invalid memory access (bz #1373505) * CVE-2016-7466: usb: xhci memory leakage during device unplug (bz #1377838) * CVE-2016-7423: scsi: mptsas: OOB access (bz #1376777) * CVE-2016-7422: virtio: null pointer dereference (bz #1376756) * CVE-2016-7908: net: Infinite loop in mcf_fec_do_tx (bz #1381193) * CVE-2016-8576: usb: xHCI: infinite loop vulnerability (bz #1382322) * CVE-2016-7995: usb: hcd-ehci: memory leak (bz #1382669)

Change Log

References

[ 1 ] Bug #1373462 - CVE-2016-7155 Qemu: scsi: pvscsi: OOB read and infinite loop while setting descriptor rings https://bugzilla.redhat.com/show_bug.cgi?id=1373462 [ 2 ] Bug #1373478 - CVE-2016-7156 Qemu: scsi: pvscsi: infintie loop when building SG list https://bugzilla.redhat.com/show_bug.cgi?id=1373478 [ 3 ] Bug #1374702 - CVE-2016-7170 Qemu: vmware_vga: OOB stack memory access when processing svga command https://bugzilla.redhat.com/show_bug.cgi?id=1374702 [ 4 ] Bug #1373504 - CVE-2016-7157 Qemu: scsi: mptsas: invalid memory access while building configuration pages https://bugzilla.redhat.com/show_bug.cgi?id=1373504 [ 5 ] Bug #1377837 - CVE-2016-7466 Qemu: usb: xhci memory leakage during device unplug https://bugzilla.redhat.com/show_bug.cgi?id=1377837 [ 6 ] Bug #1376776 - CVE-2016-7423 Qemu: scsi: mptsas: OOB access when freeing MPTSASRequest object https://bugzilla.redhat.com/show_bug.cgi?id=1376776 [ 7 ] Bug #137...

Read the Full Advisory

Update Instructions

This update can be installed with the "yum" update program. Use su -c 'yum update qemu' at the command line. For more information, refer to "Managing Software with yum", available at .

Severity
Name : qemu
Product : Fedora 25
Version : 2.7.0
Release : 4.fc25
URL : https://www.qemu.org/
Summary : QEMU is a FAST! processor emulator

Related News