Source: qemu Version: 1:2.8+dfsg-6 Severity: important Tags: security upstream Control: fixed -1 1:2.8+dfsg-6+deb9u1
Hi, the following vulnerability was published for qemu. CVE-2017-10911[0]: | The make_response function in drivers/block/xen-blkback/blkback.c in | the Linux kernel before 4.11.8 allows guest OS users to obtain | sensitive information from host OS (or other guest OS) kernel memory by | leveraging the copying of uninitialized padding fields in Xen | block-interface response structures, aka XSA-216. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2017-10911 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10911 Please adjust the affected versions in the BTS as needed. Regards, Salvatore _______________________________________________ Secure-testing-team mailing list [email protected] http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-team

