Mehrere Probleme in QEMU
ID: | DSA-3991-1 |
Distribution: | Debian |
Plattformen: | Debian stretch |
Datum: | Mi, 4. Oktober 2017, 08:02 |
Referenzen: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13711
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9375 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13672 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14167 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12809 |
Applikationen: | QEMU |
Originalnachricht |
|
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-3991-1 security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff October 03, 2017 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : qemu CVE ID : CVE-2017-9375 CVE-2017-12809 CVE-2017-13672 CVE-2017-13711 CVE-2017-14167 Multiple vulnerabilities were found in in qemu, a fast processor emulator: CVE-2017-9375 Denial of service via memory leak in USB XHCI emulation. CVE-2017-12809 Denial of service in the CDROM device drive emulation. CVE-2017-13672 Denial of service in VGA display emulation. CVE-2017-13711 Denial of service in SLIRP networking support. CVE-2017-14167 Incorrect validation of multiboot headers could result in the execution of arbitrary code. For the stable distribution (stretch), these problems have been fixed in version 1:2.8+dfsg-6+deb9u3. We recommend that you upgrade your qemu packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAlnUAVYACgkQEMKTtsN8 TjblkA//R5Mh6Np1NdJzBEO8zPhtvvq01k1h3oooHBF89OCyYjYh27W/NnM4IHOm CkxJzwm/Mlg+5x4nUadvfwKfhMDpuMt81pVsxzP+XGNsNQfgq5kLJqs4585EFa7C KibNbAQ2ktkr0eHxeWt6FIWUoFYz41tZEZwiwpdsixvTTbvHCmAqR+jP4lcARqfk 5CMTQCopelswnZFPMF/JTYZ88gAunQuwCVm1jBSBib4Nqep2F4RhYYQubgt1Q2S9 QWhS0ttermVx/r1B2rjQB8iE7V03NVU5NcYvDsbWITxRNZat+5wp7R/zSlP8U+mP +00UvEk9BfS+QmYYGQVqLAB+apG7iPXfwnnKKf2ZrCRcWOP+Yyo4UDnjtG0iVmvS m+TWnF2S+dc7TNBP4egUTkDCEyQgXUjIJsa7MP0WvUApz79Nh/xh49N/AaGf+oJc 8ksc1vhjzlWfD5ghTXVpOsW52O6NkiNArbKh3cMuckSFsMksoF6WIAUpdCNrU3gt 3rnapdRZJkxkx6yOr3a5waoYOnT+zpWCEcZNjTu/94SaGxg76KRFWt2ocKGARM6Y 7kk6M0EwBWbBb7bX1H6L8LEpKn37P2+dpL52CvyID6vSBJ8CWS14S1R5YcjVelAu qfPov5a7diJn3lWWpwUoVgh+g8oZqgv2Q2pLhDgTD13uu9zMO9A= =pBqx -----END PGP SIGNATURE----- |