[ubuntu/trusty-security] qemu 2.0.0+dfsg-2ubuntu1.11 (Accepted)
Marc Deslauriers
marc.deslauriers at canonical.com
Wed May 13 16:57:43 UTC 2015
qemu (2.0.0+dfsg-2ubuntu1.11) trusty-security; urgency=medium
* SECURITY UPDATE: denial of service in vnc web
- debian/patches/CVE-2015-1779-1.patch: incrementally decode websocket
frames in ui/vnc-ws.c, ui/vnc-ws.h, ui/vnc.h.
- debian/patches/CVE-2015-1779-2.patch: limit size of HTTP headers from
websockets clients in ui/vnc-ws.c.
- CVE-2015-1779
* SECURITY UPDATE: denial of service via PCI command register access
- debian/patches/CVE-2015-2756.patch: limit PCI command register access
in hw/xen/xen_pt.c, hw/xen/xen_pt_config_init.c.
- CVE-2015-2756
* SECURITY UPDATE: host code execution via floppy device (VEMON)
- debian/patches/CVE-2015-3456.patch: force the fifo access to be in
bounds of the allocated buffer in hw/block/fdc.c.
- CVE-2015-3456
qemu (2.0.0+dfsg-2ubuntu1.10) trusty; urgency=low
* Apply an upstream qemu patch to fix issues with persistent grants
on qcow images accessed by dom0 (LP: #1394327).
Date: 2015-05-13 13:57:13.383570+00:00
Changed-By: Marc Deslauriers <marc.deslauriers at canonical.com>
https://launchpad.net/ubuntu/+source/qemu/2.0.0+dfsg-2ubuntu1.11
-------------- next part --------------
Sorry, changesfile not available.
More information about the Trusty-changes
mailing list