[ubuntu/trusty-security] qemu 2.0.0+dfsg-2ubuntu1.19 (Accepted)

Marc Deslauriers marc.deslauriers at canonical.com
Thu Sep 24 18:19:10 UTC 2015


qemu (2.0.0+dfsg-2ubuntu1.19) trusty-security; urgency=medium

  * SECURITY UPDATE: denial of service via vnc infinite loop
    - debian/patches/CVE-2015-5239.patch: limit client_cut_text msg payload
      size in ui/vnc.c.
    - CVE-2015-5239
  * SECURITY UPDATE: denial of service via NE2000 driver
    - debian/patches/CVE-2015-5278.patch: fix infinite loop in
      hw/net/ne2000.c.
    - CVE-2015-5278
  * SECURITY UPDATE: denial of service and possible code execution via
    heap overflow in NE2000 driver
    - debian/patches/CVE-2015-5279.patch: validate ring buffer pointers in
      hw/net/ne2000.c.
    - CVE-2015-5279
  * SECURITY UPDATE: denial of service via e1000 infinite loop
    - debian/patches/CVE-2015-6815.patch: check bytes in hw/net/e1000.c.
    - CVE-2015-6815
  * SECURITY UPDATE: denial of service via illegal ATAPI commands
    - debian/patches/CVE-2015-6855.patch: fix ATAPI command permissions in
      hw/ide/core.c.
    - CVE-2015-6855

qemu (2.0.0+dfsg-2ubuntu1.18) trusty-proposed; urgency=medium

  * qemu-nbd-fix-vdi-corruption.patch:
    qemu-nbd: fix corruption while writing VDI volumes (LP: #1422307)

Date: 2015-09-24 11:51:17.336550+00:00
Changed-By: Marc Deslauriers <marc.deslauriers at canonical.com>
https://launchpad.net/ubuntu/+source/qemu/2.0.0+dfsg-2ubuntu1.19
-------------- next part --------------
Sorry, changesfile not available.


More information about the Trusty-changes mailing list