qemu (2.0.0~rc1+dfsg-0ubuntu3.1) trusty-security; urgency=medium

  * SECURITY UPDATE: possible arbitrary code execution via vmxnet3 device
    - debian/patches/CVE-2013-4544.patch: add more validation in
      hw/net/vmxnet3.c.
    - CVE-2013-4544
  * SECURITY UPDATE: arbitrary code execution via MAC address table update
    - debian/patches/CVE-2014-0150.patch: fix overflow in
      hw/net/virtio-net.c.
    - CVE-2014-0150
  * SECURITY UPDATE: denial of service and possible code execution via
    smart self test counter
    - debian/patches/CVE-2014-2894.patch: correct self-test count in
      hw/ide/core.c.
    - CVE-2014-2894

Date: 2014-04-25 21:58:12.113514+00:00
Changed-By: Marc Deslauriers <marc.deslauri...@canonical.com>
https://launchpad.net/ubuntu/trusty/+source/qemu/2.0.0~rc1+dfsg-0ubuntu3.1
Sorry, changesfile not available.
-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes

Reply via email to