Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in QEMU
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in QEMU
ID: DSA-3259-1
Distribution: Debian
Plattformen: Debian wheezy, Debian jessie
Datum: Mi, 13. Mai 2015, 18:39
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9718
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1779
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2756
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456
Applikationen: QEMU

Originalnachricht

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3259-1 security@debian.org
http://www.debian.org/security/ Moritz Muehlenhoff
May 13, 2015 http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : qemu
CVE ID : CVE-2014-9718 CVE-2015-1779 CVE-2015-2756 CVE-2015-3456

Several vulnerabilities were discovered in the qemu virtualisation
solution:

CVE-2014-9718

It was discovered that the IDE controller emulation is susceptible
to denial of service.

CVE-2015-1779

Daniel P. Berrange discovered a denial of service vulnerability in
the VNC web socket decoder.

CVE-2015-2756

Jan Beulich discovered that unmediated PCI command register could
result in denial of service.

CVE-2015-3456

Jason Geffner discovered a buffer overflow in the emulated floppy
disk drive, resulting in the potential execution of arbitrary code.

For the oldstable distribution (wheezy), these problems have been fixed
in version 1.1.2+dfsg-6a+deb7u7 of the qemu source package and in version
1.1.2+dfsg-6+deb7u7 of the qemu-kvm source package. Only CVE-2015-3456
affects oldstable.

For the stable distribution (jessie), these problems have been fixed in
version 1:2.1+dfsg-12.

For the unstable distribution (sid), these problems will be fixed soon.

We recommend that you upgrade your qemu packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=orFk
-----END PGP SIGNATURE-----


--
To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact
listmaster@lists.debian.org
Archive: https://lists.debian.org/20150513160757.GA5951@pisco.westfalen.local
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung