[ubuntu/trusty-security] qemu 2.0.0+dfsg-2ubuntu1.17 (Accepted)

Marc Deslauriers marc.deslauriers at canonical.com
Thu Aug 27 11:19:23 UTC 2015


qemu (2.0.0+dfsg-2ubuntu1.17) trusty-security; urgency=medium

  * SECURITY UPDATE: denial of service via PRDT with zero complete sectors
    - debian/patches/CVE-2014-9718.patch: refactor return codes in
      hw/ide/ahci.c, hw/ide/core.c, hw/ide/internal.h, hw/ide/macio.c,
      hw/ide/pci.c.
    - CVE-2014-9718
  * SECURITY UPDATE: process heap memory disclosure
    - debian/patches/CVE-2015-5165.patch: check sizes in hw/net/rtl8139.c.
    - CVE-2015-5165
  * SECURITY UPDATE: denial of service via virtio-serial
    - debian/patches/CVE-2015-5745.patch: don't assume a specific layout
      for control messages in hw/char/virtio-serial-bus.c.
    - CVE-2015-5745

qemu (2.0.0+dfsg-2ubuntu1.16) trusty; urgency=medium

  * Support qemu-kvm on x32, arm64, ppc64 and pp64el architectures
    (LP: #1389897)  (Patch thanks to mwhudson, BenC, and infinity)
  * debian/control-in: Add kvm-ipxe-precise to qemu-system-x86's Suggests
    field to match debian/control. Without this, this relationship gets
    dropped when debian/control is regenerated.

Date: 2015-08-25 18:04:14.051085+00:00
Changed-By: Marc Deslauriers <marc.deslauriers at canonical.com>
https://launchpad.net/ubuntu/+source/qemu/2.0.0+dfsg-2ubuntu1.17
-------------- next part --------------
Sorry, changesfile not available.


More information about the Trusty-changes mailing list