ALT-BU-2016-2661-1
Branch c7 update bulletin.
Closed vulnerabilities
BDU:2015-00048
Уязвимость эмулятора аппаратного обеспечения QEMU, позволяющая злоумышленнику вызвать отказ в обслуживании хостовой операционной системы или выполнить произвольный код
BDU:2015-04319
Уязвимость операционной системы SUSE Linux Enterprise, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-06962
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-07328
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-07329
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-07330
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-10394
Уязвимость эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю выполнить произвольный код
BDU:2015-10395
Уязвимость гипервизора Xen, позволяющая нарушителю выполнить произвольный код
BDU:2015-10460
Уязвимость эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю повысить свои привилегии, вызвать отказ в обслуживании или получить доступ к защищаемой информации
BDU:2015-11288
Уязвимость эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю выполнить произвольный код на хостовой операционной системе
BDU:2015-11298
Уязвимость эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2015-11313
Уязвимость гипервизора Xen, позволяющая нарушителю выполнить произвольный код
BDU:2015-11547
Уязвимость эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2015-12035
Уязвимость эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2016-00128
Уязвимость эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2016-00272
Уязвимость эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое неустановленное воздействие
BDU:2017-00757
Уязвимость эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии в гостевой операционной системе
BDU:2017-01030
Уязвимость эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-04590
Уязвимость функционала savevm эмулятора аппаратного обеспечения QEMU, связанная с небезопасным управлением привилегиями, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2013-2016
A flaw was found in the way qemu v1.3.0 and later (virtio-rng) validates addresses when guest accesses the config space of a virtio device. If the virtio device has zero/small sized config space, such as virtio-rng, a privileged guest user could use this flaw to access the matching host's qemu address space and thus increase their privileges on the host.
- http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00002.html
- http://www.openwall.com/lists/oss-security/2013/04/29/5
- http://www.openwall.com/lists/oss-security/2013/04/29/5
- http://www.openwall.com/lists/oss-security/2013/04/29/6
- http://www.openwall.com/lists/oss-security/2013/04/29/6
- http://www.securityfocus.com/bid/59541
- http://www.securityfocus.com/bid/59541
- https://access.redhat.com/security/cve/cve-2013-2016
- https://access.redhat.com/security/cve/cve-2013-2016
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-2016
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-2016
- https://exchange.xforce.ibmcloud.com/vulnerabilities/83850
- https://exchange.xforce.ibmcloud.com/vulnerabilities/83850
- https://github.com/qemu/qemu/commit/5f5a1318653c08e435cfa52f60b6a712815b659d
- https://github.com/qemu/qemu/commit/5f5a1318653c08e435cfa52f60b6a712815b659d
- https://security-tracker.debian.org/tracker/CVE-2013-2016
- https://security-tracker.debian.org/tracker/CVE-2013-2016
Modified: 2024-11-21
CVE-2013-2231
Unquoted Windows search path vulnerability in the QEMU Guest Agent service for Red Hat Enterprise Linux Desktop 6, HPC Node 6, Server 6, Workstation 6, Desktop Supplementary 6, Server Supplementary 6, Supplementary AUS 6.4, Supplementary EUS 6.4.z, and Workstation Supplementary 6, when installing on Windows, allows local users to gain privileges via a crafted program in an unspecified folder.
Modified: 2024-11-21
CVE-2013-4344
Buffer overflow in the SCSI implementation in QEMU, as used in Xen, when a SCSI controller has more than 256 attached devices, allows local users to gain privileges via a small transfer buffer in a REPORT LUNS command.
- [qemu-devel] 20131009 [ANNOUNCE] QEMU 1.6.1 Stable released
- [qemu-devel] 20131009 [ANNOUNCE] QEMU 1.6.1 Stable released
- openSUSE-SU-2014:1279
- openSUSE-SU-2014:1279
- openSUSE-SU-2014:1281
- openSUSE-SU-2014:1281
- 98028
- 98028
- RHSA-2013:1553
- RHSA-2013:1553
- RHSA-2013:1754
- RHSA-2013:1754
- [oss-security] 20131002 Xen Security Advisory 65 (CVE-2013-4344) - qemu SCSI REPORT LUNS buffer overflow
- [oss-security] 20131002 Xen Security Advisory 65 (CVE-2013-4344) - qemu SCSI REPORT LUNS buffer overflow
- 62773
- 62773
- USN-2092-1
- USN-2092-1
Modified: 2024-11-21
CVE-2013-4377
Use-after-free vulnerability in the virtio-pci implementation in Qemu 1.4.0 through 1.6.0 allows local users to cause a denial of service (daemon crash) by "hot-unplugging" a virtio device.
- [Qemu-devel] 20130920 [PATCH 11/11] virtio-pci: add device_unplugged callback
- [Qemu-devel] 20130920 [PATCH 11/11] virtio-pci: add device_unplugged callback
- 55015
- 55015
- [oss-security] 20130926 Re: CVE request: qemu host crash from within guest
- [oss-security] 20130926 Re: CVE request: qemu host crash from within guest
- USN-2092-1
- USN-2092-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1012633
- https://bugzilla.redhat.com/show_bug.cgi?id=1012633
Modified: 2024-11-21
CVE-2013-4526
Buffer overflow in hw/ide/ahci.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service and possibly execute arbitrary code via vectors related to migrating ports.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=ae2158ad6ce0845b2fae2a22aa7f19c0d7a71ce5
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=ae2158ad6ce0845b2fae2a22aa7f19c0d7a71ce5
- FEDORA-2014-6288
- FEDORA-2014-6288
- [Qemu-devel] 20131213 [PATCH 00/23] qemu state loading issues
- [Qemu-devel] 20131213 [PATCH 00/23] qemu state loading issues
- [Qemu-stable] 20140723 [ANNOUNCE] QEMU 1.7.2 Stable released
- [Qemu-stable] 20140723 [ANNOUNCE] QEMU 1.7.2 Stable released
Modified: 2024-11-21
CVE-2013-4527
Buffer overflow in hw/timer/hpet.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via vectors related to the number of timers.
- http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=3f1c49e2136fa08ab1ef3183fd55def308829584
- http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=3f1c49e2136fa08ab1ef3183fd55def308829584
- FEDORA-2014-6288
- FEDORA-2014-6288
- [Qemu-stable] 20140723 [ANNOUNCE] QEMU 1.7.2 Stable released
- [Qemu-stable] 20140723 [ANNOUNCE] QEMU 1.7.2 Stable released
- RHSA-2014:0927
- RHSA-2014:0927
Modified: 2024-11-21
CVE-2013-4529
Buffer overflow in hw/pci/pcie_aer.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a large log_num value in a savevm image.
- FEDORA-2014-6288
- FEDORA-2014-6288
- [Qemu-devel] 20131213 [PATCH 00/23] qemu state loading issues
- [Qemu-devel] 20131213 [PATCH 00/23] qemu state loading issues
- [Qemu-stable] 20140723 [ANNOUNCE] QEMU 1.7.2 Stable released
- [Qemu-stable] 20140723 [ANNOUNCE] QEMU 1.7.2 Stable released
- RHSA-2014:0927
- RHSA-2014:0927
Modified: 2024-11-21
CVE-2013-4530
Buffer overflow in hw/ssi/pl022.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service or possibly execute arbitrary code via crafted tx_fifo_head and rx_fifo_head values in a savevm image.
- http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=d8d0a0bc7e194300e53a346d25fe5724fd588387
- http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=d8d0a0bc7e194300e53a346d25fe5724fd588387
- FEDORA-2014-6288
- FEDORA-2014-6288
- [Qemu-devel] 20131213 [PATCH 00/23] qemu state loading issues
- [Qemu-devel] 20131213 [PATCH 00/23] qemu state loading issues
- [Qemu-stable] 20140723 [ANNOUNCE] QEMU 1.7.2 Stable released
- [Qemu-stable] 20140723 [ANNOUNCE] QEMU 1.7.2 Stable released
Modified: 2024-11-21
CVE-2013-4531
Buffer overflow in target-arm/machine.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a negative value in cpreg_vmstate_array_len in a savevm image.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=d2ef4b61fe6d33d2a5dcf100a9b9440de341ad62
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=d2ef4b61fe6d33d2a5dcf100a9b9440de341ad62
- FEDORA-2014-6288
- FEDORA-2014-6288
- [Qemu-devel] 20131213 [PATCH 00/23] qemu state loading issues
- [Qemu-devel] 20131213 [PATCH 00/23] qemu state loading issues
- [Qemu-stable] 20140723 [ANNOUNCE] QEMU 1.7.2 Stable released
- [Qemu-stable] 20140723 [ANNOUNCE] QEMU 1.7.2 Stable released
Modified: 2024-11-21
CVE-2013-4532
Qemu 1.1.2+dfsg to 2.1+dfsg suffers from a buffer overrun which could potentially result in arbitrary code execution on the host with the privileges of the QEMU process.
- http://www.ubuntu.com/usn/USN-2342-1
- http://www.ubuntu.com/usn/USN-2342-1
- https://access.redhat.com/security/cve/cve-2013-4532
- https://access.redhat.com/security/cve/cve-2013-4532
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=739589
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=739589
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4532
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4532
- https://bugzilla.suse.com/show_bug.cgi?id=CVE-2013-4532
- https://bugzilla.suse.com/show_bug.cgi?id=CVE-2013-4532
- https://github.com/qemu/qemu/commit/2e1198672759eda6e122ff38fcf6df06f27e0fe2
- https://github.com/qemu/qemu/commit/2e1198672759eda6e122ff38fcf6df06f27e0fe2
- https://security-tracker.debian.org/tracker/CVE-2013-4532
- https://security-tracker.debian.org/tracker/CVE-2013-4532
Modified: 2024-11-21
CVE-2013-4533
Buffer overflow in the pxa2xx_ssp_load function in hw/arm/pxa2xx.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service or possibly execute arbitrary code via a crafted s->rx_level value in a savevm image.
- http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=caa881abe0e01f9931125a0977ec33c5343e4aa7
- http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=caa881abe0e01f9931125a0977ec33c5343e4aa7
- FEDORA-2014-6288
- FEDORA-2014-6288
- [Qemu-devel] 20131213 [PATCH 00/23] qemu state loading issues
- [Qemu-devel] 20131213 [PATCH 00/23] qemu state loading issues
- [Qemu-stable] 20140723 [ANNOUNCE] QEMU 1.7.2 Stable released
- [Qemu-stable] 20140723 [ANNOUNCE] QEMU 1.7.2 Stable released
Modified: 2024-11-21
CVE-2013-4534
Buffer overflow in hw/intc/openpic.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service or possibly execute arbitrary code via vectors related to IRQDest elements.
- http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=73d963c0a75cb99c6aaa3f6f25e427aa0b35a02e
- http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=73d963c0a75cb99c6aaa3f6f25e427aa0b35a02e
- FEDORA-2014-6288
- FEDORA-2014-6288
- [Qemu-devel] 20131213 [PATCH 00/23] qemu state loading issues
- [Qemu-devel] 20131213 [PATCH 00/23] qemu state loading issues
- [Qemu-stable] 20140723 [ANNOUNCE] QEMU 1.7.2 Stable released
- [Qemu-stable] 20140723 [ANNOUNCE] QEMU 1.7.2 Stable released
Modified: 2024-11-21
CVE-2013-4535
The virtqueue_map_sg function in hw/virtio/virtio.c in QEMU before 1.7.2 allows remote attackers to execute arbitrary files via a crafted savevm image, related to virtio-block or virtio-serial read.
- http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=36cf2a37132c7f01fa9adb5f95f5312b27742fd4
- http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=36cf2a37132c7f01fa9adb5f95f5312b27742fd4
- http://lists.fedoraproject.org/pipermail/package-announce/2014-May/133345.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-May/133345.html
- http://lists.nongnu.org/archive/html/qemu-stable/2014-07/msg00187.html
- http://lists.nongnu.org/archive/html/qemu-stable/2014-07/msg00187.html
- http://rhn.redhat.com/errata/RHSA-2014-0743.html
- http://rhn.redhat.com/errata/RHSA-2014-0743.html
- http://rhn.redhat.com/errata/RHSA-2014-0744.html
- http://rhn.redhat.com/errata/RHSA-2014-0744.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1066401
- https://bugzilla.redhat.com/show_bug.cgi?id=1066401
Modified: 2024-11-21
CVE-2013-4536
An user able to alter the savevm data (either on the disk or over the wire during migration) could use this flaw to to corrupt QEMU process memory on the (destination) host, which could potentially result in arbitrary code execution on the host with the privileges of the QEMU process.
Modified: 2024-11-21
CVE-2013-4537
The ssi_sd_transfer function in hw/sd/ssi-sd.c in QEMU before 1.7.2 allows remote attackers to execute arbitrary code via a crafted arglen value in a savevm image.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=a9c380db3b8c6af19546a68145c8d1438a09c92b
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=a9c380db3b8c6af19546a68145c8d1438a09c92b
- FEDORA-2014-6288
- FEDORA-2014-6288
- [Qemu-devel] 20131213 [PATCH 00/23] qemu state loading issues
- [Qemu-devel] 20131213 [PATCH 00/23] qemu state loading issues
- [Qemu-stable] 20140723 [ANNOUNCE] QEMU 1.7.2 Stable released
- [Qemu-stable] 20140723 [ANNOUNCE] QEMU 1.7.2 Stable released
Modified: 2024-11-21
CVE-2013-4538
Multiple buffer overflows in the ssd0323_load function in hw/display/ssd0323.c in QEMU before 1.7.2 allow remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via crafted (1) cmd_len, (2) row, or (3) col values; (4) row_start and row_end values; or (5) col_star and col_end values in a savevm image.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=ead7a57df37d2187813a121308213f41591bd811
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=ead7a57df37d2187813a121308213f41591bd811
- FEDORA-2014-6288
- FEDORA-2014-6288
- [Qemu-devel] 20131213 [PATCH 00/23] qemu state loading issues
- [Qemu-devel] 20131213 [PATCH 00/23] qemu state loading issues
- [Qemu-stable] 20140723 [ANNOUNCE] QEMU 1.7.2 Stable released
- [Qemu-stable] 20140723 [ANNOUNCE] QEMU 1.7.2 Stable released
Modified: 2024-11-21
CVE-2013-4539
Multiple buffer overflows in the tsc210x_load function in hw/input/tsc210x.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a crafted (1) precision, (2) nextprecision, (3) function, or (4) nextfunction value in a savevm image.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=5193be3be35f29a35bc465036cd64ad60d43385f
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=5193be3be35f29a35bc465036cd64ad60d43385f
- FEDORA-2014-6288
- FEDORA-2014-6288
- [Qemu-devel] 20131213 [PATCH 00/23] qemu state loading issues
- [Qemu-devel] 20131213 [PATCH 00/23] qemu state loading issues
- [Qemu-stable] 20140723 [ANNOUNCE] QEMU 1.7.2 Stable released
- [Qemu-stable] 20140723 [ANNOUNCE] QEMU 1.7.2 Stable released
Modified: 2024-11-21
CVE-2013-4540
Buffer overflow in scoop_gpio_handler_update in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a large (1) prev_level, (2) gpio_level, or (3) gpio_dir value in a savevm image.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=52f91c3723932f8340fe36c8ec8b18a757c37b2b
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=52f91c3723932f8340fe36c8ec8b18a757c37b2b
- FEDORA-2014-6288
- FEDORA-2014-6288
- [Qemu-devel] 20131213 [PATCH 00/23] qemu state loading issues
- [Qemu-devel] 20131213 [PATCH 00/23] qemu state loading issues
- [Qemu-stable] 20140723 [ANNOUNCE] QEMU 1.7.2 Stable released
- [Qemu-stable] 20140723 [ANNOUNCE] QEMU 1.7.2 Stable released
- openSUSE-SU-2014:1279
- openSUSE-SU-2014:1279
- openSUSE-SU-2014:1281
- openSUSE-SU-2014:1281
Modified: 2024-11-21
CVE-2013-4541
The usb_device_post_load function in hw/usb/bus.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a crafted savevm image, related to a negative setup_len or setup_index value.
- http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=9f8e9895c504149d7048e9fc5eb5cbb34b16e49a
- http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=9f8e9895c504149d7048e9fc5eb5cbb34b16e49a
- FEDORA-2014-6288
- FEDORA-2014-6288
- [Qemu-stable] 20140723 [ANNOUNCE] QEMU 1.7.2 Stable released
- [Qemu-stable] 20140723 [ANNOUNCE] QEMU 1.7.2 Stable released
- RHSA-2014:0743
- RHSA-2014:0743
- RHSA-2014:0744
- RHSA-2014:0744
Modified: 2024-11-21
CVE-2013-4542
The virtio_scsi_load_request function in hw/scsi/scsi-bus.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a crafted savevm image, which triggers an out-of-bounds array access.
- http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=3c3ce981423e0d6c18af82ee62f1850c2cda5976
- http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=3c3ce981423e0d6c18af82ee62f1850c2cda5976
- FEDORA-2014-6288
- FEDORA-2014-6288
- [Qemu-stable] 20140723 [ANNOUNCE] QEMU 1.7.2 Stable released
- [Qemu-stable] 20140723 [ANNOUNCE] QEMU 1.7.2 Stable released
- RHSA-2014:0743
- RHSA-2014:0743
- RHSA-2014:0744
- RHSA-2014:0744
Modified: 2024-11-21
CVE-2013-4544
hw/net/vmxnet3.c in QEMU 2.0.0-rc0, 1.7.1, and earlier allows local guest users to cause a denial of service or possibly execute arbitrary code via vectors related to (1) RX or (2) TX queue numbers or (3) interrupt indices. NOTE: some of these details are obtained from third party information.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=3c99afc779c2c78718a565ad8c5e98de7c2c7484
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=3c99afc779c2c78718a565ad8c5e98de7c2c7484
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=8c6c0478996e8f77374e69b6df68655b0b4ba689
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=8c6c0478996e8f77374e69b6df68655b0b4ba689
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=9878d173f574df74bde0ff50b2f81009fbee81bb
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=9878d173f574df74bde0ff50b2f81009fbee81bb
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=f12d048a523780dbda702027d4a91b62af1a08d7
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=f12d048a523780dbda702027d4a91b62af1a08d7
- 58191
- 58191
- [qemu] 20140404 [PATCH V2 0/4] CVE-2013-4544
- [qemu] 20140404 [PATCH V2 0/4] CVE-2013-4544
- USN-2182-1
- USN-2182-1
- 106013
- 106013
- https://bugzilla.redhat.com/show_bug.cgi?id=1087513
- https://bugzilla.redhat.com/show_bug.cgi?id=1087513
Modified: 2024-11-21
CVE-2013-6399
Array index error in the virtio_load function in hw/virtio/virtio.c in QEMU before 1.7.2 allows remote attackers to execute arbitrary code via a crafted savevm image.
- http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=4b53c2c72cb5541cf394033b528a6fe2a86c0ac1
- http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=4b53c2c72cb5541cf394033b528a6fe2a86c0ac1
- FEDORA-2014-6288
- FEDORA-2014-6288
- [Qemu-stable] 20140723 [ANNOUNCE] QEMU 1.7.2 Stable released
- [Qemu-stable] 20140723 [ANNOUNCE] QEMU 1.7.2 Stable released
- RHSA-2014:0743
- RHSA-2014:0743
- RHSA-2014:0744
- RHSA-2014:0744
Modified: 2024-11-21
CVE-2014-0142
QEMU, possibly before 2.0.0, allows local users to cause a denial of service (divide-by-zero error and crash) via a zero value in the (1) tracks field to the seek_to_sector function in block/parallels.c or (2) extent_size field in the bochs function in block/bochs.c.
- http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=8e53abbc20d08ae3ec30c2054e1161314ad9501d
- http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=8e53abbc20d08ae3ec30c2054e1161314ad9501d
- http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=9302e863aa8baa5d932fc078967050c055fa1a7f
- http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=9302e863aa8baa5d932fc078967050c055fa1a7f
- RHSA-2014:0420
- RHSA-2014:0420
- RHSA-2014:0421
- RHSA-2014:0421
- DSA-3044
- DSA-3044
- https://bugzilla.redhat.com/show_bug.cgi?id=1078201
- https://bugzilla.redhat.com/show_bug.cgi?id=1078201
Modified: 2024-11-21
CVE-2014-0143
Multiple integer overflows in the block drivers in QEMU, possibly before 2.0.0, allow local users to cause a denial of service (crash) via a crafted catalog size in (1) the parallels_open function in block/parallels.c or (2) bochs_open function in bochs.c, a large L1 table in the (3) qcow2_snapshot_load_tmp in qcow2-snapshot.c or (4) qcow2_grow_l1_table function in qcow2-cluster.c, (5) a large request in the bdrv_check_byte_request function in block.c and other block drivers, (6) crafted cluster indexes in the get_refcount function in qcow2-refcount.c, or (7) a large number of blocks in the cloop_open function in cloop.c, which trigger buffer overflows, memory corruption, large memory allocations and out-of-bounds read and writes.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=509a41bab5306181044b5fff02eadf96d9c8676a
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=509a41bab5306181044b5fff02eadf96d9c8676a
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=6a83f8b5bec6f59e56cc49bd49e4c3f8f805d56f
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=6a83f8b5bec6f59e56cc49bd49e4c3f8f805d56f
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=8f4754ede56e3f9ea3fd7207f4a7c4453e59285b
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=8f4754ede56e3f9ea3fd7207f4a7c4453e59285b
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=afbcc40bee4ef51731102d7d4b499ee12fc182e1
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=afbcc40bee4ef51731102d7d4b499ee12fc182e1
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=cab60de930684c33f67d4e32c7509b567f8c445b
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=cab60de930684c33f67d4e32c7509b567f8c445b
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=db8a31d11d6a60f48d6817530640d75aa72a9a2f
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=db8a31d11d6a60f48d6817530640d75aa72a9a2f
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=e3737b820b45e54b059656dc3f914f895ac7a88b
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=e3737b820b45e54b059656dc3f914f895ac7a88b
- RHSA-2014:0420
- RHSA-2014:0420
- RHSA-2014:0421
- RHSA-2014:0421
- DSA-3044
- DSA-3044
- https://bugzilla.redhat.com/show_bug.cgi?id=1079140
- https://bugzilla.redhat.com/show_bug.cgi?id=1079140
Modified: 2024-11-21
CVE-2014-0144
QEMU before 2.0.0 block drivers for CLOOP, QCOW2 version 2 and various other image formats are vulnerable to potential memory corruptions, integer/buffer overflows or crash caused by missing input validations which could allow a remote user to execute arbitrary code on the host with the privileges of the QEMU process.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=24342f2cae47d03911e346fe1e520b00dc2818e0
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=24342f2cae47d03911e346fe1e520b00dc2818e0
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=2d51c32c4b511db8bb9e58208f1e2c25e4c06c85
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=2d51c32c4b511db8bb9e58208f1e2c25e4c06c85
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=5dab2faddc8eaa1fb1abdbe2f502001fc13a1b21
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=5dab2faddc8eaa1fb1abdbe2f502001fc13a1b21
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=63fa06dc978f3669dbfd9443b33cde9e2a7f4b41
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=63fa06dc978f3669dbfd9443b33cde9e2a7f4b41
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=6d4b9e55fc625514a38d27cff4b9933f617fa7dc
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=6d4b9e55fc625514a38d27cff4b9933f617fa7dc
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=7b103b36d6ef3b11827c203d3a793bf7da50ecd6
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=7b103b36d6ef3b11827c203d3a793bf7da50ecd6
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=97f1c45c6f456572e5b504b8614e4a69e23b8e3a
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=97f1c45c6f456572e5b504b8614e4a69e23b8e3a
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=a1b3955c9415b1e767c130a2f59fee6aa28e575b
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=a1b3955c9415b1e767c130a2f59fee6aa28e575b
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=ce48f2f441ca98885267af6fd636a7cb804ee646
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=ce48f2f441ca98885267af6fd636a7cb804ee646
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=d65f97a82c4ed48374a764c769d4ba1ea9724e97
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=d65f97a82c4ed48374a764c769d4ba1ea9724e97
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=f56b9bc3ae20fc93815b34aa022be919941406ce
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=f56b9bc3ae20fc93815b34aa022be919941406ce
- http://rhn.redhat.com/errata/RHSA-2014-0420.html
- http://rhn.redhat.com/errata/RHSA-2014-0420.html
- http://rhn.redhat.com/errata/RHSA-2014-0421.html
- http://rhn.redhat.com/errata/RHSA-2014-0421.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1079240
- https://bugzilla.redhat.com/show_bug.cgi?id=1079240
- https://www.vulnerabilitycenter.com/#%21vul=44767
- https://www.vulnerabilitycenter.com/#%21vul=44767
Modified: 2024-11-21
CVE-2014-0145
Multiple buffer overflows in QEMU before 1.7.2 and 2.x before 2.0.0, allow local users to cause a denial of service (crash) or possibly execute arbitrary code via a large (1) L1 table in the qcow2_snapshot_load_tmp in the QCOW 2 block driver (block/qcow2-snapshot.c) or (2) uncompressed chunk, (3) chunk length, or (4) number of sectors in the DMG block driver (block/dmg.c).
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=c05e4667be91b46ab42b5a11babf8e84d476cc6b
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=c05e4667be91b46ab42b5a11babf8e84d476cc6b
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=f0dce23475b5af5da6b17b97c1765271307734b6
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=f0dce23475b5af5da6b17b97c1765271307734b6
- http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=c165f7758009a4f793c1fc19ebb69cf55313450b
- http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=c165f7758009a4f793c1fc19ebb69cf55313450b
- RHSA-2014:0420
- RHSA-2014:0420
- RHSA-2014:0421
- RHSA-2014:0421
- DSA-3044
- DSA-3044
- [oss-security] 20140326 QEMU image format input validation fixes (multiple CVEs)
- [oss-security] 20140326 QEMU image format input validation fixes (multiple CVEs)
- https://bugzilla.redhat.com/show_bug.cgi?id=1078885
- https://bugzilla.redhat.com/show_bug.cgi?id=1078885
- https://lists.gnu.org/archive/html/qemu-devel/2014-03/msg04994.html
- https://lists.gnu.org/archive/html/qemu-devel/2014-03/msg04994.html
Modified: 2024-11-21
CVE-2014-0146
The qcow2_open function in the (block/qcow2.c) in QEMU before 1.7.2 and 2.x before 2.0.0 allows local users to cause a denial of service (NULL pointer dereference) via a crafted image which causes an error, related to the initialization of the snapshot_offset and nb_snapshots fields.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=11b128f4062dd7f89b14abc8877ff20d41b28be9
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=11b128f4062dd7f89b14abc8877ff20d41b28be9
- RHSA-2014:0420
- RHSA-2014:0420
- RHSA-2014:0421
- RHSA-2014:0421
- DSA-3044
- DSA-3044
- [oss-security] 20140326 QEMU image format input validation fixes (multiple CVEs)
- [oss-security] 20140326 QEMU image format input validation fixes (multiple CVEs)
- https://bugzilla.redhat.com/show_bug.cgi?id=1078232
- https://bugzilla.redhat.com/show_bug.cgi?id=1078232
Modified: 2024-11-21
CVE-2014-0147
Qemu before 1.6.2 block diver for the various disk image formats used by Bochs and for the QCOW version 2 format, are vulnerable to a possible crash caused by signed data types or a logic error while creating QCOW2 snapshots, which leads to incorrectly calling update_refcount() routine.
- http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=246f65838d19db6db55bfb41117c35645a2c4789
- http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=246f65838d19db6db55bfb41117c35645a2c4789
- http://rhn.redhat.com/errata/RHSA-2014-0420.html
- http://rhn.redhat.com/errata/RHSA-2014-0420.html
- http://rhn.redhat.com/errata/RHSA-2014-0421.html
- http://rhn.redhat.com/errata/RHSA-2014-0421.html
- http://www.openwall.com/lists/oss-security/2014/03/26/8
- http://www.openwall.com/lists/oss-security/2014/03/26/8
- https://bugzilla.redhat.com/show_bug.cgi?id=1078848
- https://bugzilla.redhat.com/show_bug.cgi?id=1078848
- https://bugzilla.redhat.com/show_bug.cgi?id=1086717
- https://bugzilla.redhat.com/show_bug.cgi?id=1086717
Modified: 2024-11-21
CVE-2014-0148
Qemu before 2.0 block driver for Hyper-V VHDX Images is vulnerable to infinite loops and other potential issues when calculating BAT entries, due to missing bounds checks for block_size and logical_sector_size variables. These are used to derive other fields like 'sectors_per_block' etc. A user able to alter the Qemu disk image could ise this flaw to crash the Qemu instance resulting in DoS.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=1d7678dec4761acdc43439da6ceda41a703ba1a6
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=1d7678dec4761acdc43439da6ceda41a703ba1a6
- http://rhn.redhat.com/errata/RHSA-2014-0420.html
- http://rhn.redhat.com/errata/RHSA-2014-0420.html
- http://rhn.redhat.com/errata/RHSA-2014-0421.html
- http://rhn.redhat.com/errata/RHSA-2014-0421.html
- http://www.openwall.com/lists/oss-security/2014/03/26/8
- http://www.openwall.com/lists/oss-security/2014/03/26/8
- https://bugzilla.redhat.com/show_bug.cgi?id=1078212
- https://bugzilla.redhat.com/show_bug.cgi?id=1078212
- https://lists.gnu.org/archive/html/qemu-devel/2014-03/msg04994.html
- https://lists.gnu.org/archive/html/qemu-devel/2014-03/msg04994.html
Modified: 2024-11-21
CVE-2014-0150
Integer overflow in the virtio_net_handle_mac function in hw/net/virtio-net.c in QEMU 2.0 and earlier allows local guest users to execute arbitrary code via a MAC addresses table update request, which triggers a heap-based buffer overflow.
