diff options
author | Adrian Bunk <bunk@debian.org> | 2020-06-29 23:57:44 +0300 |
---|---|---|
committer | Adrian Bunk <bunk@debian.org> | 2020-06-29 23:58:45 +0300 |
commit | e2d89058b3af54ef4269f07911282774a2c1b691 (patch) | |
tree | 7e8c63c823c9f7a2351b7cf548b19f716c3f1472 /english | |
parent | f652bbf5633d5938026a37c07ad6f2c761941a63 (diff) |
DLA 2262
Diffstat (limited to 'english')
-rw-r--r-- | english/lts/security/2020/dla-2262.data | 10 | ||||
-rw-r--r-- | english/lts/security/2020/dla-2262.wml | 42 |
2 files changed, 52 insertions, 0 deletions
diff --git a/english/lts/security/2020/dla-2262.data b/english/lts/security/2020/dla-2262.data new file mode 100644 index 00000000000..e190a35609c --- /dev/null +++ b/english/lts/security/2020/dla-2262.data @@ -0,0 +1,10 @@ +<define-tag pagetitle>DLA-2262-1 qemu</define-tag> +<define-tag report_date>2020-06-29</define-tag> +<define-tag secrefs>CVE-2020-1983 CVE-2020-13361 CVE-2020-13362 CVE-2020-13765</define-tag> +<define-tag packages>qemu</define-tag> +<define-tag isvulnerable>yes</define-tag> +<define-tag fixed>yes</define-tag> +<define-tag fixed-section>no</define-tag> + +#use wml::debian::security + diff --git a/english/lts/security/2020/dla-2262.wml b/english/lts/security/2020/dla-2262.wml new file mode 100644 index 00000000000..78e9a1ac675 --- /dev/null +++ b/english/lts/security/2020/dla-2262.wml @@ -0,0 +1,42 @@ +<define-tag description>LTS security update</define-tag> +<define-tag moreinfo> + +<p>Brief introduction</p> + +<ul> + +<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-1983">CVE-2020-1983</a> + + <p>slirp: Fix use-after-free in ip_reass().</p></li> + +<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-13361">CVE-2020-13361</a> + + <p>es1370_transfer_audio in hw/audio/es1370.c + allowed guest OS users to trigger an out-of-bounds access + during an es1370_write() operation.</p></li> + +<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-13362">CVE-2020-13362</a> + + <p>megasas_lookup_frame in hw/scsi/megasas.c had + an out-of-bounds read via a crafted reply_queue_head field from + a guest OS user.</p></li> + +<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-13765">CVE-2020-13765</a> + + <p>hw/core/loader: Fix possible crash in rom_copy().</p></li> + +</ul> + +<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version +1:2.1+dfsg-12+deb8u15.</p> + +<p>We recommend that you upgrade your qemu packages.</p> + +<p>Further information about Debian LTS security advisories, how to apply +these updates to your system and frequently asked questions can be +found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p> +</define-tag> + +# do not modify the following line +#include "$(ENGLISHDIR)/lts/security/2020/dla-2262.data" +# $Id: $ |