[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247621

 
 

909

 
 

194512

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-3348-1 qemu -- qemu

ID: oval:org.secpod.oval:def:602219Date: (C)2015-09-07   (M)2023-12-07
Class: PATCHFamily: unix




Several vulnerabilities were discovered in qemu, a fast processor emulator. CVE-2015-3214 Matt Tait of Google"s Project Zero security team discovered a flaw in the QEMU i8254 PIT emulation. A privileged guest user in a guest with QEMU PIT emulation enabled could potentially use this flaw to execute arbitrary code on the host with the privileges of the hosting QEMU process. CVE-2015-5154 Kevin Wolf of Red Hat discovered a heap buffer overflow flaw in the IDE subsystem in QEMU while processing certain ATAPI commands. A privileged guest user in a guest with the CDROM drive enabled could potentially use this flaw to execute arbitrary code on the host with the privileges of the hosting QEMU process. CVE-2015-5165 Donghai Zhu discovered that the QEMU model of the RTL8139 network card did not sufficiently validate inputs in the C+ mode offload emulation, allowing a malicious guest to read uninitialized memory from the QEMU process"s heap. CVE-2015-5225 Mr Qinghao Tang from QIHU 360 Inc. and Mr Zuozhi from Alibaba Inc discovered a buffer overflow flaw in the VNC display driver leading to heap memory corruption. A privileged guest user could use this flaw to mount a denial of service , or potentially to execute arbitrary code on the host with the privileges of the hosting QEMU process. CVE-2015-5745 A buffer overflow vulnerability was discovered in the way QEMU handles the virtio-serial device. A malicious guest could use this flaw to mount a denial of service .

Platform:
Debian 8.x
Debian 7.x
Product:
qemu
Reference:
DSA-3348-1
CVE-2015-3214
CVE-2015-5154
CVE-2015-5165
CVE-2015-5225
CVE-2015-5745
CVE    5
CVE-2015-3214
CVE-2015-5225
CVE-2015-5745
CVE-2015-5154
...
CPE    4
cpe:/a:qemu:qemu:2.3.0
cpe:/a:qemu:qemu
cpe:/o:debian:debian_linux:7.x
cpe:/o:debian:debian_linux:8.x
...

© SecPod Technologies