[ubuntu/trusty-security] qemu 2.0.0+dfsg-2ubuntu1.11 (Accepted)

Marc Deslauriers marc.deslauriers at canonical.com
Wed May 13 16:57:43 UTC 2015


qemu (2.0.0+dfsg-2ubuntu1.11) trusty-security; urgency=medium

  * SECURITY UPDATE: denial of service in vnc web
    - debian/patches/CVE-2015-1779-1.patch: incrementally decode websocket
      frames in ui/vnc-ws.c, ui/vnc-ws.h, ui/vnc.h.
    - debian/patches/CVE-2015-1779-2.patch: limit size of HTTP headers from
      websockets clients in ui/vnc-ws.c.
    - CVE-2015-1779
  * SECURITY UPDATE: denial of service via PCI command register access
    - debian/patches/CVE-2015-2756.patch: limit PCI command register access
      in hw/xen/xen_pt.c, hw/xen/xen_pt_config_init.c.
    - CVE-2015-2756
  * SECURITY UPDATE: host code execution via floppy device (VEMON)
    - debian/patches/CVE-2015-3456.patch: force the fifo access to be in
      bounds of the allocated buffer in hw/block/fdc.c.
    - CVE-2015-3456

qemu (2.0.0+dfsg-2ubuntu1.10) trusty; urgency=low

  * Apply an upstream qemu patch to fix issues with persistent grants
    on qcow images accessed by dom0 (LP: #1394327).

Date: 2015-05-13 13:57:13.383570+00:00
Changed-By: Marc Deslauriers <marc.deslauriers at canonical.com>
https://launchpad.net/ubuntu/+source/qemu/2.0.0+dfsg-2ubuntu1.11
-------------- next part --------------
Sorry, changesfile not available.


More information about the Trusty-changes mailing list