Bugs fixes in "qemu-kvm"
Origin | Bug number | Title | Date fixed |
---|---|---|---|
CVE | CVE-2015-8345 | Qemu: net: eepro100: infinite loop in processing command block list | 2015-12-03 |
CVE | CVE-2015-7512 | net: pcnet: buffer overflow in non-loopback mode | 2015-12-03 |
CVE | CVE-2015-7504 | net: pcnet: heap overflow vulnerability in loopback mode | 2015-12-03 |
CVE | CVE-2015-7295 | hw/virtio/virtio.c in the Virtual Network Device (virtio-net) support in QEMU, when big or mergeable receive buffers are not supported, allows remote | 2015-12-03 |
CVE | CVE-2015-6855 | commands which are illegal to sent to an ATAPI device should be rejected | 2015-09-24 |
CVE | CVE-2015-6815 | Qemu: net: e1000 infinite loop issue | 2015-09-24 |
CVE | CVE-2015-5279 | add checks to validate ring buffer pointers | 2015-09-24 |
CVE | CVE-2015-5278 | net: avoid infinite loop when receiving packets | 2015-09-24 |
CVE | CVE-2015-5239 | Integer overflow in vnc_client_read() and protocol_client_msg() | 2015-09-24 |
CVE | CVE-2015-6855 | commands which are illegal to sent to an ATAPI device should be rejected | 2015-09-24 |
CVE | CVE-2015-6815 | Qemu: net: e1000 infinite loop issue | 2015-09-24 |
CVE | CVE-2015-5279 | add checks to validate ring buffer pointers | 2015-09-24 |
CVE | CVE-2015-5278 | net: avoid infinite loop when receiving packets | 2015-09-24 |
CVE | CVE-2015-5239 | Integer overflow in vnc_client_read() and protocol_client_msg() | 2015-09-24 |
CVE | CVE-2015-6855 | commands which are illegal to sent to an ATAPI device should be rejected | 2015-09-24 |
CVE | CVE-2015-6815 | Qemu: net: e1000 infinite loop issue | 2015-09-24 |
CVE | CVE-2015-5279 | add checks to validate ring buffer pointers | 2015-09-24 |
CVE | CVE-2015-5278 | net: avoid infinite loop when receiving packets | 2015-09-24 |
CVE | CVE-2015-5239 | Integer overflow in vnc_client_read() and protocol_client_msg() | 2015-09-24 |
CVE | CVE-2015-6855 | commands which are illegal to sent to an ATAPI device should be rejected | 2015-09-24 |
About
-
Send Feedback to @ubuntu_updates