The following updates has been released for Debian GNU/Linux:
Debian GNU/Linux 7 Extended LTS:
ELA-56-1 tzdata new upstream version
ELA-57-1 libdatetime-timezone-perl new upstream version
Debian GNU/Linux 9:
DSA 4338-1: qemu security update
Debian GNU/Linux 7 Extended LTS:
ELA-56-1 tzdata new upstream version
ELA-57-1 libdatetime-timezone-perl new upstream version
Debian GNU/Linux 9:
DSA 4338-1: qemu security update
ELA-56-1 tzdata new upstream version
Package: tzdata
Version: 2018g-0+deb7u1
This update brings the timezone changes from the upstream 2018g release.
For Debian 7 Wheezy, these problems have been fixed in version 2018g-0+deb7u1.
We recommend that you upgrade your tzdata packages.
Further information about Extended LTS security advisories can be found at: https://deb.freexian.com/extended-lts/
ELA-57-1 libdatetime-timezone-perl new upstream version
Package: libdatetime-timezone-perlRead full article @ Debian Freexian
Version: 1:1.58-1+2018g
This update brings the Olson database changes from the 2018g version to the Perl bindings.
For Debian 7 Wheezy, these problems have been fixed in version 1:1.58-1+2018g.
We recommend that you upgrade your libdatetime-timezone-perl packages.
Further information about Extended LTS security advisories can be found at: https://deb.freexian.com/extended-lts/
DSA 4338-1: qemu security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4338-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
November 11, 2018 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : qemu
CVE ID : CVE-2018-10839 CVE-2018-17962 CVE-2018-17963
Debian Bug : 908682 910431 911468 911469
Integer overflows in the processing of packets in network cards emulated
by QEMU, a fast processor emulator, could result in denial of service.
In addition this update backports support to passthrough the new CPU
features added in the intel-microcode update shipped in DSA 4273 to
x86-based guests.
For the stable distribution (stretch), these problems have been fixed in
version 1:2.8+dfsg-6+deb9u5.
We recommend that you upgrade your qemu packages.
For the detailed security status of qemu please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/qemu
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/