Just released, including security updates:
9.1.2-20170822
Updates in 2 source package(s), 4 binary package(s):
Source linux, binaries: linux-image-4.9.0-3-amd64:amd64 linux-image-4.9.0-3-arm64:arm64
linux (4.9.30-2+deb9u3) stretch-security; urgency=high
* [x86] drm/vmwgfx: limit the number of mip levels in
vmw_gb_surface_define_ioctl() (CVE-2017-7346)
* rxrpc: Fix several cases where a padded len isn't checked in ticket decode
(CVE-2017-7482)
* brcmfmac: fix possible buffer overflow in brcmf_cfg80211_mgmt_tx()
(CVE-2017-7541)
* ipv6: avoid overflow of offset in ip6_find_1stfragopt (CVE-2017-7542)
* [x86] drm/vmwgfx: Make sure backup_handle is always valid (CVE-2017-9605)
* drm/virtio: don't leak bo on drm_gem_object_init failure (CVE-2017-10810)
* xen-blkback: don't leak stack data via response ring (CVE-2017-10911)
* mqueue: fix a use-after-free in sys_mq_notify() (CVE-2017-11176)
* fs/exec.c: account for argv/envp pointers (CVE-2017-1000365)
* dentry name snapshots (CVE-2017-7533)
Source qemu, binaries: qemu-utils:amd64 qemu-utils:arm64
qemu (1:2.8+dfsg-6+deb9u2) stretch-security; urgency=high
* actually apply the nbd server patches, not only include in debian/patches/
Really closes: #865755, CVE-2017-9524
* slirp-check-len-against-dhcp-options-array-end-CVE-2017-11434.patch
Closes: #869171, CVE-2017-11434
* exec-use-qemu_ram_ptr_length-to-access-guest-ram-CVE-2017-11334.patch
Closes: #869173, CVE-2017-11334
* usb-redir-fix-stack-overflow-in-usbredir_log_data-CVE-2017-10806.patch
Closes: #867751, CVE-2017-10806
* add reference to #869706 to
xen-disk-don-t-leak-stack-data-via-response-ring-CVE-2017-10911.patch
* disable xhci recursive calls fix for now, as it causes instant crash
(xhci-guard-xhci_kick_epctx-against-recursive-calls-CVE-2017-9375.patch)
Reopens: #864219, CVE-2017-9375
Closes: #869945
qemu (1:2.8+dfsg-6+deb9u1) stretch-security; urgency=high
* net-e1000e-fix-an-infinite-loop-issue-CVE-2017-9310.patch
Closes: #863840, CVE-2017-9310
* usb-ohci-fix-error-return-code-in-servicing-iso-td-CVE-2017-9330.patch
Closes: #863943, CVE-2017-9330
* ide-ahci-call-cleanup-function-in-ahci-unit-CVE-2017-9373.patch
Closes: #864216, CVE-2017-9373
* xhci-guard-xhci_kick_epctx-against-recursive-calls-CVE-2017-9375.patch
Closes: #864219, CVE-2017-9375
* usb-ehci-fix-memory-leak-in-ehci-CVE-2017-9374.patch
Closes: #864568, CVE-2017-9374
* nbd-ignore-SIGPIPE-CVE-2017-10664.patch
Closes: #866674, CVE-2017-10664
* nbd-fully-initialize-client-in-case-of-failed-negotiation-CVE-2017-9524.patch
nbd-fix-regression-on-resiliency-to-port-scan-CVE-2017-9524.patch
Closes: #865755, CVE-2017-9524
* xen-disk-don-t-leak-stack-data-via-response-ring-CVE-2017-10911.patch
Closes: CVE-2017-10911
--
Steve McIntyre, Cambridge, UK. steve@einval.com
We don't need no education.
We don't need no thought control.
Attachment:
signature.asc
Description: PGP signature