Fedora Linux 8617 Published by

A qemu security update has been released for Fedora 37.



SECURITY: Fedora 37 Update: qemu-7.0.0-15.fc37


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2023-371519fd09
2023-03-28 02:04:26.101550
--------------------------------------------------------------------------------

Name : qemu
Product : Fedora 37
Version : 7.0.0
Release : 15.fc37
URL :   http://www.qemu.org/
Summary : QEMU is a FAST! processor emulator
Description :
qemu is an open source virtualizer that provides hardware
emulation for the KVM hypervisor. qemu acts as a virtual
machine monitor together with the KVM kernel modules, and emulates the
hardware for a full system such as a PC and its associated peripherals.

--------------------------------------------------------------------------------
Update Information:

qga/win32: Fix local privilege escalation issue (CVE-2023-0664) (rhbz#2175700)
--------------------------------------------------------------------------------
ChangeLog:

* Sun Mar 26 2023 Mauro Matteo Cascella - 2:7.0.0-15
- qga/win32: Fix local privilege escalation issue (CVE-2023-0664) (rhbz#2175700)
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2175700 - CVE-2023-0664 qemu: local privilege escalation via the QEMU Guest Agent on Windows [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=2175700
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2023-371519fd09' at the command
line. For more information, refer to the dnf documentation available at
  http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
  https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________