unpushed

qemu-2.3.1-8.fc22

FEDORA-2015-686f289aa5 created by crobinso 9 years ago for Fedora 22
  • Fix abort in abort in bdrv_error_action (bz #1277482)
  • Fix SSE4 emulation with accel=tcg (bz #1270703)
  • CVE-2015-8345: Fix infinite loop in eepro100 (bz #1285214)
  • CVE-2015-7504: Fix heap overflow in pcnet (bz #1286543)
  • CVE-2015-7512: Fix buffer overflow in pcnet (bz #1286549)

This update has been submitted for testing by crobinso.

9 years ago

This update has been pushed to testing.

9 years ago

This update has reached 7 days in testing and can be pushed to stable now if the maintainer wishes

9 years ago
User Icon kevin commented & provided feedback 9 years ago

There is now a newer one in stable...

This update has been unpushed.


Please log in to add feedback.

Metadata
Type
security
Karma
0
Signed
Content Type
RPM
Test Gating
Autopush Settings
Unstable by Karma
-3
Stable by Karma
3
Stable by Time
disabled
Thresholds
Minimum Karma
+1
Minimum Testing
7 days
Dates
submitted
9 years ago
in testing
9 years ago
BZ#1261461 CVE-2015-7504 Qemu: net: pcnet: heap overflow vulnerability in pcnet_receive
0
0
BZ#1270703 qemu: accel=tcg does not implement SSE 4 properly
0
0
BZ#1277482 qemu 2.1.3 abort in bdrv_error_action()
0
0
BZ#1285061 CVE-2015-7512 Qemu: net: pcnet: buffer overflow in non-loopback mode
0
0
BZ#1285213 CVE-2015-8345 Qemu: net: eepro100: infinite loop in processing command block list
0
0
BZ#1285214 CVE-2015-8345 Qemu: net: eepro100: infinite loop in processing command block list [fedora-all]
0
0
BZ#1286543 CVE-2015-7504 Qemu: net: pcnet: heap overflow vulnerability in pcnet_receive [fedora-all]
0
0
BZ#1286549 CVE-2015-7512 Qemu: net: pcnet: buffer overflow in non-loopback mode [fedora-all]
0
0

Automated Test Results