On 25/04/2019 03:54, Emilio Pozuelo Monfort wrote:
> Hi,
>
> I prepared an update for qemu, with the following fixes:
>
> * CVE-2018-20815: information disclosure in tcp_emu().
> * CVE-2019-9824: heap buffer overflow in load_device_tree().
> * CVE-2018-11806: heap-based buffer overflow via
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Package: qemu
Version: 1:2.1+dfsg-12+deb8u11
CVE ID : CVE-2018-11806 CVE-2018-18849 CVE-2018-20815 CVE-2019-9824
Debian Bug : 901017 912535
Several vulnerabilities were found in QEMU, a fast processor emulator:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Tue, 02 Apr 2019 11:03:28 +0200
Source: qemu
Binary: qemu qemu-system qemu-system-common qemu-system-misc qemu-system-arm
qemu-system-mips qemu-system-ppc qemu-system-sparc qemu-system-x86 qemu-user
qemu-user-static
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Thu, 09 May 2019 10:04:31 +0200
Source: postgresql-9.4
Binary: libpq-dev libpq5 libecpg6 libecpg-dev libecpg-compat3 libpgtypes3
postgresql-9.4 postgresql-9.4-dbg postgresql-client-9.4
postgresql-server-dev-9.4 postgresql-doc-9.4