ESB-2017.1941 - [Debian] qemu: Denial of service - Remote/unauthenticated 2017-08-07

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2017.1941
                           qemu security update
                               7 August 2017

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           qemu
Publisher:         Debian
Operating System:  Debian GNU/Linux 9
Impact/Access:     Denial of Service -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2017-11443 CVE-2017-11334 CVE-2017-10806
                   CVE-2017-9524  

Reference:         ESB-2017.1882
                   ESB-2017.1827
                   ESB-2017.1688
                   ESB-2017.1687

Original Bulletin: 
   http://www.debian.org/security/2017/dsa-3925

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-3925-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
August 04, 2017                       https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : qemu
CVE ID         : CVE-2017-9524 CVE-2017-10806 CVE-2017-11334
                 CVE-2017-11443
Debian Bug     : 865755 869171 869173 867751 869945

Multiple vulnerabilities were found in qemu, a fast processor emulator:

CVE-2017-9524

    Denial of service in qemu-nbd server

CVE-2017-10806

    Buffer overflow in USB redirector

CVE-2017-11334

    Out-of-band memory access in DMA operations

CVE-2017-11443

    Out-of-band memory access in SLIRP/DHCP

For the stable distribution (stretch), these problems have been fixed in
version 1:2.8+dfsg-6+deb9u2.

We recommend that you upgrade your qemu packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
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=vINB
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=Ykvv
-----END PGP SIGNATURE-----

« Back to bulletins