Debian 9897 Published by

The following Debian updates has been released today:

[DLA 618-1] qemu security update
[DLA 619-1] qemu-kvm security update
[DSA 3665-1] openjpeg2 security update



[DLA 618-1] qemu security update

Package : qemu
Version : 1.1.2+dfsg-6+deb7u15
CVE ID : CVE-2016-7116
Debian Bug : 836502

Quick Emulator(Qemu) built with the VirtFS, host directory sharing via Plan 9
File System(9pfs) support, is vulnerable to a directory/path traversal issue.
It could occur while creating or accessing files on a shared host directory.

A privileged user inside guest could use this flaw to access undue files on the
host.

For Debian 7 "Wheezy", these problems have been fixed in version
1.1.2+dfsg-6+deb7u15.

We recommend that you upgrade your qemu packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

[DLA 619-1] qemu-kvm security update

Package : qemu-kvm
Version : 1.1.2+dfsg-6+deb7u15
CVE ID : CVE-2016-7116

qemu-kvm built with the VirtFS, host directory sharing via Plan 9 File System
(9pfs) support, is vulnerable to a directory/path traversal issue. It could
occur while creating or accessing files on a shared host directory.

A privileged user inside guest could use this flaw to access undue files on the
host.

For Debian 7 "Wheezy", these problems have been fixed in version
1.1.2+dfsg-6+deb7u15.

We recommend that you upgrade your qemu-kvm packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS


[DSA 3665-1] openjpeg2 security update

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3665-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
September 11, 2016 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : openjpeg2
CVE ID : CVE-2015-6581 CVE-2015-8871 CVE-2016-1924 CVE-2016-7163

Multiple vulnerabilities in OpenJPEG, a JPEG 2000 image compression /
decompression library, may result in denial of service or the execution
of arbitrary code if a malformed JPEG 2000 file is processed.

For the stable distribution (jessie), these problems have been fixed in
version 2.1.0-2+deb8u1.

We recommend that you upgrade your openjpeg2 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/