This bug was fixed in the package qemu - 1:2.12+dfsg-3ubuntu9
---------------
qemu (1:2.12+dfsg-3ubuntu9) disco; urgency=medium
[ Marc Deslauriers ]
* SECURITY UPDATE: integer overflow in NE2000 NIC emulation
- debian/patches/CVE-2018-10839.patch: use proper type in
hw/net/ne2000.c.
- CVE-2018-10839
* SECURITY UPDATE: integer overflow via crafted QMP command
- debian/patches/CVE-2018-12617.patch: check bytes count read by
guest-file-read in qga/commands-posix.c.
- CVE-2018-12617
* SECURITY UPDATE: OOB heap buffer r/w access in NVM Express Controller
- debian/patches/CVE-2018-16847.patch: check size in hw/block/nvme.c.
- CVE-2018-16847
* SECURITY UPDATE: buffer overflow in rtl8139
- debian/patches/CVE-2018-17958.patch: use proper type in
hw/net/rtl8139.c.
- CVE-2018-17958
* SECURITY UPDATE: buffer overflow in pcnet
- debian/patches/CVE-2018-17962.patch: use proper type in
hw/net/pcnet.c.
- CVE-2018-17962
* SECURITY UPDATE: DoS via large packet sizes
- debian/patches/CVE-2018-17963.patch: check size in net/net.c.
- CVE-2018-17963
* SECURITY UPDATE: DoS in lsi53c895a
- debian/patches/CVE-2018-18849.patch: check message length value is
valid in hw/scsi/lsi53c895a.c.
- CVE-2018-18849
* SECURITY UPDATE: Out-of-bounds r/w stack access in ppc64
- debian/patches/CVE-2018-18954.patch: check size before data buffer
access in hw/ppc/pnv_lpc.c.
- CVE-2018-18954
* SECURITY UPDATE: race condition in 9p
- debian/patches/CVE-2018-19364-1.patch: use write lock in
hw/9pfs/cofile.c.
- debian/patches/CVE-2018-19364-2.patch: use write lock in
hw/9pfs/9p.c.
- CVE-2018-19364
[ Christian Ehrhardt]
* debian/patches/ubuntu/lp1787405-*: Support guest dedicated Crypto
Adapters on s390x (LP: #1787405)
* enable opengl for vfio-MDEV support (LP: #1804766)
- d/control-in: set --enable-opengl
- d/control-in: add gl related build-dependencies
-- Christian Ehrhardt <[email protected]> Wed, 21 Nov
2018 13:17:01 -0500
** Changed in: qemu (Ubuntu)
Status: In Progress => Fix Released
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-10839
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-12617
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-16847
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-17958
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-17962
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-17963
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-18849
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-18954
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-19364
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1787405
Title:
[FEAT] Guest-dedicated Crypto Adapters
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1787405/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs