drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in QEMU
Name: |
Mehrere Probleme in QEMU |
|
ID: |
DSA-3991-1 |
|
Distribution: |
Debian |
|
Plattformen: |
Debian stretch |
|
Datum: |
Mi, 4. Oktober 2017, 08:02 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13711
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9375
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13672
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14167
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12809 |
|
Applikationen: |
QEMU |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
- ------------------------------------------------------------------------- Debian Security Advisory DSA-3991-1 security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff October 03, 2017 https://www.debian.org/security/faq - -------------------------------------------------------------------------
Package : qemu CVE ID : CVE-2017-9375 CVE-2017-12809 CVE-2017-13672 CVE-2017-13711 CVE-2017-14167
Multiple vulnerabilities were found in in qemu, a fast processor emulator:
CVE-2017-9375
Denial of service via memory leak in USB XHCI emulation. CVE-2017-12809
Denial of service in the CDROM device drive emulation.
CVE-2017-13672
Denial of service in VGA display emulation.
CVE-2017-13711
Denial of service in SLIRP networking support.
CVE-2017-14167
Incorrect validation of multiboot headers could result in the execution of arbitrary code.
For the stable distribution (stretch), these problems have been fixed in version 1:2.8+dfsg-6+deb9u3.
We recommend that you upgrade your qemu packages.
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAlnUAVYACgkQEMKTtsN8 TjblkA//R5Mh6Np1NdJzBEO8zPhtvvq01k1h3oooHBF89OCyYjYh27W/NnM4IHOm CkxJzwm/Mlg+5x4nUadvfwKfhMDpuMt81pVsxzP+XGNsNQfgq5kLJqs4585EFa7C KibNbAQ2ktkr0eHxeWt6FIWUoFYz41tZEZwiwpdsixvTTbvHCmAqR+jP4lcARqfk 5CMTQCopelswnZFPMF/JTYZ88gAunQuwCVm1jBSBib4Nqep2F4RhYYQubgt1Q2S9 QWhS0ttermVx/r1B2rjQB8iE7V03NVU5NcYvDsbWITxRNZat+5wp7R/zSlP8U+mP +00UvEk9BfS+QmYYGQVqLAB+apG7iPXfwnnKKf2ZrCRcWOP+Yyo4UDnjtG0iVmvS m+TWnF2S+dc7TNBP4egUTkDCEyQgXUjIJsa7MP0WvUApz79Nh/xh49N/AaGf+oJc 8ksc1vhjzlWfD5ghTXVpOsW52O6NkiNArbKh3cMuckSFsMksoF6WIAUpdCNrU3gt 3rnapdRZJkxkx6yOr3a5waoYOnT+zpWCEcZNjTu/94SaGxg76KRFWt2ocKGARM6Y 7kk6M0EwBWbBb7bX1H6L8LEpKn37P2+dpL52CvyID6vSBJ8CWS14S1R5YcjVelAu qfPov5a7diJn3lWWpwUoVgh+g8oZqgv2Q2pLhDgTD13uu9zMO9A= =pBqx -----END PGP SIGNATURE-----
|
|
|
|