This bug was fixed in the package qemu-kvm - 0.14.0+noroms-0ubuntu8 --------------- qemu-kvm (0.14.0+noroms-0ubuntu8) oneiric; urgency=low
* SECURITY UPDATE: fix to validate virtqueue in and out requests from the guests - debian/patches/CVE-2011-2212-virtqueue-indirect-overflow.patch: update hw/virtio.c to verify the length of indirect descriptors in virtqueue_pop() and virtqueue_avail_bytes() - CVE-2011-2212 - LP: #806167 * SECURITY UPDATE: validate virtio_queue_notify() is non-negative - virtio-guard-against-negative-vq-notifies-CVE-2011-2512.diff: update to move comparison out to syborg_virtio_writel(), virtio_ioport_write() and virtio_queue_notify_vq() and don't call common virtio code if virtqueue number is invalid. Patch from Debian. - CVE-2011-2512 - LP: #806166 -- Jamie Strandboge <ja...@ubuntu.com> Tue, 05 Jul 2011 13:24:52 -0500 ** Changed in: qemu-kvm (Ubuntu Oneiric) Status: In Progress => Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-2212 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-2512 -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to qemu-kvm in Ubuntu. https://bugs.launchpad.net/bugs/806166 Title: CVE-2011-2512 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/qemu-kvm/+bug/806166/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs