Debian 9858 Published by

The following Debian updates has been released:

[DLA 764-1] qemu security update
[DLA 765-1] qemu-kvm security update
[DSA 3748-1] libcrypto++ security update



[DLA 764-1] qemu security update

Package : qemu
Version : 1.1.2+dfsg-6+deb7u19
CVE ID : CVE-2016-9911 CVE-2016-9921 CVE-2016-9922

Multiple vulnerabilities have been found in QEMU:

CVE-2016-9911

Quick Emulator (Qemu) built with the USB EHCI Emulation support
is vulnerable to a memory leakage issue. It could occur while
processing packet data in 'ehci_init_transfer'. A guest user/
process could use this issue to leak host memory, resulting in
DoS for a host.

CVE-2016-9921, CVE-2016-9922

Quick emulator (Qemu) built with the Cirrus CLGD 54xx VGA Emulator
support is vulnerable to a divide by zero issue. It could occur
while copying VGA data when cirrus graphics mode was set to be
VGA. A privileged user inside guest could use this flaw to crash
the Qemu process instance on the host, resulting in DoS.

For Debian 7 "Wheezy", these problems have been fixed in version
1.1.2+dfsg-6+deb7u19.

We recommend that you upgrade your qemu packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

[DLA 765-1] qemu-kvm security update

Package : qemu-kvm
Version : 1.1.2+dfsg-6+deb7u19
CVE ID : CVE-2016-9911 CVE-2016-9921 CVE-2016-9922

Multiple vulnerabilities have been found in qemu-kvm:

CVE-2016-9911

qemu-kvm built with the USB EHCI Emulation support is vulnerable
to a memory leakage issue. It could occur while processing packet
data in 'ehci_init_transfer'. A guest user/process could use this
issue to leak host memory, resulting in DoS for a host.

CVE-2016-9921, CVE-2016-9922

qemu-kvm built with the Cirrus CLGD 54xx VGA Emulator support is
vulnerable to a divide by zero issue. It could occur while copying
VGA data when cirrus graphics mode was set to be VGA. A privileged
user inside guest could use this flaw to crash the Qemu process
instance on the host, resulting in DoS.

For Debian 7 "Wheezy", these problems have been fixed in version
1.1.2+dfsg-6+deb7u19.

We recommend that you upgrade your qemu-kvm packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

[DSA 3748-1] libcrypto++ security update

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3748-1 security@debian.org
https://www.debian.org/security/ Sebastien Delafond
December 26, 2016 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : libcrypto++
CVE ID : CVE-2016-9939
Debian Bug : 848009

Gergely Gábor Nagy from Tresorit discovered that libcrypto++, a C++
cryptographic library, contained a bug in several ASN.1 parsing
routines. This would allow an attacker to remotely cause a denial of
service.

For the stable distribution (jessie), this problem has been fixed in
version 5.6.1-6+deb8u3.

For the testing (stretch) and unstable (sid) distributions, this
problem has been fixed in version 5.6.4-5.

We recommend that you upgrade your libcrypto++ packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/