- [Qemu-devel] 20140411 Re: [PATCH for-2.0] virtio-net: fix guest-triggerable buffer overrun
- [Qemu-devel] 20140411 Re: [PATCH for-2.0] virtio-net: fix guest-triggerable buffer overrun
- 57878
- 57878
- 58191
- 58191
- [Qemu-devel] 20140411 [PATCH for-2.0] virtio-net: fix guest-triggerable buffer overrun
- [Qemu-devel] 20140411 [PATCH for-2.0] virtio-net: fix guest-triggerable buffer overrun
- DSA-2909
- DSA-2909
- DSA-2910
- DSA-2910
- USN-2182-1
- USN-2182-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1078846
- https://bugzilla.redhat.com/show_bug.cgi?id=1078846
Modified: 2024-11-21
CVE-2014-0182
Heap-based buffer overflow in the virtio_load function in hw/virtio/virtio.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a crafted config length in a savevm image.
- http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=a890a2f9137ac3cf5b607649e66a6f3a5512d8dc
- http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=a890a2f9137ac3cf5b607649e66a6f3a5512d8dc
- FEDORA-2014-6288
- FEDORA-2014-6288
- [Qemu-stable] 20140723 [ANNOUNCE] QEMU 1.7.2 Stable released
- [Qemu-stable] 20140723 [ANNOUNCE] QEMU 1.7.2 Stable released
- RHSA-2014:0743
- RHSA-2014:0743
- RHSA-2014:0744
- RHSA-2014:0744
Modified: 2024-11-21
CVE-2014-0222
Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image.
- FEDORA-2014-6970
- FEDORA-2014-6970
- FEDORA-2014-6288
- FEDORA-2014-6288
- [Qemu-stable] 20140723 [ANNOUNCE] QEMU 1.7.2 Stable released
- [Qemu-stable] 20140723 [ANNOUNCE] QEMU 1.7.2 Stable released
- SUSE-SU-2015:0929
- SUSE-SU-2015:0929
- openSUSE-SU-2015:1965
- openSUSE-SU-2015:1965
- DSA-3044
- DSA-3044
- 67357
- 67357
- [Qemu-devel] 20140512 [PATCH 3/5] qcow1: Validate L2 table size (CVE-2014-0222)
- [Qemu-devel] 20140512 [PATCH 3/5] qcow1: Validate L2 table size (CVE-2014-0222)
Modified: 2024-11-21
CVE-2014-0223
Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a large image size, which triggers a buffer overflow or out-of-bounds read.
- FEDORA-2014-6970
- FEDORA-2014-6970
- [Qemu-stable] 20140723 [ANNOUNCE] QEMU 1.7.2 Stable released
- [Qemu-stable] 20140723 [ANNOUNCE] QEMU 1.7.2 Stable released
- SUSE-SU-2015:0929
- SUSE-SU-2015:0929
- DSA-3044
- DSA-3044
- 67391
- 67391
- [Qemu-devel] 20140512 [PATCH 4/5] qcow1: Validate image size (CVE-2014-0223)
- [Qemu-devel] 20140512 [PATCH 4/5] qcow1: Validate image size (CVE-2014-0223)
Modified: 2024-11-21
CVE-2014-2894
Off-by-one error in the cmd_smart function in the smart self test in hw/ide/core.c in QEMU before 2.0 allows local users to have unspecified impact via a SMART EXECUTE OFFLINE command that triggers a buffer underflow and memory corruption.
- RHSA-2014:0704
- RHSA-2014:0704
- RHSA-2014:0743
- RHSA-2014:0743
- RHSA-2014:0744
- RHSA-2014:0744
- 57945
- 57945
- 58191
- 58191
- [oss-security] 20140415 CVE request Qemu: out of bounds buffer access, guest triggerable via IDE SMART
- [oss-security] 20140415 CVE request Qemu: out of bounds buffer access, guest triggerable via IDE SMART
- [oss-security] 20140418 Re: CVE request Qemu: out of bounds buffer access, guest triggerable via IDE SMART
- [oss-security] 20140418 Re: CVE request Qemu: out of bounds buffer access, guest triggerable via IDE SMART
- 66932
- 66932
- USN-2182-1
- USN-2182-1
- [Qemu-devel] 20140412 [PATCH for 2.0] ide: Correct improper smart self test c
- [Qemu-devel] 20140412 [PATCH for 2.0] ide: Correct improper smart self test c
- [Qemu-devel] 20140414 Re: [PATCH for 2.0] ide: Correct improper smart self test c
- [Qemu-devel] 20140414 Re: [PATCH for 2.0] ide: Correct improper smart self test c
- [Qemu-devel] 20140414 Re: [PATCH for 2.0] ide: Correct improper smart self test c
- [Qemu-devel] 20140414 Re: [PATCH for 2.0] ide: Correct improper smart self test c
Modified: 2024-11-21
CVE-2014-3471
Use-after-free vulnerability in hw/pci/pcie.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (QEMU instance crash) via hotplug and hotunplug operations of Virtio block devices.
- GLSA-201412-01
- GLSA-201412-01
- [oss-security] 20140623 CVE-2014-3471 Qemu: hw: pci: use after free triggered via guest
- [oss-security] 20140623 CVE-2014-3471 Qemu: hw: pci: use after free triggered via guest
- 68145
- 68145
- https://bugzilla.redhat.com/show_bug.cgi?id=1112271
- https://bugzilla.redhat.com/show_bug.cgi?id=1112271
- [qemu-devel] 20140623 PATCH v2 3/3] hw/pcie: better hotplug/hotunplug support
- [qemu-devel] 20140623 PATCH v2 3/3] hw/pcie: better hotplug/hotunplug support
Modified: 2024-11-21
CVE-2014-3615
The VGA emulator in QEMU allows local guest users to read host memory by setting the display to a high resolution.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=ab9509cceabef28071e41bdfa073083859c949a7
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=ab9509cceabef28071e41bdfa073083859c949a7
- http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=c1b886c45dc70f247300f549dce9833f3fa2def5
- http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=c1b886c45dc70f247300f549dce9833f3fa2def5
- openSUSE-SU-2015:0732
- openSUSE-SU-2015:0732
- RHSA-2014:1669
- RHSA-2014:1669
- RHSA-2014:1670
- RHSA-2014:1670
- RHSA-2014:1941
- RHSA-2014:1941
- 61829
- 61829
- http://support.citrix.com/article/CTX200892
- http://support.citrix.com/article/CTX200892
- DSA-3044
- DSA-3044
- 69654
- 69654
- USN-2409-1
- USN-2409-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1139115
- https://bugzilla.redhat.com/show_bug.cgi?id=1139115
Modified: 2024-11-21
CVE-2014-3689
The vmware-vga driver (hw/display/vmware_vga.c) in QEMU allows local guest users to write to qemu memory locations and gain privileges via unspecified parameters related to rectangle handling.
Modified: 2024-11-21
CVE-2014-5388
Off-by-one error in the pci_read function in the ACPI PCI hotplug interface (hw/acpi/pcihp.c) in QEMU allows local guest users to obtain sensitive information and have other unspecified impact related to a crafted PCI device that triggers memory corruption.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=fa365d7cd11185237471823a5a33d36765454e16
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=fa365d7cd11185237471823a5a33d36765454e16
- [oss-security] 20140822 CVE request Qemu: out of bounds memory access
- [oss-security] 20140822 CVE request Qemu: out of bounds memory access
- [oss-security] 20140822 Re: CVE request Qemu: out of bounds memory access
- [oss-security] 20140822 Re: CVE request Qemu: out of bounds memory access
- USN-2409-1
- USN-2409-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1132956
- https://bugzilla.redhat.com/show_bug.cgi?id=1132956
- [Qemu-devel] 20140820 [PATCH v2] pcihp: fix possible array out of bounds
- [Qemu-devel] 20140820 [PATCH v2] pcihp: fix possible array out of bounds
Modified: 2024-11-21
CVE-2014-7815
The set_pixel_format function in ui/vnc.c in QEMU allows remote attackers to cause a denial of service (crash) via a small bytes_per_pixel value.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=e6908bfe8e07f2b452e78e677da1b45b1c0f6829
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=e6908bfe8e07f2b452e78e677da1b45b1c0f6829
- SUSE-SU-2015:1782
- SUSE-SU-2015:1782
- RHSA-2015:0349
- RHSA-2015:0349
- RHSA-2015:0624
- RHSA-2015:0624
- 61484
- 61484
- 62143
- 62143
- 62144
- 62144
- http://support.citrix.com/article/CTX200892
- http://support.citrix.com/article/CTX200892
- DSA-3066
- DSA-3066
- DSA-3067
- DSA-3067
- USN-2409-1
- USN-2409-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1157641
- https://bugzilla.redhat.com/show_bug.cgi?id=1157641
Modified: 2024-11-21
CVE-2014-7840
The host_from_stream_offset function in arch_init.c in QEMU, when loading RAM during migration, allows remote attackers to execute arbitrary code via a crafted (1) offset or (2) length value in savevm data.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=0be839a2701369f669532ea5884c15bead1c6e08
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=0be839a2701369f669532ea5884c15bead1c6e08
- RHSA-2015:0349
- RHSA-2015:0349
- RHSA-2015:0624
- RHSA-2015:0624
- [qemu-devel] 20141112 [PATCH 0/4] migration: fix CVE-2014-7840
- [qemu-devel] 20141112 [PATCH 0/4] migration: fix CVE-2014-7840
- https://bugzilla.redhat.com/show_bug.cgi?id=1163075
- https://bugzilla.redhat.com/show_bug.cgi?id=1163075
- qemu-cve20147840-code-exec(99194)
- qemu-cve20147840-code-exec(99194)
Modified: 2024-11-21
CVE-2014-8106
Heap-based buffer overflow in the Cirrus VGA emulator (hw/display/cirrus_vga.c) in QEMU before 2.2.0 allows local guest users to execute arbitrary code via vectors related to blit regions. NOTE: this vulnerability exists because an incomplete fix for CVE-2007-1320.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=bf25983345ca44aec3dd92c57142be45452bd38a
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=bf25983345ca44aec3dd92c57142be45452bd38a
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=d3532a0db02296e687711b8cdc7791924efccea0
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=d3532a0db02296e687711b8cdc7791924efccea0
- FEDORA-2015-5482
- FEDORA-2015-5482
- [Qemu-devel] 20141204 [PULL for-2.2 0/2] cirrus: fix blit region check (cve-2014-8106)
- [Qemu-devel] 20141204 [PULL for-2.2 0/2] cirrus: fix blit region check (cve-2014-8106)
- RHSA-2015:0349
- RHSA-2015:0349
- RHSA-2015:0624
- RHSA-2015:0624
- RHSA-2015:0643
- RHSA-2015:0643
- RHSA-2015:0795
- RHSA-2015:0795
- RHSA-2015:0867
- RHSA-2015:0867
- RHSA-2015:0868
- RHSA-2015:0868
- RHSA-2015:0891
- RHSA-2015:0891
- 60364
- 60364
- http://support.citrix.com/article/CTX200892
- http://support.citrix.com/article/CTX200892
- DSA-3087
- DSA-3087
- DSA-3088
- DSA-3088
- [oss-security] 20141204 CVE-2014-8106 qemu: cirrus: insufficient blit region checks
- [oss-security] 20141204 CVE-2014-8106 qemu: cirrus: insufficient blit region checks
- 71477
- 71477
- qemu-cve20148106-sec-bypass(99126)
- qemu-cve20148106-sec-bypass(99126)
Modified: 2024-11-21
CVE-2015-1779
The VNC websocket frame decoder in QEMU allows remote attackers to cause a denial of service (memory and CPU consumption) via a large (1) websocket payload or (2) HTTP headers section.
