This bug was fixed in the package qemu - 1:2.5+dfsg-5ubuntu10.11

---------------
qemu (1:2.5+dfsg-5ubuntu10.11) xenial-security; urgency=medium

  * SECURITY UPDATE: DoS in virtio GPU device
    - debian/patches/CVE-2016-10028.patch: check virgl capabilities
      max_size in hw/display/virtio-gpu-3d.c.
    - CVE-2016-10028
  * SECURITY UPDATE: DoS in virtio GPU device
    - debian/patches/CVE-2016-10029-*.patch: check values in
      hw/display/virtio-gpu.c, hw/display/virtio-gpu-3d.c,
      include/hw/virtio/virtio-gpu.h.
    - CVE-2016-10029
  * SECURITY UPDATE: DoS via 6300esb unplug operations
    - debian/patches/CVE-2016-10155.patch: add exit function in
      hw/watchdog/wdt_i6300esb.c.
    - CVE-2016-10155
  * SECURITY UPDATE: DoS in i.MX Fast Ethernet Controller
    - debian/patches/CVE-2016-7907.patch: limit buffer descriptor count in
      hw/net/imx_fec.c.
    - CVE-2016-7907
  * SECURITY UPDATE: DoS in JAZZ RC4030 chipset emulation
    - debian/patches/CVE-2016-8667.patch: limit interval timer reload value
      in hw/dma/rc4030.c.
    - CVE-2016-8667
  * SECURITY UPDATE: DoS in 16550A UART emulation
    - debian/patches/CVE-2016-8669.patch: check divider value against baud
      base in hw/char/serial.c.
    - CVE-2016-8669
  * SECURITY UPDATE: privilege escalation via ioreq handling
    - debian/patches/CVE-2016-9381.patch: avoid double fetches and add
      bounds checks to xen-hvm.c.
    - CVE-2016-9381
  * SECURITY UPDATE: host filesystem access via virtFS
    - debian/patches/CVE-2016-9602-*.patch: don't follow symlinks in
      hw/9pfs/*.
    - CVE-2016-9602
  * SECURITY UPDATE: arbitrary code execution via Cirrus VGA
    - debian/patches/CVE-2016-9603.patch: remove bitblit support from
      console code in hw/display/cirrus_vga.c, include/ui/console.h,
      ui/console.c, ui/vnc.c.
    - CVE-2016-9603
  * SECURITY UPDATE: infinite loop in ColdFire Fast Ethernet Controller
    - debian/patches/CVE-2016-9776.patch: check receive buffer size
      register value in hw/net/mcf_fec.c.
    - CVE-2016-9776
  * SECURITY UPDATE: information leak in virtio GPU device
    - debian/patches/CVE-2016-9845.patch: properly clear out memory in
      hw/display/virtio-gpu-3d.c.
    - CVE-2016-9845
  * SECURITY UPDATE: DoS via memory leak in virtio GPU device
    - debian/patches/CVE-2016-9846.patch: properly free memory in
      hw/display/virtio-gpu.c.
    - CVE-2016-9846
  * SECURITY UPDATE: DoS via memory leak in USB redirector
    - debian/patches/CVE-2016-9907.patch: properly free memory in
      hw/usb/redirect.c.
    - CVE-2016-9907
  * SECURITY UPDATE: information leak in virtio GPU device
    - debian/patches/CVE-2016-9908.patch: properly clear out memory in
      hw/display/virtio-gpu-3d.c.
    - CVE-2016-9908
  * SECURITY UPDATE: DoS via memory leak in USB EHCI Emulation
    - debian/patches/CVE-2016-9911.patch: properly free memory in
      hw/usb/hcd-ehci.c.
    - CVE-2016-9911
  * SECURITY UPDATE: DoS via memory leak in virtio GPU device
    - debian/patches/CVE-2016-9912.patch: properly free memory in
      hw/display/virtio-gpu.c.
    - CVE-2016-9912
  * SECURITY UPDATE: DoS via virtFS
    - debian/patches/CVE-2016-9913.patch: adjust the order of resource
      cleanup in hw/9pfs/virtio-9p-device.c.
    - CVE-2016-9913
  * SECURITY UPDATE: DoS via virtFS
    - debian/patches/CVE-2016-9914-*.patch: add cleanup operations to
      fsdev/file-op-9p.h, hw/9pfs/virtio-9p-device.c.
    - CVE-2016-9914
  * SECURITY UPDATE: DoS via virtFS
    - debian/patches/CVE-2016-9915.patch: add cleanup operation to
      hw/9pfs/virtio-9p-handle.c.
    - CVE-2016-9915
  * SECURITY UPDATE: DoS via virtFS
    - debian/patches/CVE-2016-9916.patch: add cleanup operation to
      hw/9pfs/virtio-9p-proxy.c.
    - CVE-2016-9916
  * SECURITY UPDATE: DoS in Cirrus VGA
    - debian/patches/CVE-2016-9921-9922.patch: check bpp values in
      hw/display/cirrus_vga.c.
    - CVE-2016-9921
    - CVE-2016-9922
  * SECURITY UPDATE: code execution via Cirrus VGA
    - debian/patches/CVE-2017-2615.patch: fix oob access in
      hw/display/cirrus_vga.c.
    - CVE-2017-2615
  * SECURITY UPDATE: code execution via Cirrus VGA
    - debian/patches/CVE-2017-2620-pre.patch: add extra parameter to
      blit_is_unsafe in hw/display/cirrus_vga.c.
    - debian/patches/CVE-2017-2620.patch: add blit destination check to
      hw/display/cirrus_vga.c.
    - CVE-2017-2620
  * SECURITY UPDATE: DoS via memory leak in ac97 audio device
    - debian/patches/CVE-2017-5525.patch: add exit function to
      hw/audio/ac97.c.
    - CVE-2017-5525
  * SECURITY UPDATE: DoS via memory leak in es1370 audio device
    - debian/patches/CVE-2017-5526.patch: add exit function to
      hw/audio/es1370.c.
