From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by finch.gentoo.org (Postfix) with ESMTPS id A3F9C1382C5 for ; Sun, 8 Apr 2018 23:42:13 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id 07C64E0C20; Sun, 8 Apr 2018 23:37:14 +0000 (UTC) Received: from smtp.gentoo.org (dev.gentoo.org [IPv6:2001:470:ea4a:1:5054:ff:fec7:86e4]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id 6E82FE096C for ; Sun, 8 Apr 2018 23:31:56 +0000 (UTC) Received: from localhost (pool-71-163-21-11.washdc.fios.verizon.net [71.163.21.11]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) (Authenticated sender: bman) by smtp.gentoo.org (Postfix) with ESMTPSA id 85FE3335C30 for ; Sun, 8 Apr 2018 23:31:54 +0000 (UTC) Date: Sun, 8 Apr 2018 19:31:52 -0400 From: Aaron Bauman To: gentoo-announce@lists.gentoo.org Subject: [gentoo-announce] [ GLSA 201804-08 ] QEMU: Multiple vulnerabilities Message-ID: <20180408233152.GK24250@monkey> Reply-To: security@gentoo.org Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-announce@lists.gentoo.org MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="lZZ4ablUVnt2XgAh" Content-Disposition: inline User-Agent: Mutt/1.9.4 (2018-02-28) X-Archives-Salt: 18821435-87d8-4f2d-a80f-b2031db29552 X-Archives-Hash: b1d5dffaa4fc06f09712338ebc374f65 --lZZ4ablUVnt2XgAh Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201804-08 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: QEMU: Multiple vulnerabilities Date: April 08, 2018 Bugs: #629348, #638506, #643432, #646814, #649616 ID: 201804-08 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis =3D=3D=3D=3D=3D=3D=3D=3D Multiple vulnerabilities have been found in QEMU, the worst of which may allow an attacker to execute arbitrary code. Background =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D QEMU is a generic and open source machine emulator and virtualizer. Affected packages =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 app-emulation/qemu < 2.11.1-r1 >=3D 2.11.1-r1=20 Description =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D Multiple vulnerabilities have been discovered in QEMU. Please review the CVE identifiers referenced below for details. Impact =3D=3D=3D=3D=3D=3D An attacker could execute arbitrary code, cause a Denial of Service condition, or obtain sensitive information. Workaround =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D There is no known workaround at this time. Resolution =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D All QEMU users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=3Dapp-emulation/qemu-2.11.1-r1" References =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D [ 1 ] CVE-2017-13672 https://nvd.nist.gov/vuln/detail/CVE-2017-13672 [ 2 ] CVE-2017-15124 https://nvd.nist.gov/vuln/detail/CVE-2017-15124 [ 3 ] CVE-2017-16845 https://nvd.nist.gov/vuln/detail/CVE-2017-16845 [ 4 ] CVE-2017-17381 https://nvd.nist.gov/vuln/detail/CVE-2017-17381 [ 5 ] CVE-2017-18030 https://nvd.nist.gov/vuln/detail/CVE-2017-18030 [ 6 ] CVE-2017-18043 https://nvd.nist.gov/vuln/detail/CVE-2017-18043 [ 7 ] CVE-2017-5715 https://nvd.nist.gov/vuln/detail/CVE-2017-5715 [ 8 ] CVE-2018-5683 https://nvd.nist.gov/vuln/detail/CVE-2018-5683 [ 9 ] CVE-2018-5748 https://nvd.nist.gov/vuln/detail/CVE-2018-5748 [ 10 ] CVE-2018-7550 https://nvd.nist.gov/vuln/detail/CVE-2018-7550 Availability =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/201804-08 Concerns? =3D=3D=3D=3D=3D=3D=3D=3D=3D Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License =3D=3D=3D=3D=3D=3D=3D Copyright 2018 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. https://creativecommons.org/licenses/by-sa/2.5 --lZZ4ablUVnt2XgAh Content-Type: application/pgp-signature; name="signature.asc" Content-Description: Digital signature -----BEGIN PGP SIGNATURE----- iQEzBAEBCAAdFiEEiDRK3jyVBE/RkymqpRQw84X1dt0FAlrKpmgACgkQpRQw84X1 dt3/RQf+Is+ok7tb5fB8CKfSh2MiWsiUxCpmPLaRyRD/xxI6gAbj3yJVR/i8nNd8 +formdTHVh/IjVUiUh71oqWSv1r+QU7QcRrSLBftBS4e9TqTZsAS27qJUyZGXl2g cYlmBupfefYdCVFCvAjDOoqWGcl8RY6ltbVrJh9E2HcYex5FUvaNYxUBHsDLaFcw e2a5dXI1cxYLynFdhs8zCndWXI4z+Js9oyI28Xr5eDhrRPYjt6lVLHOxzKAotsMq Vh8zXOhXimzmIyJKbFbaAIwnWDKwmKq+Tyr4B5bWNgSlPsLw+GbHHT8zeAooDlS7 5QNxO2dllvvxIpYcUnp4w08hO9dWRg== =AGoP -----END PGP SIGNATURE----- --lZZ4ablUVnt2XgAh--