[ubuntu/trusty-updates] qemu 2.0.0+dfsg-2ubuntu1.13 (Accepted)

Ubuntu Archive Robot cjwatson+ubuntu-archive-robot at chiark.greenend.org.uk
Wed Jun 10 14:58:31 UTC 2015


qemu (2.0.0+dfsg-2ubuntu1.13) trusty-security; urgency=medium

  * SECURITY UPDATE: heap overflow in PCNET controller
    - debian/patches/CVE-2015-3209-pre.patch: fix negative array index read
      in hw/net/pcnet.c.
    - debian/patches/CVE-2015-3209.patch: check bounds in hw/net/pcnet.c.
    - CVE-2015-3209
  * SECURITY UPDATE: unsafe /tmp filename use by slirp
    - debian/patches/CVE-2015-4037.patch: use mkdtemp in net/slirp.c.
    - CVE-2015-4037
  * SECURITY UPDATE: denial of service via MSI message data field write
    - debian/patches/CVE-2015-4103.patch: properly gate writes in
      hw/xen/xen_pt.c, hw/xen/xen_pt.h, hw/xen/xen_pt_config_init.c.
    - CVE-2015-4103
  * SECURITY UPDATE: denial of service via MSI mask bits access
    - debian/patches/CVE-2015-4104.patch: don't allow guest access in
      hw/pci/msi.c, hw/xen/xen_pt_config_init.c, include/hw/pci/pci_regs.h.
    - CVE-2015-4104
  * SECURITY UPDATE: denial of service via PCI MSI-X pass-through error
    message logging
    - debian/patches/CVE-2015-4105.patch: limit messages in
      hw/xen/xen_pt.h, hw/xen/xen_pt_msi.c.
    - CVE-2015-4105
  * SECURITY UPDATE: denial of service or possible privilege escalation via
    write access to PCI config space
    - debian/patches/CVE-2015-4106-*.patch: multiple upstream commits to
      restrict passthough in hw/xen/xen_pt_config_init.c, hw/xen/xen_pt.h,
      hw/xen/xen_pt.c.
    - CVE-2015-4106
  * WARNING: this package does _not_ contain the changes from the qemu
    2.0.0+dfsg-2ubuntu1.12 package in trusty-proposed.

Date: 2015-06-09 15:05:25.169084+00:00
Changed-By: Marc Deslauriers <marc.deslauriers at canonical.com>
Signed-By: Ubuntu Archive Robot <cjwatson+ubuntu-archive-robot at chiark.greenend.org.uk>
https://launchpad.net/ubuntu/+source/qemu/2.0.0+dfsg-2ubuntu1.13
-------------- next part --------------
Sorry, changesfile not available.


More information about the Trusty-changes mailing list