[security-announce] Qemu: Security update

Sona Sarmadi sona.sarmadi at enea.com
Fri Aug 7 08:56:07 CEST 2015


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

	Enea Linux Security Advisory
=========================================================
Product/package: Qemu 2.1
Severity: Important
CVE Name: CVE-2015-3456
=========================================================
This security patch fixes an out-of-bounds fifo buffer memory
access in Qemu 2.1.

Signed patch and README files
================================
0026-qemu-CVE-2015-3456.patch
0026-qemu-CVE-2015-3456.patch.sig
0026-qemu-CVE-2015-3456.README.asc

Description
===========
The Floppy Disk Controller (FDC) in QEMU, as used in Xen
4.5.x and earlier and KVM, allows local guest users to
cause a denial of service (out-of-bounds write and guest
crash) or possibly execute arbitrary code via the (1)
FD_CMD_READ_ID, (2) FD_CMD_DRIVE_SPECIFICATION_COMMAND,
or other unspecified commands, aka VENOM.

References
==========
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456

How to apply the patches
=======================
 - Preparation
Make sure that you have an installation of Enea Linux and have
applied the existing patches in the right order

wget https://linux.enea.com/5.0-beta-m400/\
Enea-Linux-5.0-beta-m400.tar.gz
tar zxf Enea-Linux-5.0-beta-m400.tar.gz
cd Enea-Linux-5.0-beta-m400/poky
<Fetch and apply the existing patches >

 - Fetch, verify and apply the new patch
wget
https://linux.enea.com/5.0-beta-m400/patches/0026-qemu-CVE-2015-3456.pat
ch
wget
https://linux.enea.com/5.0-beta-m400/patches/0026-qemu-CVE-2015-3456.pat
ch.sig
gpg --verify 0026-qemu-CVE-2015-3456.patch.sig
patch -p1 < ./0026-qemu-CVE-2015-3456.patch

If you have any questions regarding the security patches and security
updates please contact security at enea.com.

Enea Security Team
Sona Sarmadi
Mobile: +46 70 971 4475
www.enea.com
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=IKsM
-----END PGP SIGNATURE-----



More information about the security-announce mailing list