Debian 10226 Published by

The following updates has been released for Debian GNU/Linux:

Debian GNU/Linux 7 Extended LTS:
ELA-123-1 sqlite3 security update

Debian GNU/Linux 8 LTS:
DLA 1811-1: miniupnpd security update

Debian GNU/Linux 9:
DSA 4454-1: qemu security update



ELA-123-1 sqlite3 security update

Package: sqlite3
Version: 3.7.13-1+deb7u6
Related CVE: CVE-2019-8457
SQLite3 was vulnerable to heap out-of-bound read in the rtreenode() function when handling invalid rtree tables.

For Debian 7 Wheezy, these problems have been fixed in version 3.7.13-1+deb7u6.

We recommend that you upgrade your sqlite3 packages.

Further information about Extended LTS security advisories can be found at: https://deb.freexian.com/extended-lts/

DLA 1811-1: miniupnpd security update




Package : miniupnpd
Version : 1.8.20140523-4+deb8u1
CVE ID : CVE-2017-1000494 CVE-2019-12107 CVE-2019-12108
CVE-2019-12109 CVE-2019-12110 CVE-2019-12111


Ben Barnea and colleagues from VDOO discovered several vulnerabilities in
miniupnpd, a small daemon that provides UPnP Internet Gateway Device and
Port Mapping Protocol services.
The issues are basically information leak, null pointer dereferences and
uses after free.


For Debian 8 "Jessie", these problems have been fixed in version
1.8.20140523-4+deb8u1.

We recommend that you upgrade your miniupnpd packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS



DSA 4454-1: qemu security update




- -------------------------------------------------------------------------
Debian Security Advisory DSA-4454-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
May 30, 2019 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : qemu
CVE ID : CVE-2018-11806 CVE-2018-12617 CVE-2018-16872 CVE-2018-17958
CVE-2018-18849 CVE-2018-18954 CVE-2018-19364 CVE-2018-19489
CVE-2019-3812 CVE-2019-6778 CVE-2019-9824 CVE-2019-12155

Multiple security issues were discovered in QEMU, a fast processor
emulator, which could result in denial of service, the execution of
arbitrary code or information disclosure.

In addition this update backports support to passthrough the new
md-clear CPU flag added in the intel-microcode update shipped in DSA 4447
to x86-based guests.

For the stable distribution (stretch), these problems have been fixed in
version 1:2.8+dfsg-6+deb9u6.

We recommend that you upgrade your qemu packages.

For the detailed security status of qemu please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/qemu

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/