-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- ------------------------------------------------------------------------- Debian Security Advisory DSA-5133-1
security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff
May 09, 2022
https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : qemu
CVE ID : CVE-2022-26353 CVE-2022-26354 CVE-2021-4206
CVE-2021-4207 CVE-2022-0358
Multiple security issues were discovered in QEMU, a fast processor
emulator, which could result in denial of service or the execution of
arbitrary code.
For the stable distribution (bullseye), this problem has been fixed in
version 1:5.2+dfsg-11+deb11u2.
We recommend that you upgrade your qemu packages.
For the detailed security status of qemu please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/qemu
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at:
https://www.debian.org/security/
Mailing list:
debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmJ5fBwACgkQEMKTtsN8 TjbjqhAAgVEMkmD0tl7hl9xZ5G8kCSQV4wLPII4g3a2BVUu4BSDWrc7KA/B6k/Sz qrB3up4bHiFBkCAsX02gVWZrL9n7yM9Al0WYhDKB0lE4qcd7hATUxemwx2GGXCUY SxM+8u+s2Np9SAKh/K0hl58dACIO/sO1uyDMTZaWdi3uEvit6+2MpLGbkXFfZp+m FoQtdDLILwNjAnCu4gY1yPgvELWjhoQq5up/R83MCbuB6lij6CrSawi8xhIKhruH wOLIEamamdS2LGRzeRf6WyghTGjmbrGbsavoDZtLFOSBfU0QomxDSNhn7yFySlU0 vApw5ThkB9HSkIuB7TOY/LxclibG915f6JtheqGAlUpIvtiAOU2+J4sCNamCOGW6 U0klFVysNMbXrhCs7HoezrQmHCBrrnvThjrb4XXgcgEk+WAMY0oJi1XwhP+rXvTU 26dA3AcyoO37rYBdFNW1EYohvA2Gf33LTDfVMYD92FZZweMf8WlCtrCVr9oJJnCY iTGGFTpDD4v8BfxKbQHba6IAXRVPoCsNArJzEShfO7s/jD2QEGShCXFIk+EowUa3 5jJwA1wt8YWFF1i9wvcExZwdDjmLrIL+QnRmI9K/FmiZDTKUwG/PAk12ooYygDgp Wa6hq0J006Sj9rGzgGcVSBFRyunajmebSeOs61PQjvM7QRVBelo=
=qmjs
-----END PGP SIGNATURE-----
--- SoupGate-Win32 v1.05
* Origin: fsxNet Usenet Gateway (21:1/5)