- FEDORA-2015-5482
- FEDORA-2015-5482
- FEDORA-2015-5541
- FEDORA-2015-5541
- SUSE-SU-2015:0870
- SUSE-SU-2015:0870
- SUSE-SU-2015:0896
- SUSE-SU-2015:0896
- RHSA-2015:1931
- RHSA-2015:1931
- RHSA-2015:1943
- RHSA-2015:1943
- DSA-3259
- DSA-3259
- [oss-security] 20150324 CVE-2015-1779 qemu: vnc: insufficient resource limiting in VNC websockets decoder
- [oss-security] 20150324 CVE-2015-1779 qemu: vnc: insufficient resource limiting in VNC websockets decoder
- [oss-security] 20150409 Re: CVE-2015-1779 qemu: vnc: insufficient resource limiting in VNC websockets decoder
- [oss-security] 20150409 Re: CVE-2015-1779 qemu: vnc: insufficient resource limiting in VNC websockets decoder
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 73303
- 73303
- 1033975
- 1033975
- USN-2608-1
- USN-2608-1
- [Qemu-devel] 20150323 [PATCH 0/2] CVE-2015-1779: fix denial of service in VNC websockets
- [Qemu-devel] 20150323 [PATCH 0/2] CVE-2015-1779: fix denial of service in VNC websockets
- [Qemu-devel] 20150323 [PATCH 2/2] CVE-2015-1779: limit size of HTTP headers from websockets clients
- [Qemu-devel] 20150323 [PATCH 2/2] CVE-2015-1779: limit size of HTTP headers from websockets clients
- [Qemu-devel] 20150323 [PATCH 1/2] CVE-2015-1779: incrementally decode websocket frames
- [Qemu-devel] 20150323 [PATCH 1/2] CVE-2015-1779: incrementally decode websocket frames
- GLSA-201602-01
- GLSA-201602-01
Modified: 2024-11-21
CVE-2015-3209
Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698
- FEDORA-2015-10001
- FEDORA-2015-10001
- FEDORA-2015-9978
- FEDORA-2015-9978
- FEDORA-2015-9965
- FEDORA-2015-9965
- SUSE-SU-2015:1042
- SUSE-SU-2015:1042
- SUSE-SU-2015:1045
- SUSE-SU-2015:1045
- SUSE-SU-2015:1152
- SUSE-SU-2015:1152
- SUSE-SU-2015:1156
- SUSE-SU-2015:1156
- SUSE-SU-2015:1157
- SUSE-SU-2015:1157
- SUSE-SU-2015:1206
- SUSE-SU-2015:1206
- SUSE-SU-2015:1426
- SUSE-SU-2015:1426
- SUSE-SU-2015:1519
- SUSE-SU-2015:1519
- SUSE-SU-2015:1643
- SUSE-SU-2015:1643
- RHSA-2015:1087
- RHSA-2015:1087
- RHSA-2015:1088
- RHSA-2015:1088
- RHSA-2015:1089
- RHSA-2015:1089
- RHSA-2015:1189
- RHSA-2015:1189
- DSA-3284
- DSA-3284
- DSA-3285
- DSA-3285
- DSA-3286
- DSA-3286
- 75123
- 75123
- 1032545
- 1032545
- USN-2630-1
- USN-2630-1
- http://xenbits.xen.org/xsa/advisory-135.html
- http://xenbits.xen.org/xsa/advisory-135.html
- https://kb.juniper.net/JSA10783
- https://kb.juniper.net/JSA10783
- GLSA-201510-02
- GLSA-201510-02
- GLSA-201604-03
- GLSA-201604-03
- https://www.arista.com/en/support/advisories-notices/security-advisories/1180-security-advisory-13
- https://www.arista.com/en/support/advisories-notices/security-advisories/1180-security-advisory-13
Modified: 2024-11-21
CVE-2015-3214
The pit_ioport_read in i8254.c in the Linux kernel before 2.6.33 and QEMU before 2.3.1 does not distinguish between read lengths and write lengths, which might allow guest OS users to execute arbitrary code on the host OS by triggering use of an invalid index.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ee73f656a604d5aa9df86a97102e4e462dd79924
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ee73f656a604d5aa9df86a97102e4e462dd79924
- http://mirror.linux.org.au/linux/kernel/v2.6/ChangeLog-2.6.33
- http://mirror.linux.org.au/linux/kernel/v2.6/ChangeLog-2.6.33
- RHSA-2015:1507
- RHSA-2015:1507
- RHSA-2015:1508
- RHSA-2015:1508
- RHSA-2015:1512
- RHSA-2015:1512
- DSA-3348
- DSA-3348
- [oss-security] 20150625 Re: CVE request -- Linux kernel - kvm: x86: out-of-bounds memory access in pit_ioport_read function
- [oss-security] 20150625 Re: CVE request -- Linux kernel - kvm: x86: out-of-bounds memory access in pit_ioport_read function
- 75273
- 75273
- 1032598
- 1032598
- https://bugzilla.redhat.com/show_bug.cgi?id=1229640
- https://bugzilla.redhat.com/show_bug.cgi?id=1229640
- https://github.com/torvalds/linux/commit/ee73f656a604d5aa9df86a97102e4e462dd79924
- https://github.com/torvalds/linux/commit/ee73f656a604d5aa9df86a97102e4e462dd79924
- GLSA-201510-02
- GLSA-201510-02
- https://support.lenovo.com/product_security/qemu
- https://support.lenovo.com/product_security/qemu
- https://support.lenovo.com/us/en/product_security/qemu
- https://support.lenovo.com/us/en/product_security/qemu
- https://www.arista.com/en/support/advisories-notices/security-advisories/1180-security-advisory-13
- https://www.arista.com/en/support/advisories-notices/security-advisories/1180-security-advisory-13
- 37990
- 37990
- [qemu-devel] 20150617 Re: [PATCH] i8254: fix out-of-bounds memory access in pit_ioport_read()
- [qemu-devel] 20150617 Re: [PATCH] i8254: fix out-of-bounds memory access in pit_ioport_read()
Modified: 2024-11-21
CVE-2015-3456
The Floppy Disk Controller (FDC) in QEMU, as used in Xen 4.5.x and earlier and KVM, allows local guest users to cause a denial of service (out-of-bounds write and guest crash) or possibly execute arbitrary code via the (1) FD_CMD_READ_ID, (2) FD_CMD_DRIVE_SPECIFICATION_COMMAND, or other unspecified commands, aka VENOM.
