[ubuntu/trusty-security] qemu 2.0.0+dfsg-2ubuntu1.21 (Accepted)

Marc Deslauriers marc.deslauriers at canonical.com
Thu Dec 3 12:24:28 UTC 2015


qemu (2.0.0+dfsg-2ubuntu1.21) trusty-security; urgency=medium

  * SECURITY UPDATE: denial of service via jumbo frame flood in virtio
    - debian/patches/CVE-2015-7295.patch: drop truncated packets in
      hw/net/virtio-net.c, hw/virtio/virtio.c, include/hw/virtio/virtio.h.
    - CVE-2015-7295
  * SECURITY UPDATE: loopback mode heap overflow vulnerability in pcnet
    - debian/patches/CVE-2015-7504.patch: leave room for CRC code in
      hw/net/pcnet.c.
    - CVE-2015-7504
  * SECURITY UPDATE: non-loopback mode buffer overflow in pcnet
    - debian/patches/CVE-2015-7512.patch: check packet length in
      hw/net/pcnet.c.
    - CVE-2015-7512
  * SECURITY UPDATE: infinite loop in eepro100
    - debian/patches/CVE-2015-8345.patch: prevent endless loop in
      hw/net/eepro100.c.
    - CVE-2015-8345

qemu (2.0.0+dfsg-2ubuntu1.20) trusty; urgency=low

  * debian/patches/upstream-fix-irq-route-entries.patch
    Fix "kvm_irqchip_commit_routes: Assertion 'ret == 0' failed"
    (LP: #1465935)

Date: 2015-12-02 12:27:28.070317+00:00
Changed-By: Marc Deslauriers <marc.deslauriers at canonical.com>
https://launchpad.net/ubuntu/+source/qemu/2.0.0+dfsg-2ubuntu1.21
-------------- next part --------------
Sorry, changesfile not available.


More information about the Trusty-changes mailing list