qemu (1:2.5+dfsg-5ubuntu10.43) xenial-security; urgency=medium

  * SECURITY UPDATE: OOB heap access via unexpected iSCSI Server response
    - debian/patches/CVE-2020-1711.patch: cap block count from GET LBA
      STATUS in block/iscsi.c.
    - CVE-2020-1711
  * SECURITY UPDATE: heap-based overflow in slirp networking
    - debian/patches/CVE-2020-7039-1.patch: fix oob issue in
      slirp/tcp_subr.c.
    - debian/patches/CVE-2020-7039-2.patch: use correct size while
      emulating IRC commands in slirp/tcp_subr.c.
    - debian/patches/CVE-2020-7039-3.patch: use correct size while
      emulating commands in slirp/tcp_subr.c.
    - CVE-2020-7039
  * SECURITY UPDATE: buffer overflow via incorrect snprintf return codes
    - debian/patches/CVE-2020-8608-1.patch: add slirp_fmt() helpers to
      slirp/slirp.c, slirp/slirp.h.
    - debian/patches/CVE-2020-8608-2.patch: fix unsafe snprintf() usages in
      slirp/tcp_subr.c.
    - CVE-2020-8608

Date: 2020-02-14 15:15:24.189182+00:00
Changed-By: Marc Deslauriers <marc.deslauri...@canonical.com>
https://launchpad.net/ubuntu/+source/qemu/1:2.5+dfsg-5ubuntu10.43
Sorry, changesfile not available.
-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes

Reply via email to