- http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=e907746266721f305d67bc0718795fedee2e824c
- http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=e907746266721f305d67bc0718795fedee2e824c
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10693
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10693
- FEDORA-2015-8249
- FEDORA-2015-8249
- SUSE-SU-2015:0889
- SUSE-SU-2015:0889
- openSUSE-SU-2015:0893
- openSUSE-SU-2015:0893
- openSUSE-SU-2015:0894
- openSUSE-SU-2015:0894
- SUSE-SU-2015:0923
- SUSE-SU-2015:0923
- SUSE-SU-2015:0927
- SUSE-SU-2015:0927
- SUSE-SU-2015:0929
- SUSE-SU-2015:0929
- SUSE-SU-2015:0896
- SUSE-SU-2015:0896
- openSUSE-SU-2015:0983
- openSUSE-SU-2015:0983
- openSUSE-SU-2015:1400
- openSUSE-SU-2015:1400
- HPSBMU03336
- HPSBMU03336
- SSRT102076
- SSRT102076
- HPSBMU03349
- HPSBMU03349
- RHSA-2015:0998
- RHSA-2015:0998
- RHSA-2015:0999
- RHSA-2015:0999
- RHSA-2015:1000
- RHSA-2015:1000
- RHSA-2015:1001
- RHSA-2015:1001
- RHSA-2015:1002
- RHSA-2015:1002
- RHSA-2015:1003
- RHSA-2015:1003
- RHSA-2015:1004
- RHSA-2015:1004
- RHSA-2015:1011
- RHSA-2015:1011
- http://support.citrix.com/article/CTX201078
- http://support.citrix.com/article/CTX201078
- http://venom.crowdstrike.com/
- http://venom.crowdstrike.com/
- DSA-3259
- DSA-3259
- DSA-3262
- DSA-3262
- DSA-3274
- DSA-3274
- http://www.fortiguard.com/advisory/2015-05-19-cve-2015-3456-venom-vulnerability
- http://www.fortiguard.com/advisory/2015-05-19-cve-2015-3456-venom-vulnerability
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- 74640
- 74640
- 1032306
- 1032306
- 1032311
- 1032311
- 1032917
- 1032917
- USN-2608-1
- USN-2608-1
- http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-438937.htm
- http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-438937.htm
- http://xenbits.xen.org/xsa/advisory-133.html
- http://xenbits.xen.org/xsa/advisory-133.html
- https://access.redhat.com/articles/1444903
- https://access.redhat.com/articles/1444903
- https://bto.bluecoat.com/security-advisory/sa95
- https://bto.bluecoat.com/security-advisory/sa95
- https://kb.juniper.net/JSA10783
- https://kb.juniper.net/JSA10783
- https://kc.mcafee.com/corporate/index?page=content&id=SB10118
- https://kc.mcafee.com/corporate/index?page=content&id=SB10118
- GLSA-201602-01
- GLSA-201602-01
- GLSA-201604-03
- GLSA-201604-03
- GLSA-201612-27
- GLSA-201612-27
- https://securityblog.redhat.com/2015/05/13/venom-dont-get-bitten/
- https://securityblog.redhat.com/2015/05/13/venom-dont-get-bitten/
- https://support.lenovo.com/us/en/product_security/venom
- https://support.lenovo.com/us/en/product_security/venom
- https://www.arista.com/en/support/advisories-notices/security-advisories/1128-security-advisory-10
- https://www.arista.com/en/support/advisories-notices/security-advisories/1128-security-advisory-10
- 37053
- 37053
- https://www.suse.com/security/cve/CVE-2015-3456.html
- https://www.suse.com/security/cve/CVE-2015-3456.html
Modified: 2024-11-21
CVE-2015-4037
The slirp_smb function in net/slirp.c in QEMU 2.3.0 and earlier creates temporary files with predictable names, which allows local users to cause a denial of service (instantiation failure) by creating /tmp/qemu-smb.*-* files before the program.
- FEDORA-2015-9601
- FEDORA-2015-9601
- FEDORA-2015-9599
- FEDORA-2015-9599
- SUSE-SU-2015:1152
- SUSE-SU-2015:1152
- SUSE-SU-2015:1519
- SUSE-SU-2015:1519
- openSUSE-SU-2015:1965
- openSUSE-SU-2015:1965
- DSA-3284
- DSA-3284
- DSA-3285
- DSA-3285
- [oss-security] 20150513 QEMU 2.3.0 tmp vulns CVE request
- [oss-security] 20150513 QEMU 2.3.0 tmp vulns CVE request
- [oss-security] 20150516 Re: QEMU 2.3.0 tmp vulns CVE request
- [oss-security] 20150516 Re: QEMU 2.3.0 tmp vulns CVE request
- [oss-security] 20150523 Re: QEMU 2.3.0 tmp vulns CVE request
- [oss-security] 20150523 Re: QEMU 2.3.0 tmp vulns CVE request
- 74809
- 74809
- 1032547
- 1032547
- USN-2630-1
- USN-2630-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1222892
- https://bugzilla.redhat.com/show_bug.cgi?id=1222892
Modified: 2024-11-21
CVE-2015-4106
QEMU does not properly restrict write access to the PCI config space for certain PCI pass-through devices, which might allow local x86 HVM guests to gain privileges, cause a denial of service (host crash), obtain sensitive information, or possibly have other unspecified impact via unknown vectors.
- FEDORA-2015-9466
- FEDORA-2015-9466
- FEDORA-2015-9456
- FEDORA-2015-9456
- FEDORA-2015-9965
- FEDORA-2015-9965
- SUSE-SU-2015:1042
- SUSE-SU-2015:1042
- SUSE-SU-2015:1045
- SUSE-SU-2015:1045
- SUSE-SU-2015:1156
- SUSE-SU-2015:1156
- SUSE-SU-2015:1157
- SUSE-SU-2015:1157
- http://support.citrix.com/article/CTX201145
- http://support.citrix.com/article/CTX201145
- DSA-3284
- DSA-3284
- DSA-3286
- DSA-3286
- 74949
- 74949
- 1032467
- 1032467
- USN-2630-1
- USN-2630-1
- http://xenbits.xen.org/xsa/advisory-131.html
- http://xenbits.xen.org/xsa/advisory-131.html
- GLSA-201604-03
- GLSA-201604-03
- https://support.citrix.com/article/CTX206006
- https://support.citrix.com/article/CTX206006
Modified: 2024-11-21
CVE-2015-5154
Heap-based buffer overflow in the IDE subsystem in QEMU, as used in Xen 4.5.x and earlier, when the container has a CDROM drive enabled, allows local guest users to execute arbitrary code on the host via unspecified ATAPI commands.
- FEDORA-2015-12679
- FEDORA-2015-12679
- FEDORA-2015-12657
- FEDORA-2015-12657
- FEDORA-2015-12714
- FEDORA-2015-12714
- SUSE-SU-2015:1299
- SUSE-SU-2015:1299
- SUSE-SU-2015:1302
- SUSE-SU-2015:1302
- SUSE-SU-2015:1409
- SUSE-SU-2015:1409
- SUSE-SU-2015:1421
- SUSE-SU-2015:1421
- SUSE-SU-2015:1426
- SUSE-SU-2015:1426
- SUSE-SU-2015:1455
- SUSE-SU-2015:1455
- SUSE-SU-2015:1643
- SUSE-SU-2015:1643
- SUSE-SU-2015:1782
- SUSE-SU-2015:1782
- RHSA-2015:1507
- RHSA-2015:1507
- RHSA-2015:1508
- RHSA-2015:1508
- RHSA-2015:1512
- RHSA-2015:1512
- http://support.citrix.com/article/CTX201593
- http://support.citrix.com/article/CTX201593
- DSA-3348
- DSA-3348
- 76048
- 76048
- 1033074
- 1033074
- http://xenbits.xen.org/xsa/advisory-138.html
- http://xenbits.xen.org/xsa/advisory-138.html
- GLSA-201510-02
- GLSA-201510-02
- GLSA-201604-03
- GLSA-201604-03
Modified: 2024-11-21
CVE-2015-5225
Buffer overflow in the vnc_refresh_server_surface function in the VNC display driver in QEMU before 2.4.0.1 allows guest users to cause a denial of service (heap memory corruption and process crash) or possibly execute arbitrary code on the host via unspecified vectors, related to refreshing the server display surface.
- FEDORA-2015-16368
- FEDORA-2015-16368
- FEDORA-2015-14783
- FEDORA-2015-14783
- FEDORA-2015-15364
- FEDORA-2015-15364
- RHSA-2015:1772
- RHSA-2015:1772
- RHSA-2015:1837
- RHSA-2015:1837
- DSA-3348
- DSA-3348
- [oss-security] 20150822 CVE-2015-5225 Qemu: ui: vnc: heap memory corruption issue
- [oss-security] 20150822 CVE-2015-5225 Qemu: ui: vnc: heap memory corruption issue
- 76506
- 76506
- 1033547
- 1033547
- [Qemu-devel] 20150821 [PATCH] vnc: fix memory corruption (CVE-2015-5225)
- [Qemu-devel] 20150821 [PATCH] vnc: fix memory corruption (CVE-2015-5225)
- [Qemu-deve] 20150915 [ANNOUNCE] QEMU 2.4.0.1 CVE update released
- [Qemu-deve] 20150915 [ANNOUNCE] QEMU 2.4.0.1 CVE update released
- GLSA-201602-01
- GLSA-201602-01
Modified: 2024-11-21
CVE-2015-5239
Integer overflow in the VNC display driver in QEMU before 2.1.0 allows attachers to cause a denial of service (process crash) via a CLIENT_CUT_TEXT message, which triggers an infinite loop.
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168077.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168077.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168646.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168646.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168671.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168671.html
- http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00011.html
- http://www.openwall.com/lists/oss-security/2015/09/02/7
- http://www.openwall.com/lists/oss-security/2015/09/02/7
- http://www.ubuntu.com/usn/USN-2745-1
- http://www.ubuntu.com/usn/USN-2745-1
- https://github.com/qemu/qemu/commit/f9a70e79391f6d7c2a912d785239ee8effc1922d
- https://github.com/qemu/qemu/commit/f9a70e79391f6d7c2a912d785239ee8effc1922d
- https://www.arista.com/en/support/advisories-notices/security-advisories/1188-security-advisory-14
- https://www.arista.com/en/support/advisories-notices/security-advisories/1188-security-advisory-14
Modified: 2024-11-21
CVE-2015-5278
The ne2000_receive function in hw/net/ne2000.c in QEMU before 2.4.0.1 allows attackers to cause a denial of service (infinite loop and instance crash) or possibly execute arbitrary code via vectors related to receiving packets.
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168077.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168077.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168646.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168646.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168671.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168671.html
- http://www.openwall.com/lists/oss-security/2015/09/15/2
- http://www.openwall.com/lists/oss-security/2015/09/15/2
- http://www.ubuntu.com/usn/USN-2745-1
- http://www.ubuntu.com/usn/USN-2745-1
- https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg03985.html
- https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg03985.html
- https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg05832.html
- https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg05832.html
- https://www.arista.com/en/support/advisories-notices/security-advisories/1188-security-advisory-14
- https://www.arista.com/en/support/advisories-notices/security-advisories/1188-security-advisory-14
Modified: 2024-11-21
CVE-2015-5279
Heap-based buffer overflow in the ne2000_receive function in hw/net/ne2000.c in QEMU before 2.4.0.1 allows guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via vectors related to receiving packets.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=7aa2bcad0ca837dd6d4bf4fa38a80314b4a6b755
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=7aa2bcad0ca837dd6d4bf4fa38a80314b4a6b755
- FEDORA-2015-16369
- FEDORA-2015-16369
- FEDORA-2015-16368
- FEDORA-2015-16368
- FEDORA-2015-16370
- FEDORA-2015-16370
- SUSE-SU-2015:1782
- SUSE-SU-2015:1782
- RHSA-2015:1896
- RHSA-2015:1896
- RHSA-2015:1923
- RHSA-2015:1923
- RHSA-2015:1924
- RHSA-2015:1924
- RHSA-2015:1925
- RHSA-2015:1925
- DSA-3361
- DSA-3361
- DSA-3362
- DSA-3362
- [oss-security] 20150915 CVE-2015-5279 Qemu: net: add checks to validate ring buffer pointers
- [oss-security] 20150915 CVE-2015-5279 Qemu: net: add checks to validate ring buffer pointers
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 76746
- 76746
- 1033569
- 1033569
- [Qemu-devel] 20150915 [PULL 2/3] net: add checks to validate ring buffer pointers
- [Qemu-devel] 20150915 [PULL 2/3] net: add checks to validate ring buffer pointers
- GLSA-201602-01
- GLSA-201602-01
- https://www.arista.com/en/support/advisories-notices/security-advisories/1188-security-advisory-14
- https://www.arista.com/en/support/advisories-notices/security-advisories/1188-security-advisory-14
Modified: 2024-11-21
CVE-2015-5745
Buffer overflow in the send_control_msg function in hw/char/virtio-serial-bus.c in QEMU before 2.4.0 allows guest users to cause a denial of service (QEMU process crash) via a crafted virtio control message.
