-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.3282
                           qemu security update
                              5 October 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           qemu
Publisher:         Debian
Operating System:  Debian GNU/Linux
Impact/Access:     Execute Arbitrary Code/Commands -- Existing Account
                   Denial of Service               -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-3748 CVE-2021-3713 CVE-2021-3682
                   CVE-2021-3638 CVE-2021-3546 CVE-2021-3545
                   CVE-2021-3544  

Reference:         ESB-2021.2981
                   ESB-2021.2918

Original Bulletin: 
   http://www.debian.org/security/2021/dsa-4980

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-4980-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
October 03, 2021                      https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : qemu
CVE ID         : CVE-2021-3544 CVE-2021-3545 CVE-2021-3546 CVE-2021-3638 
                 CVE-2021-3682 CVE-2021-3713 CVE-2021-3748
Debian Bug     : 988174 989042 991911 992726 992727 993401

Multiple security issues were discovered in QEMU, a fast processor
emulator, which could result in denial of service or the the execution
of arbitrary code.

For the stable distribution (bullseye), these problems have been fixed in
version 1:5.2+dfsg-11+deb11u1.

We recommend that you upgrade your qemu packages.

For the detailed security status of qemu please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/qemu

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
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=i4BD
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBYVvQ0uNLKJtyKPYoAQh0vQ//dY5Ky6wDOXe7y1s1Uo69qopOkvaTf7+e
Qd2TOzaGWJxan33imNDO5zAGInx64p81NJWAFf0YQbHDl/xv1a5Hlsb3iHN8x+tb
MKQetjQhPuxlz7zoq9BosYsZqGQxLz2T56oPR1Wgpkht9Psz8o3/SWew8fGg9Po3
l8hhOfaz0EEtrV6Q0IgeWx8NqE5qthWtJjaq6zZyfiGbJonks+WAu+6D5gXhmJsp
bbytJ0DAktj11k6WzqO8pO2Y8iZyf1i3B8GK8SeYk+D7IB9mfvKE2LIAnDv8Cmsb
XWJfwEN9TO0mQGK/gZGb8VyYbNcDegvmRkion+Al9k57/Hu4x+VhwSxpxbi+2dQU
jo9UERhfx7EhPjrVDnvgs5h/VggoGID277ZlIDoXPu6oCGYfxymBDEZVghAJH8PZ
OFra3CmdNMHzzNxP6wldIDyVBGvDeu+DNMZuGhB594DmN654HhKIvoV5UDI42AL8
Yh1s5HBXMoVRPLbec3d0AHjSN3FhLXf6ynCfv7ZS1myvKA5GdQIvm1LFt+N3FPWH
Z2qEXVF2HwXJ0V4CaRsgOeH9QTeE4M103amxykQ9gCsAycxwHFcNmQ1i0fJqFChx
Qbo8tvJHsWkWQ6KdIAwp08JxelIRz1SEs1IUL/vNFRvhFP9Obx9uOy4BnzRnyf2G
l0qKvYrm0cA=
=ClJI
-----END PGP SIGNATURE-----