qemu (1:2.5+dfsg-5ubuntu10.43) xenial-security; urgency=medium
* SECURITY UPDATE: OOB heap access via unexpected iSCSI Server response
- debian/patches/CVE-2020-1711.patch: cap block count from GET LBA
STATUS in block/iscsi.c.
- CVE-2020-1711
* SECURITY UPDATE: heap-based overflow in slirp networking
- debian/patches/CVE-2020-7039-1.patch: fix oob issue in
slirp/tcp_subr.c.
- debian/patches/CVE-2020-7039-2.patch: use correct size while
emulating IRC commands in slirp/tcp_subr.c.
- debian/patches/CVE-2020-7039-3.patch: use correct size while
emulating commands in slirp/tcp_subr.c.
- CVE-2020-7039
* SECURITY UPDATE: buffer overflow via incorrect snprintf return codes
- debian/patches/CVE-2020-8608-1.patch: add slirp_fmt() helpers to
slirp/slirp.c, slirp/slirp.h.
- debian/patches/CVE-2020-8608-2.patch: fix unsafe snprintf() usages in
slirp/tcp_subr.c.
- CVE-2020-8608
Date: 2020-02-14 15:15:24.189182+00:00
Changed-By: Marc Deslauriers <marc.deslauri...@canonical.com>
https://launchpad.net/ubuntu/+source/qemu/1:2.5+dfsg-5ubuntu10.43
Sorry, changesfile not available.
--
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at:
https://lists.ubuntu.com/mailman/listinfo/xenial-changes