Package "qemu-user"
Name: |
qemu-user
|
Description: |
QEMU user mode emulation binaries
|
Latest version: |
2.0.0+dfsg-2ubuntu1.46 |
Release: |
trusty (14.04) |
Level: |
security |
Repository: |
universe |
Head package: |
qemu |
Homepage: |
http://www.qemu.org/ |
Links
Download "qemu-user"
Other versions of "qemu-user" in Trusty
Changelog
qemu (2.0.0+dfsg-2ubuntu1.41) trusty-security; urgency=medium
* SECURITY UPDATE: arbitrary code execution via load_multiboot
- debian/patches/CVE-2018-7550.patch: handle bss_end_addr being zero in
hw/i386/multiboot.c.
- CVE-2018-7550
-- Marc Deslauriers <email address hidden> Fri, 11 May 2018 13:35:08 -0400
|
Source diff to previous version |
CVE-2018-7550 |
The load_multiboot function in hw/i386/multiboot.c in Quick Emulator (aka QEMU) allows local guest OS users to execute arbitrary code on the QEMU hos |
|
qemu (2.0.0+dfsg-2ubuntu1.40) trusty-security; urgency=medium
* SECURITY REGRESSION: Xen regression (LP: #1752761)
- debian/patches/CVE-2017-11334-1.patch: removed.
- debian/patches/CVE-2017-11334-2.patch: removed.
-- Marc Deslauriers <email address hidden> Sun, 04 Mar 2018 10:11:19 -0500
|
Source diff to previous version |
1752761 |
Regression in vga handling ubuntu10.21 to ubuntu10.22 |
CVE-2017-11334 |
The address_space_write_continue function in exec.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service |
|
qemu (2.0.0+dfsg-2ubuntu1.39) trusty-security; urgency=medium
* SECURITY UPDATE: DoS via guest ram block area
- debian/patches/CVE-2017-11334-1.patch: use qemu_ram_ptr_length to
access guest ram in exec.c.
- debian/patches/CVE-2017-11334-2.patch: add lock parameter to
qemu_ram_ptr_length in exec.c.
- CVE-2017-11334
* SECURITY UPDATE: code execution via multiboot out-of-bounds write
- debian/patches/CVE-2017-14167.patch: validate multiboot header
address values in hw/i386/multiboot.c.
- CVE-2017-14167
* SECURITY UPDATE: information disclosure via race in 9pfs
- debian/patches/CVE-2017-15038.patch: use g_malloc0 to allocate space
for xattr in hw/9pfs/virtio-9p.c.
- CVE-2017-15038
* SECURITY UPDATE: DoS in cirrus driver
- debian/patches/CVE-2017-15289.patch: fix oob access in mode4and5
write functions in hw/display/cirrus_vga.c.
- CVE-2017-15289
* SECURITY UPDATE: DoS via integer overflow in ROUND_UP
- debian/patches/CVE-2017-18043.patch: fix ROUND_UP in
include/qemu/osdep.h.
- CVE-2017-18043
* SECURITY UPDATE: DoS in VGA driver
- debian/patches/CVE-2018-5683.patch: check the validation of memory
addr when draw text in hw/display/vga.c.
- CVE-2018-5683
-- Marc Deslauriers <email address hidden> Thu, 15 Feb 2018 13:33:14 -0500
|
Source diff to previous version |
CVE-2017-11334 |
The address_space_write_continue function in exec.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service |
CVE-2017-14167 |
Integer overflow in the load_multiboot function in hw/i386/multiboot.c in QEMU (aka Quick Emulator) allows local guest OS users to execute arbitrary |
CVE-2017-15038 |
Race condition in the v9fs_xattrwalk function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS users to obtain sensitive informatio |
CVE-2017-15289 |
The mode4and5 write functions in hw/display/cirrus_vga.c in Qemu allow local OS guest privileged users to cause a denial of service (out-of-bounds wr |
CVE-2017-18043 |
Integer overflow in the macro ROUND_UP (n, d) in Quick Emulator (Qemu) allows a user to cause a denial of service (Qemu process crash). |
CVE-2018-5683 |
The vga_draw_text function in Qemu allows local OS guest privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) by |
|
qemu (2.0.0+dfsg-2ubuntu1.38) trusty-security; urgency=medium
* SECURITY UPDATE: Add support for Spectre mitigations (LP: #1744882)
- debian/patches/CVE-2017-5715-1.patch: Lengthen X86CPUDefinition::
model_id in target-i386/cpu.c.
- debian/patches/CVE-2017-5715-2.patch: Add support for SPEC_CTRL MSR
in target-i386/cpu.h, target-i386/kvm.c, target-i386/machine.c.
- debian/patches/CVE-2017-5715-3pre1.patch: add FEAT_7_0_ECX and
FEAT_7_0_EDX in target-i386/cpu.c, target-i386/cpu.h.
- debian/patches/CVE-2017-5715-3.patch: Add spec-ctrl CPUID bit in
target-i386/cpu.c, target-i386/cpu.h.
- debian/patches/CVE-2017-5715-4.patch: Add FEAT_8000_0008_EBX CPUID
feature word in target-i386/cpu.c, target-i386/cpu.h.
- debian/patches/CVE-2017-5715-5.patch: Add new -IBRS versions of Intel
CPU models in target-i386/cpu.c.
- CVE-2017-5715
-- Marc Deslauriers <email address hidden> Thu, 01 Feb 2018 13:27:00 -0500
|
Source diff to previous version |
1744882 |
Add SPEC_CTRL and IBRS changes |
CVE-2017-5715 |
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an at |
|
qemu (2.0.0+dfsg-2ubuntu1.36) trusty-security; urgency=medium
* SECURITY REGRESSION: regression in in USB xHCI emulation (LP: #1718222)
- debian/patches/CVE-2017-9375-regression.patch: don't kick in
xhci_submit and xhci_fire_ctl_transfer in hw/usb/hcd-xhci.c.
-- Marc Deslauriers <email address hidden> Wed, 20 Sep 2017 07:27:30 -0400
|
About
-
Send Feedback to @ubuntu_updates