The following updates has been released for Debian GNU/Linux:
DSA 3990-1: asterisk security update
DSA 3991-1: qemu security update
DSA 3990-1: asterisk security update
DSA 3991-1: qemu security update
DSA 3990-1: asterisk security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-3990-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
October 03, 2017 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : asterisk
CVE ID : CVE-2017-14603
Klaus-Peter Junghann discovered that insufficient validation of RTCP
packets in Asterisk may result in an information leak. Please see the
upstream advisory at
http://downloads.asterisk.org/pub/security/AST-2017-008.html for
additional details.
For the oldstable distribution (jessie), this problem has been fixed
in version 1:11.13.1~dfsg-2+deb8u4.
For the stable distribution (stretch), this problem has been fixed in
version 1:13.14.1~dfsg-2+deb9u2.
We recommend that you upgrade your asterisk packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
DSA 3991-1: qemu security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-3991-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
October 03, 2017 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : qemu
CVE ID : CVE-2017-9375 CVE-2017-12809 CVE-2017-13672 CVE-2017-13711
CVE-2017-14167
Multiple vulnerabilities were found in in qemu, a fast processor emulator:
CVE-2017-9375
Denial of service via memory leak in USB XHCI emulation.
CVE-2017-12809
Denial of service in the CDROM device drive emulation.
CVE-2017-13672
Denial of service in VGA display emulation.
CVE-2017-13711
Denial of service in SLIRP networking support.
CVE-2017-14167
Incorrect validation of multiboot headers could result in the
execution of arbitrary code.
For the stable distribution (stretch), these problems have been fixed in
version 1:2.8+dfsg-6+deb9u3.
We recommend that you upgrade your qemu packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/