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168077.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168077.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168646.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168646.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168671.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168671.html
- http://www.openwall.com/lists/oss-security/2015/08/06/3
- http://www.openwall.com/lists/oss-security/2015/08/06/3
- http://www.openwall.com/lists/oss-security/2015/08/06/5
- http://www.openwall.com/lists/oss-security/2015/08/06/5
- https://github.com/qemu/qemu/commit/7882080388be5088e72c425b02223c02e6cb4295
- https://github.com/qemu/qemu/commit/7882080388be5088e72c425b02223c02e6cb4295
- https://lists.gnu.org/archive/html/qemu-devel/2015-07/msg05458.html
- https://lists.gnu.org/archive/html/qemu-devel/2015-07/msg05458.html
- https://www.arista.com/en/support/advisories-notices/security-advisories/1180-security-advisory-13
- https://www.arista.com/en/support/advisories-notices/security-advisories/1180-security-advisory-13
Modified: 2024-11-21
CVE-2015-6815
The process_tx_desc function in hw/net/e1000.c in QEMU before 2.4.0.1 does not properly process transmit descriptor data when sending a network packet, which allows attackers to cause a denial of service (infinite loop and guest crash) via unspecified vectors.
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168077.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168077.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168646.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168646.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168671.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168671.html
- http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00011.html
- http://www.openwall.com/lists/oss-security/2015/09/04/4
- http://www.openwall.com/lists/oss-security/2015/09/04/4
- http://www.openwall.com/lists/oss-security/2015/09/05/5
- http://www.openwall.com/lists/oss-security/2015/09/05/5
- http://www.ubuntu.com/usn/USN-2745-1
- http://www.ubuntu.com/usn/USN-2745-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1260076
- https://bugzilla.redhat.com/show_bug.cgi?id=1260076
- https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg01199.html
- https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg01199.html
- https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg05832.html
- https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg05832.html
- https://www.arista.com/en/support/advisories-notices/security-advisories/1188-security-advisory-14
- https://www.arista.com/en/support/advisories-notices/security-advisories/1188-security-advisory-14
Modified: 2024-11-21
CVE-2015-6855
hw/ide/core.c in QEMU does not properly restrict the commands accepted by an ATAPI device, which allows guest users to cause a denial of service or possibly have unspecified other impact via certain IDE commands, as demonstrated by a WIN_READ_NATIVE_MAX command to an empty drive, which triggers a divide-by-zero error and instance crash.
- FEDORA-2015-8dc71ade88
- FEDORA-2015-8dc71ade88
- FEDORA-2015-16369
- FEDORA-2015-16369
- FEDORA-2015-16368
- FEDORA-2015-16368
- FEDORA-2015-4896530727
- FEDORA-2015-4896530727
- FEDORA-2015-d6ea74993a
- FEDORA-2015-d6ea74993a
- FEDORA-2015-16370
- FEDORA-2015-16370
- SUSE-SU-2015:1782
- SUSE-SU-2015:1782
- DSA-3361
- DSA-3361
- DSA-3362
- DSA-3362
- [oss-security] 20150910 CVE request Qemu: ide: divide by zero issue
- [oss-security] 20150910 CVE request Qemu: ide: divide by zero issue
- [oss-security] 20150910 Re: CVE request Qemu: ide: divide by zero issue
- [oss-security] 20150910 Re: CVE request Qemu: ide: divide by zero issue
- 76691
- 76691
- USN-2745-1
- USN-2745-1
- [Qemu-devel] 20150907 [PATCH] ide: fix ATAPI command permissions
- [Qemu-devel] 20150907 [PATCH] ide: fix ATAPI command permissions
- GLSA-201602-01
- GLSA-201602-01
- https://www.arista.com/en/support/advisories-notices/security-advisories/1188-security-advisory-14
- https://www.arista.com/en/support/advisories-notices/security-advisories/1188-security-advisory-14
Modified: 2024-11-21
CVE-2015-7295
hw/virtio/virtio.c in the Virtual Network Device (virtio-net) support in QEMU, when big or mergeable receive buffers are not supported, allows remote attackers to cause a denial of service (guest network consumption) via a flood of jumbo frames on the (1) tuntap or (2) macvtap interface.
- FEDORA-2015-d8510319c0
- FEDORA-2015-d8510319c0
- FEDORA-2015-fca1900745
- FEDORA-2015-fca1900745
- FEDORA-2015-d5c1048b47
- FEDORA-2015-d5c1048b47
- DSA-3469
- DSA-3469
- DSA-3470
- DSA-3470
- DSA-3471
- DSA-3471
- [oss-security] 20150918 CVE request Qemu: net: virtio-net possible remote DoS
- [oss-security] 20150918 CVE request Qemu: net: virtio-net possible remote DoS
- [oss-security] 20150918 Re: CVE request Qemu: net: virtio-net possible remote DoS
- [oss-security] 20150918 Re: CVE request Qemu: net: virtio-net possible remote DoS
- 82672
- 82672
- GLSA-201602-01
- GLSA-201602-01
Modified: 2024-11-21
CVE-2015-7504
Heap-based buffer overflow in the pcnet_receive function in hw/net/pcnet.c in QEMU allows guest OS administrators to cause a denial of service (instance crash) or possibly execute arbitrary code via a series of packets in loopback mode.
- RHSA-2015:2694
- RHSA-2015:2694
- RHSA-2015:2695
- RHSA-2015:2695
- RHSA-2015:2696
- RHSA-2015:2696
- DSA-3469
- DSA-3469
- DSA-3470
- DSA-3470
- DSA-3471
- DSA-3471
- [oss-security] 20151130 CVE-2015-7504 Qemu: net: pcnet: heap overflow vulnerability in loopback mode
- [oss-security] 20151130 CVE-2015-7504 Qemu: net: pcnet: heap overflow vulnerability in loopback mode
- 78227
- 78227
- 1034268
- 1034268
- http://xenbits.xen.org/xsa/advisory-162.html
- http://xenbits.xen.org/xsa/advisory-162.html
- [Qemu-devel] 20151130 [PATCH for 2.5 1/2] net: pcnet: add check to validate receive data size(CVE-2015-7504)
- [Qemu-devel] 20151130 [PATCH for 2.5 1/2] net: pcnet: add check to validate receive data size(CVE-2015-7504)
- GLSA-201602-01
- GLSA-201602-01
- GLSA-201604-03
- GLSA-201604-03
Modified: 2024-11-21
CVE-2015-7512
Buffer overflow in the pcnet_receive function in hw/net/pcnet.c in QEMU, when a guest NIC has a larger MTU, allows remote attackers to cause a denial of service (guest OS crash) or execute arbitrary code via a large packet.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=8b98a2f07175d46c3f7217639bd5e03f
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=8b98a2f07175d46c3f7217639bd5e03f
- RHSA-2015:2694
- RHSA-2015:2694
- RHSA-2015:2695
- RHSA-2015:2695
- RHSA-2015:2696
- RHSA-2015:2696
- DSA-3469
- DSA-3469
- DSA-3470
- DSA-3470
- DSA-3471
- DSA-3471
- [oss-security] 20151130 CVE-2015-7512 Qemu: net: pcnet: buffer overflow in non-loopback mode
- [oss-security] 20151130 CVE-2015-7512 Qemu: net: pcnet: buffer overflow in non-loopback mode
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- 78230
- 78230
- 1034527
- 1034527
- GLSA-201602-01
- GLSA-201602-01
Modified: 2024-11-21
CVE-2015-7549
The MSI-X MMIO support in hw/pci/msix.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (NULL pointer dereference and QEMU process crash) by leveraging failure to define the .write method.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=43b11a91dd861a946b231b89b754285
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=43b11a91dd861a946b231b89b754285
- FEDORA-2016-e9bba2bb01
- FEDORA-2016-e9bba2bb01
- DSA-3471
- DSA-3471
- [oss-security] 20151214 CVE-2015-7549 Qemu: pci: msi-x: null pointer dereference issue
- [oss-security] 20151214 CVE-2015-7549 Qemu: pci: msi-x: null pointer dereference issue
- 80761
- 80761
- https://bugzilla.redhat.com/show_bug.cgi?id=1291137
- https://bugzilla.redhat.com/show_bug.cgi?id=1291137
- GLSA-201602-01
- GLSA-201602-01
Modified: 2024-11-21
CVE-2015-8345
The eepro100 emulator in QEMU qemu-kvm blank allows local guest users to cause a denial of service (application crash and infinite loop) via vectors involving the command block list.
