ESB-2017.1827 - [Debian] qemu: Multiple vulnerabilities 2017-07-26

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2017.1827
                           qemu security update
                               26 July 2017

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           qemu
Publisher:         Debian
Operating System:  Debian GNU/Linux 9
Impact/Access:     Access Privileged Data -- Existing Account      
                   Denial of Service      -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2017-10911 CVE-2017-10664 CVE-2017-9524
                   CVE-2017-9375 CVE-2017-9374 CVE-2017-9373
                   CVE-2017-9330 CVE-2017-9310 

Reference:         ESB-2017.1706
                   ESB-2017.1688
                   ESB-2017.1687
                   ESB-2017.1655

Original Bulletin: 
   http://www.debian.org/security/2017/dsa-3920

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-3920-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
July 25, 2017                         https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : qemu
CVE ID         : CVE-2017-9310 CVE-2017-9330 CVE-2017-9373 CVE-2017-9374 
                 CVE-2017-9375 CVE-2017-9524 CVE-2017-10664 CVE-2017-10911

Multiple vulnerabilities were found in in qemu, a fast processor
emulator:
 
CVE-2017-9310

    Denial of service via infinite loop in e1000e NIC emulation.

CVE-2017-9330

    Denial of service via infinite loop in USB OHCI emulation.

CVE-2017-9373

    Denial of service via memory leak in IDE AHCI emulation.

CVE-2017-9374

    Denial of service via memory leak in USB EHCI emulation.

CVE-2017-9375

    Denial of service via memory leak in USB XHCI emulation.

CVE-2017-9524

    Denial of service in qemu-nbd server.

CVE-2017-10664

    Denial of service in qemu-nbd server.

CVE-2017-10911

    Information leak in Xen blkif response handling.

For the oldstable distribution (jessie), a separate DSA will be issued.

For the stable distribution (stretch), these problems have been fixed in
version 1:2.8+dfsg-6+deb9u1.

For the unstable distribution (sid), these problems will be fixed soon.

We recommend that you upgrade your qemu packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
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=kL4T
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=7f4q
-----END PGP SIGNATURE-----

« Back to bulletins