qemu (2.0.0+dfsg-2ubuntu1.39) trusty-security; urgency=medium

  * SECURITY UPDATE: DoS via guest ram block area
    - debian/patches/CVE-2017-11334-1.patch: use qemu_ram_ptr_length to
      access guest ram in exec.c.
    - debian/patches/CVE-2017-11334-2.patch: add lock parameter to
      qemu_ram_ptr_length in exec.c.
    - CVE-2017-11334
  * SECURITY UPDATE: code execution via multiboot out-of-bounds write
    - debian/patches/CVE-2017-14167.patch: validate multiboot header
      address values in hw/i386/multiboot.c.
    - CVE-2017-14167
  * SECURITY UPDATE: information disclosure via race in 9pfs
    - debian/patches/CVE-2017-15038.patch: use g_malloc0 to allocate space
      for xattr in hw/9pfs/virtio-9p.c.
    - CVE-2017-15038
  * SECURITY UPDATE: DoS in cirrus driver
    - debian/patches/CVE-2017-15289.patch: fix oob access in mode4and5
      write functions in hw/display/cirrus_vga.c.
    - CVE-2017-15289
  * SECURITY UPDATE: DoS via integer overflow in ROUND_UP
    - debian/patches/CVE-2017-18043.patch: fix ROUND_UP in
      include/qemu/osdep.h.
    - CVE-2017-18043
  * SECURITY UPDATE: DoS in VGA driver
    - debian/patches/CVE-2018-5683.patch: check the validation of memory
      addr when draw text in hw/display/vga.c.
    - CVE-2018-5683

Date: 2018-02-15 19:43:26.992930+00:00
Changed-By: Marc Deslauriers <marc.deslauri...@canonical.com>
https://launchpad.net/ubuntu/+source/qemu/2.0.0+dfsg-2ubuntu1.39
Sorry, changesfile not available.
-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes

Reply via email to