    - CVE-2017-5526
  * SECURITY UPDATE: DoS via memory leak in virtio GPU device
    - debian/patches/CVE-2017-5552.patch: check return value in
      hw/display/virtio-gpu-3d.c.
    - CVE-2017-5552
  * SECURITY UPDATE: DoS via memory leak in virtio GPU device
    - debian/patches/CVE-2017-5578.patch: check res->iov in
      hw/display/virtio-gpu.c.
    - CVE-2017-5578
  * SECURITY UPDATE: DoS via memory leak in 16550A UART emulation
    - debian/patches/CVE-2017-5579.patch: properly free resources in
      hw/char/serial.c.
    - CVE-2017-5579
  * SECURITY UPDATE: code execution via SDHCI device emulation
    - debian/patches/CVE-2017-5667.patch: check data length in
      hw/sd/sdhci.c.
    - CVE-2017-5667
  * SECURITY UPDATE: DoS via memory leak in MegaRAID SAS device
    - debian/patches/CVE-2017-5856.patch: properly handle memory in
      hw/scsi/megasas.c.
    - CVE-2017-5856
  * SECURITY UPDATE: DoS via memory leak in virtio GPU device
    - debian/patches/CVE-2017-5857.patch: properly clean up in
      hw/display/virtio-gpu-3d.c.
    - CVE-2017-5857
  * SECURITY UPDATE: DoS in CCID Card device
    - debian/patches/CVE-2017-5898.patch: check ccid apdu length in
      hw/usb/dev-smartcard-reader.c.
    - CVE-2017-5898
  * SECURITY UPDATE: DoS via infinite loop in USB xHCI controller emulator
    - debian/patches/CVE-2017-5973.patch: apply limits to loops in
      hw/usb/hcd-xhci.c, trace-events.
    - CVE-2017-5973
  * SECURITY UPDATE: DoS via infinite loop in SDHCI device emulation
    - debian/patches/CVE-2017-5987-*.patch: fix transfer mode register
      handling in hw/sd/sdhci.c.
    - CVE-2017-5987
  * SECURITY UPDATE: DoS via infinite loop in USB OHCI emulation
    - debian/patches/CVE-2017-6505.patch: limit the number of link eds in
      hw/usb/hcd-ohci.c.
    - CVE-2017-6505
  * A work-around to fix live migrations (LP: #1647389)
    - debian/patches/CVE-2016-5403-5.patch: fix vq->inuse recalc after
      migration in hw/virtio/virtio.c.
    - debian/patches/CVE-2016-5403-6.patch: make sure vdev->vq[i].inuse
      never goes below 0 in hw/virtio/virtio.c.

 -- Marc Deslauriers <marc.deslauri...@ubuntu.com>  Wed, 05 Apr 2017
09:55:02 -0400

** Changed in: qemu (Ubuntu Xenial)
       Status: Confirmed => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-10028

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-10029

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-10155

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-7907

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-8667

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-8669

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-9381

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-9602

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-9603

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-9776

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-9845

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-9846

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-9907

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-9908

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-9911

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-9912

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-9913

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-9914

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-9915

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-9916

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-9921

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-9922

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2017-2615

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2017-2620

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2017-5525

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2017-5526

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2017-5552

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2017-5578

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2017-5579

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2017-5667

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2017-5856

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2017-5857

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2017-5898

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2017-5973

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2017-5987

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2017-6505

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1647389

Title:
  Regression: Live migrations can still crash after CVE-2016-5403 fix

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/qemu/+bug/1647389/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to