lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20150513160757.GA5951@pisco.westfalen.local>
Date: Wed, 13 May 2015 18:07:57 +0200
From: Moritz Muehlenhoff <jmm@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 3259-1] qemu security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3259-1                   security@...ian.org
http://www.debian.org/security/                        Moritz Muehlenhoff
May 13, 2015                           http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : qemu
CVE ID         : CVE-2014-9718 CVE-2015-1779 CVE-2015-2756 CVE-2015-3456

Several vulnerabilities were discovered in the qemu virtualisation
solution:

CVE-2014-9718

    It was discovered that the IDE controller emulation is susceptible
    to denial of service.

CVE-2015-1779

    Daniel P. Berrange discovered a denial of service vulnerability in
    the VNC web socket decoder. 

CVE-2015-2756

    Jan Beulich discovered that unmediated PCI command register could
    result in denial of service.

CVE-2015-3456

    Jason Geffner discovered a buffer overflow in the emulated floppy
    disk drive, resulting in the potential execution of arbitrary code.

For the oldstable distribution (wheezy), these problems have been fixed
in version 1.1.2+dfsg-6a+deb7u7 of the qemu source package and in version
1.1.2+dfsg-6+deb7u7 of the qemu-kvm source package. Only CVE-2015-3456
affects oldstable.

For the stable distribution (jessie), these problems have been fixed in
version 1:2.1+dfsg-12.

For the unstable distribution (sid), these problems will be fixed soon.

We recommend that you upgrade your qemu packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIcBAEBAgAGBQJVU0Y6AAoJEBDCk7bDfE42jE8QAIyvxbW59QLpX/iLpFryBKLp
ib5PgF9SwD1Hir1Pyg74VD27mnHAfwhX8w+kbHoE7clEk6Iwb0B0wcmr9u1LNmCM
hmadsxD82iFrVLGQZp65rxlB42HC2O5DPE6Aq0tx64Kor0A+Bd/fRKBPufinQOEw
NWxhxpGSvFMbe3DrTtfNTO6JTMavAFPIYV2VoCxzUPWWSZka6ZdTv/5GRwvA6GIq
IWggbkpKDL2yjm13QLuCAtLscLrwpR7XYCL+Nl2gRzqbts8XluMk1vNjNZ/KfEux
qjnjWT6QbwvOPee1H88UyoNVmL8ck/9PHvMAGGSRvoS07A9k3rdNcvwDE9HGjtv7
PBhiCe90U0WwTgogRd/YBXVV+pz8kUxzCszFvnuEnyN5VbOPJ98hsAbD51XT1b4w
Ht9JK0K7RQ0TRuAbptM+CUIevyq992EJbrzxIpfdlqJfmsZbA8xwRl+tXI5PicW0
kv4QwkCnN+JZ6pP4Bu6mpeSo63Ok2FTdmaBuZdmExVFd1W2Ywj+Ax6QEBHiMlQfn
sVB4rZRp5j0AK9hps/DQx7Ju/cEbUaD5LCWElKQ0fbnFSXbYDoFf3jKMsszIgCiE
3eoM1+JO1s36Ir9osgIIgkiwNU8AHU/nTDt1oglFXubR/RZdkAxCcLi8YiRR827g
pfdENJ5xF5bOKNtC9Zyr
=orFk
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