Jump to content
Compatible Support Forums
Sign in to follow this  
news

[Tech ARP] The Desktop CPU Comparison Guide Rev. 18.4

Recommended Posts

-----BEGIN PGP SIGNED MESSAGE-----

Hash: SHA256

 

- -------------------------------------------------------------------------

Debian Security Advisory DSA-3925-1 security ( -at -) debian.org

https://www.debian.org/security/ Moritz Muehlenhoff

August 04, 2017 https://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : qemu

CVE ID : CVE-2017-9524 CVE-2017-10806 CVE-2017-11334

CVE-2017-11443

Debian Bug : 865755 869171 869173 867751 869945

 

Multiple vulnerabilities were found in qemu, a fast processor emulator:

 

CVE-2017-9524

 

Denial of service in qemu-nbd server

 

CVE-2017-10806

 

Buffer overflow in USB redirector

 

CVE-2017-11334

 

Out-of-band memory access in DMA operations

 

CVE-2017-11443

 

Out-of-band memory access in SLIRP/DHCP

 

For the stable distribution (stretch), these problems have been fixed in

version 1:2.8+dfsg-6+deb9u2.

 

We recommend that you upgrade your qemu packages.

 

Further information about Debian Security Advisories, how to apply

these updates to your system and frequently asked questions can be

found at: https://www.debian.org/security/

 

 

 

Share this post


Link to post

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
Sign in to follow this  

×