[ubuntu-cloud-archive/liberty-updates] qemu (Accepted)

Ryan Beisner ryan.beisner at canonical.com
Wed Aug 17 13:27:57 UTC 2016


 qemu (1:2.3+dfsg-5ubuntu9.4~cloud1) trusty-liberty; urgency=medium
 .
   * USN-3047-1: Security updates for QEMU vulnerabilities (LP: #1611123).
   * SECURITY UPDATE: DoS and possible host code execution in 53C9X Fast
     SCSI Controller
     - debian/patches/CVE-2016-4439.patch: check length in hw/scsi/esp.c.
     - CVE-2016-4439
   * SECURITY UPDATE: DoS in 53C9X Fast SCSI Controller
     - debian/patches/CVE-2016-4441.patch: check DMA length in
       hw/scsi/esp.c.
     - CVE-2016-4441
   * SECURITY UPDATE: infinite loop in vmware_vga
     - debian/patches/CVE-2016-4453.patch: limit fifo commands in
       hw/display/vmware_vga.c.
     - CVE-2016-4453
   * SECURITY UPDATE: DoS or host memory leakage in vmware_vga
     - debian/patches/CVE-2016-4454.patch: fix sanity checks in
       hw/display/vmware_vga.c.
     - CVE-2016-4454
   * SECURITY UPDATE: DoS in VMWARE PVSCSI paravirtual SCSI bus
     - debian/patches/CVE-2016-4952.patch: check command descriptor ring
       buffer size in hw/scsi/vmw_pvscsi.c.
     - CVE-2016-4952
   * SECURITY UPDATE: MegaRAID SAS 8708EM2 host memory leakage
     - debian/patches/CVE-2016-5105.patch: initialise local configuration
       data buffer in hw/scsi/megasas.c.
     - CVE-2016-5105
   * SECURITY UPDATE: DoS in MegaRAID SAS 8708EM2
     - debian/patches/CVE-2016-5106.patch: use appropriate property buffer
       size in hw/scsi/megasas.c.
     - CVE-2016-5106
   * SECURITY UPDATE: DoS in MegaRAID SAS 8708EM2
     - debian/patches/CVE-2016-5107.patch: check read_queue_head index
       value in hw/scsi/megasas.c.
     - CVE-2016-5107
   * SECURITY UPDATE: DoS or code execution via crafted iSCSI asynchronous
     I/O ioctl call
     - debian/patches/CVE-2016-5126.patch: avoid potential overflow in
       block/iscsi.c.
     - CVE-2016-5126
   * SECURITY UPDATE: DoS in 53C9X Fast SCSI Controller
     - debian/patches/CVE-2016-5238.patch: check buffer length before
       reading scsi command in hw/scsi/esp.c.
     - CVE-2016-5238
   * SECURITY UPDATE: MegaRAID SAS 8708EM2 host memory leakage
     - debian/patches/CVE-2016-5337.patch: null terminate bios version
       buffer in hw/scsi/megasas.c.
     - CVE-2016-5337
   * SECURITY UPDATE: DoS or code execution in 53C9X Fast SCSI Controller
     - debian/patches/CVE-2016-5338.patch: check TI buffer index in
       hw/scsi/esp.c.
     - CVE-2016-5338
   * SECURITY UPDATE: DoS via unbounded memory allocation
     - debian/patches/CVE-2016-5403.patch: check size in hw/virtio/virtio.c.
     - CVE-2016-5403
   * SECURITY UPDATE: oob write access while reading ESP command
     - debian/patches/CVE-2016-6351.patch: make cmdbuf big enough for
       maximum CDB size and handle migration in hw/scsi/esp.c,
       include/hw/scsi/esp.h, include/migration/vmstate.h.
     - CVE-2016-6351

Date: Tue, 09 Aug 2016 09:52:03 -0400
Changed-By: Corey Bryant <corey.bryant at canonical.com>
Signed-By: Corey Bryant <corey.bryant at canonical.com> 
Published-By: Ryan Beisner <ryan.beisner at canonical.com>


More information about the Cloud-archive-changes mailing list