- DSA-3469
- DSA-3469
- DSA-3470
- DSA-3470
- DSA-3471
- DSA-3471
- [oss-security] 20151125 Re: CVE request Qemu: net: eepro100: infinite loop in processing command block list
- [oss-security] 20151125 Re: CVE request Qemu: net: eepro100: infinite loop in processing command block list
- 77985
- 77985
- [qemu-devel] 20151016 [Qemu-devel] [PATCH] eepro100: prevent an infinite loop over same comman
- [qemu-devel] 20151016 [Qemu-devel] [PATCH] eepro100: prevent an infinite loop over same comman
- GLSA-201602-01
- GLSA-201602-01
Modified: 2024-11-21
CVE-2015-8504
Qemu, when built with VNC display driver support, allows remote attackers to cause a denial of service (arithmetic exception and application crash) via crafted SetPixelFormat messages from a client.
- http://git.qemu-project.org/?p=qemu.git%3Ba=commitdiff%3Bh=4c65fed8bdf96780735dbdb92a8
- http://git.qemu-project.org/?p=qemu.git%3Ba=commitdiff%3Bh=4c65fed8bdf96780735dbdb92a8
- DSA-3469
- DSA-3469
- DSA-3470
- DSA-3470
- DSA-3471
- DSA-3471
- [oss-security] 20151208 Re: CVE request: Qemu: ui: vnc: avoid floating point exception
- [oss-security] 20151208 Re: CVE request: Qemu: ui: vnc: avoid floating point exception
- 78708
- 78708
- https://bugzilla.redhat.com/show_bug.cgi?id=1289541
- https://bugzilla.redhat.com/show_bug.cgi?id=1289541
- GLSA-201602-01
- GLSA-201602-01
Modified: 2024-11-21
CVE-2015-8556
Local privilege escalation vulnerability in the Gentoo QEMU package before 2.5.0-r1.
Modified: 2024-11-21
CVE-2015-8666
Heap-based buffer overflow in QEMU, when built with the Q35-chipset-based PC system emulator.
- http://git.qemu-project.org/?p=qemu.git%3Ba=commit%3Bh=d9a3b33d2c9f996537b7f1d0246dee2d0120cefb
- http://git.qemu-project.org/?p=qemu.git%3Ba=commit%3Bh=d9a3b33d2c9f996537b7f1d0246dee2d0120cefb
- [oss-security] 20151224 CVE request Qemu: acpi: heap based buffer overrun during VM migration
- [oss-security] 20151224 CVE request Qemu: acpi: heap based buffer overrun during VM migration
- 79670
- 79670
- https://bugzilla.redhat.com/show_bug.cgi?id=1283722
- https://bugzilla.redhat.com/show_bug.cgi?id=1283722
- [debian-lts-announce] 20180906 [SECURITY] [DLA 1497-1] qemu security update
- [debian-lts-announce] 20180906 [SECURITY] [DLA 1497-1] qemu security update
- GLSA-201602-01
- GLSA-201602-01
Modified: 2024-11-21
CVE-2015-8744
QEMU (aka Quick Emulator) built with a VMWARE VMXNET3 paravirtual NIC emulator support is vulnerable to crash issue. It occurs when a guest sends a Layer-2 packet smaller than 22 bytes. A privileged (CAP_SYS_RAWIO) guest user could use this flaw to crash the QEMU process instance resulting in DoS.
- http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=a7278b36fcab9af469563bd7b
- http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=a7278b36fcab9af469563bd7b
- DSA-3471
- DSA-3471
- [oss-security] 20160104 CVE request Qemu: net: vmxnet3: incorrect l2 header validation leads to a crash
- [oss-security] 20160104 CVE request Qemu: net: vmxnet3: incorrect l2 header validation leads to a crash
- [oss-security] 20160104 Re: CVE request Qemu: net: vmxnet3: incorrect l2 header validation leads to a crash
- [oss-security] 20160104 Re: CVE request Qemu: net: vmxnet3: incorrect l2 header validation leads to a crash
- 79821
- 79821
- 1034576
- 1034576
- https://bugzilla.redhat.com/show_bug.cgi?id=1270871
- https://bugzilla.redhat.com/show_bug.cgi?id=1270871
- GLSA-201602-01
- GLSA-201602-01
Modified: 2024-11-21
CVE-2015-8745
QEMU (aka Quick Emulator) built with a VMWARE VMXNET3 paravirtual NIC emulator support is vulnerable to crash issue. It could occur while reading Interrupt Mask Registers (IMR). A privileged (CAP_SYS_RAWIO) guest user could use this flaw to crash the QEMU process instance resulting in DoS.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=c6048f849c7e3f009786df76206e895
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=c6048f849c7e3f009786df76206e895
- DSA-3471
- DSA-3471
- [oss-security] 20160104 CVE request Qemu: net: vmxnet3: reading IMR registers leads to a crash
- [oss-security] 20160104 CVE request Qemu: net: vmxnet3: reading IMR registers leads to a crash
- [oss-security] 20160104 Re: CVE request Qemu: net: vmxnet3: reading IMR registers leads to a crash
- [oss-security] 20160104 Re: CVE request Qemu: net: vmxnet3: reading IMR registers leads to a crash
- 79822
- 79822
- 1034575
- 1034575
- https://bugzilla.redhat.com/show_bug.cgi?id=1270876
- https://bugzilla.redhat.com/show_bug.cgi?id=1270876
- GLSA-201602-01
- GLSA-201602-01
Modified: 2024-11-21
CVE-2015-8818
The cpu_physical_memory_write_rom_internal function in exec.c in QEMU (aka Quick Emulator) does not properly skip MMIO regions, which allows local privileged guest users to cause a denial of service (guest crash) via unspecified vectors.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=b242e0e0e2969c044a318e56f7988bbd84de1f63
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=b242e0e0e2969c044a318e56f7988bbd84de1f63
- RHSA-2016:2670
- RHSA-2016:2670
- RHSA-2016:2671
- RHSA-2016:2671
- RHSA-2016:2704
- RHSA-2016:2704
- RHSA-2016:2705
- RHSA-2016:2705
- RHSA-2016:2706
- RHSA-2016:2706
- [oss-security] 20160301 CVE request Qemu: OOB access in address_space_rw leads to segmentation fault
- [oss-security] 20160301 CVE request Qemu: OOB access in address_space_rw leads to segmentation fault
- [oss-security] 20160301 Re: CVE request Qemu: OOB access in address_space_rw leads to segmentation fault
- [oss-security] 20160301 Re: CVE request Qemu: OOB access in address_space_rw leads to segmentation fault
- https://bugzilla.redhat.com/show_bug.cgi?id=1300771
- https://bugzilla.redhat.com/show_bug.cgi?id=1300771
Modified: 2024-11-21
CVE-2016-1714
The (1) fw_cfg_write and (2) fw_cfg_read functions in hw/nvram/fw_cfg.c in QEMU before 2.4, when built with the Firmware Configuration device emulation support, allow guest OS users with the CAP_SYS_RAWIO privilege to cause a denial of service (out-of-bounds read or write access and process crash) or possibly execute arbitrary code via an invalid current entry value in a firmware configuration.
- RHSA-2016:0081
- RHSA-2016:0081
- RHSA-2016:0082
- RHSA-2016:0082
- RHSA-2016:0083
- RHSA-2016:0083
- RHSA-2016:0084
- RHSA-2016:0084
- RHSA-2016:0085
- RHSA-2016:0085
- RHSA-2016:0086
- RHSA-2016:0086
- RHSA-2016:0087
- RHSA-2016:0087
- RHSA-2016:0088
- RHSA-2016:0088
- DSA-3469
- DSA-3469
- DSA-3470
- DSA-3470
- DSA-3471
- DSA-3471
- [oss-security] 20160111 CVE request Qemu: nvram: OOB r/w access in processing firmware configurations
- [oss-security] 20160111 CVE request Qemu: nvram: OOB r/w access in processing firmware configurations
- [oss-security] 20160112 Re: CVE request Qemu: nvram: OOB r/w access in processing firmware configurations
- [oss-security] 20160112 Re: CVE request Qemu: nvram: OOB r/w access in processing firmware configurations
- [oss-security] 20160112 Re: Re: CVE request Qemu: nvram: OOB r/w access in processing firmware configurations
- [oss-security] 20160112 Re: Re: CVE request Qemu: nvram: OOB r/w access in processing firmware configurations
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- 80250
- 80250
- 1034858
- 1034858
- [Qemu-devel] 20160106 [PATCH v2 for v2.3.0] fw_cfg: add check to validate current entry value
- [Qemu-devel] 20160106 [PATCH v2 for v2.3.0] fw_cfg: add check to validate current entry value
- GLSA-201604-01
- GLSA-201604-01
Modified: 2024-11-21
CVE-2017-2633
An out-of-bounds memory access issue was found in Quick Emulator (QEMU) before 1.7.2 in the VNC display driver. This flaw could occur while refreshing the VNC display surface area in the 'vnc_refresh_server_surface'. A user inside a guest could use this flaw to crash the QEMU process.
- [oss-security] 20170223 CVE-2017-2633 Qemu: VNC: memory corruption due to unchecked resolution limit
- [oss-security] 20170223 CVE-2017-2633 Qemu: VNC: memory corruption due to unchecked resolution limit
- 96417
- 96417
- RHSA-2017:1205
- RHSA-2017:1205
- RHSA-2017:1206
- RHSA-2017:1206
- RHSA-2017:1441
- RHSA-2017:1441
- RHSA-2017:1856
- RHSA-2017:1856
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2633
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2633
- https://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=9f64916da20eea67121d544698676295bbb105a7
- https://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=9f64916da20eea67121d544698676295bbb105a7
- https://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=bea60dd7679364493a0d7f5b54316c767cf894ef
- https://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=bea60dd7679364493a0d7f5b54316c767cf894ef
Closed bugs
Сломался проброс usb
Проблема при обновлении
Closed vulnerabilities
Modified: 2024-11-21
CVE-2015-3276
The nss_parse_ciphers function in libraries/libldap/tls_m.c in OpenLDAP does not properly parse OpenSSL-style multi-keyword mode cipher strings, which might cause a weaker than intended cipher to be used and allow remote attackers to have unspecified impact via unknown vectors.
- RHSA-2015:2131
- RHSA-2015:2131
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 1034221
- 1034221
- https://bugzilla.redhat.com/show_bug.cgi?id=1238322
- https://bugzilla.redhat.com/show_bug.cgi?id=1238322