Debian 10220 Published by

The following updates has been released for Debian GNU/Linux:

Debian GNU/Linux 7 Extended LTS:
ELA-56-1 tzdata new upstream version
ELA-57-1 libdatetime-timezone-perl new upstream version

Debian GNU/Linux 9:
DSA 4338-1: qemu security update



ELA-56-1 tzdata new upstream version

Package: tzdata
Version: 2018g-0+deb7u1

This update brings the timezone changes from the upstream 2018g release.

For Debian 7 Wheezy, these problems have been fixed in version 2018g-0+deb7u1.

We recommend that you upgrade your tzdata packages.

Further information about Extended LTS security advisories can be found at: https://deb.freexian.com/extended-lts/

ELA-57-1 libdatetime-timezone-perl new upstream version

Package: libdatetime-timezone-perl
Version: 1:1.58-1+2018g

This update brings the Olson database changes from the 2018g version to the Perl bindings.

For Debian 7 Wheezy, these problems have been fixed in version 1:1.58-1+2018g.

We recommend that you upgrade your libdatetime-timezone-perl packages.

Further information about Extended LTS security advisories can be found at: https://deb.freexian.com/extended-lts/

Read full article @ Debian Freexian

DSA 4338-1: qemu security update




- -------------------------------------------------------------------------
Debian Security Advisory DSA-4338-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
November 11, 2018 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : qemu
CVE ID : CVE-2018-10839 CVE-2018-17962 CVE-2018-17963
Debian Bug : 908682 910431 911468 911469

Integer overflows in the processing of packets in network cards emulated
by QEMU, a fast processor emulator, could result in denial of service.

In addition this update backports support to passthrough the new CPU
features added in the intel-microcode update shipped in DSA 4273 to
x86-based guests.

For the stable distribution (stretch), these problems have been fixed in
version 1:2.8+dfsg-6+deb9u5.

We recommend that you upgrade your qemu packages.

For the detailed security status of qemu please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/qemu

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/