-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3991-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
October 03, 2017                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : qemu
CVE ID         : CVE-2017-9375 CVE-2017-12809 CVE-2017-13672 CVE-2017-13711 
                 CVE-2017-14167

Multiple vulnerabilities were found in in qemu, a fast processor emulator:

CVE-2017-9375

    Denial of service via memory leak in USB XHCI emulation.
      
CVE-2017-12809

    Denial of service in the CDROM device drive emulation.

CVE-2017-13672

    Denial of service in VGA display emulation.

CVE-2017-13711

    Denial of service in SLIRP networking support.

CVE-2017-14167

    Incorrect validation of multiboot headers could result in the
    execution of arbitrary code.

For the stable distribution (stretch), these problems have been fixed in
version 1:2.8+dfsg-6+deb9u3.

We recommend that you upgrade your qemu packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org

Debian: DSA-3991-1: qemu security update

October 3, 2017
Multiple vulnerabilities were found in in qemu, a fast processor emulator: CVE-2017-9375

Summary

Multiple vulnerabilities were found in in qemu, a fast processor emulator:

CVE-2017-9375

Denial of service via memory leak in USB XHCI emulation.

CVE-2017-12809

Denial of service in the CDROM device drive emulation.

CVE-2017-13672

Denial of service in VGA display emulation.

CVE-2017-13711

Denial of service in SLIRP networking support.

CVE-2017-14167

Incorrect validation of multiboot headers could result in the
execution of arbitrary code.

For the stable distribution (stretch), these problems have been fixed in
version 1:2.8+dfsg-6+deb9u3.

We recommend that you upgrade your qemu packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org

Severity
Package : qemu
CVE ID : CVE-2017-9375 CVE-2017-12809 CVE-2017-13672 CVE-2017-13711
CVE-2017-14167

Related News