ALT-BU-2018-3518-1
Branch c7.1 update bulletin.
Closed vulnerabilities
BDU:2016-01066
Уязвимость эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2016-02055
Уязвимость эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2016-02072
Уязвимость эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2017-01031
Уязвимость эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-04-12
CVE-2015-8558
The ehci_process_itd function in hw/usb/hcd-ehci.c in QEMU allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via a circular isochronous transfer descriptor (iTD) list.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=156a2e4dbffa85997636a7a39ef12da6f1b40254
- http://www.debian.org/security/2016/dsa-3469
- http://www.debian.org/security/2016/dsa-3470
- http://www.debian.org/security/2016/dsa-3471
- http://www.openwall.com/lists/oss-security/2015/12/14/16
- http://www.openwall.com/lists/oss-security/2015/12/14/9
- http://www.securityfocus.com/bid/80694
- https://bugzilla.redhat.com/show_bug.cgi?id=1277983
- https://lists.gnu.org/archive/html/qemu-devel/2015-12/msg02124.html
- https://security.gentoo.org/glsa/201602-01
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=156a2e4dbffa85997636a7a39ef12da6f1b40254
- http://www.debian.org/security/2016/dsa-3469
- http://www.debian.org/security/2016/dsa-3470
- http://www.debian.org/security/2016/dsa-3471
- http://www.openwall.com/lists/oss-security/2015/12/14/16
- http://www.openwall.com/lists/oss-security/2015/12/14/9
- http://www.securityfocus.com/bid/80694
- https://bugzilla.redhat.com/show_bug.cgi?id=1277983
- https://lists.gnu.org/archive/html/qemu-devel/2015-12/msg02124.html
- https://security.gentoo.org/glsa/201602-01
Modified: 2025-04-20
CVE-2015-8567
Memory leak in net/vmxnet3.c in QEMU allows remote attackers to cause a denial of service (memory consumption).
- http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176503.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176558.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175967.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176300.html
- http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html
- http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html
- http://www.debian.org/security/2016/dsa-3471
- http://www.openwall.com/lists/oss-security/2015/12/15/10
- http://www.securityfocus.com/bid/79721
- http://www.ubuntu.com/usn/USN-2891-1
- https://lists.gnu.org/archive/html/qemu-devel/2015-12/msg02299.html
- https://security.gentoo.org/glsa/201602-01
- http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176503.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176558.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175967.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176300.html
- http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html
- http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html
- http://www.debian.org/security/2016/dsa-3471
- http://www.openwall.com/lists/oss-security/2015/12/15/10
- http://www.securityfocus.com/bid/79721
- http://www.ubuntu.com/usn/USN-2891-1
- https://lists.gnu.org/archive/html/qemu-devel/2015-12/msg02299.html
- https://security.gentoo.org/glsa/201602-01
Modified: 2025-04-20
CVE-2015-8619
The Human Monitor Interface support in QEMU allows remote attackers to cause a denial of service (out-of-bounds write and application crash).
- http://www.debian.org/security/2016/dsa-3471
- http://www.openwall.com/lists/oss-security/2015/12/23/1
- http://www.securityfocus.com/bid/79668
- https://lists.gnu.org/archive/html/qemu-devel/2015-12/msg02930.html
- https://security.gentoo.org/glsa/201604-01
- http://www.debian.org/security/2016/dsa-3471
- http://www.openwall.com/lists/oss-security/2015/12/23/1
- http://www.securityfocus.com/bid/79668
- https://lists.gnu.org/archive/html/qemu-devel/2015-12/msg02930.html
- https://security.gentoo.org/glsa/201604-01
Modified: 2025-04-12
CVE-2015-8701
QEMU (aka Quick Emulator) built with the Rocker switch emulation support is vulnerable to an off-by-one error. It happens while processing transmit (tx) descriptors in 'tx_consume' routine, if a descriptor was to have more than allowed (ROCKER_TX_FRAGS_MAX=16) fragments. A privileged user inside guest could use this flaw to cause memory leakage on the host or crash the QEMU process instance resulting in DoS issue.
- http://www.openwall.com/lists/oss-security/2015/12/28/6
- http://www.openwall.com/lists/oss-security/2015/12/29/1
- http://www.securityfocus.com/bid/79706
- https://bugzilla.redhat.com/show_bug.cgi?id=1286971
- https://lists.gnu.org/archive/html/qemu-devel/2015-12/msg04629.html
- https://security.gentoo.org/glsa/201602-01
- http://www.openwall.com/lists/oss-security/2015/12/28/6
- http://www.openwall.com/lists/oss-security/2015/12/29/1
- http://www.securityfocus.com/bid/79706
- https://bugzilla.redhat.com/show_bug.cgi?id=1286971
- https://lists.gnu.org/archive/html/qemu-devel/2015-12/msg04629.html
- https://security.gentoo.org/glsa/201602-01
Modified: 2025-04-12
CVE-2016-1568
Use-after-free vulnerability in hw/ide/ahci.c in QEMU, when built with IDE AHCI Emulation support, allows guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via an invalid AHCI Native Command Queuing (NCQ) AIO command.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=4ab0359a8ae182a7ac5c99609667273167703fab
- http://rhn.redhat.com/errata/RHSA-2016-0084.html
- http://rhn.redhat.com/errata/RHSA-2016-0086.html
- http://rhn.redhat.com/errata/RHSA-2016-0087.html
- http://rhn.redhat.com/errata/RHSA-2016-0088.html
- http://www.debian.org/security/2016/dsa-3469
- http://www.debian.org/security/2016/dsa-3470
- http://www.debian.org/security/2016/dsa-3471
- http://www.openwall.com/lists/oss-security/2016/01/09/1
- http://www.openwall.com/lists/oss-security/2016/01/09/2
- http://www.securityfocus.com/bid/80191
- http://www.securitytracker.com/id/1034859
- https://security.gentoo.org/glsa/201602-01
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=4ab0359a8ae182a7ac5c99609667273167703fab
- http://rhn.redhat.com/errata/RHSA-2016-0084.html
- http://rhn.redhat.com/errata/RHSA-2016-0086.html
- http://rhn.redhat.com/errata/RHSA-2016-0087.html
- http://rhn.redhat.com/errata/RHSA-2016-0088.html
- http://www.debian.org/security/2016/dsa-3469
- http://www.debian.org/security/2016/dsa-3470
- http://www.debian.org/security/2016/dsa-3471
- http://www.openwall.com/lists/oss-security/2016/01/09/1
- http://www.openwall.com/lists/oss-security/2016/01/09/2
- http://www.securityfocus.com/bid/80191
- http://www.securitytracker.com/id/1034859
- https://security.gentoo.org/glsa/201602-01
Modified: 2025-04-12
CVE-2016-1922
QEMU (aka Quick Emulator) built with the TPR optimization for 32-bit Windows guests support is vulnerable to a null pointer dereference flaw. It occurs while doing I/O port write operations via hmp interface. In that, 'current_cpu' remains null, which leads to the null pointer dereference. A user or process could use this flaw to crash the QEMU instance, resulting in DoS issue.
- http://www.debian.org/security/2016/dsa-3469
- http://www.debian.org/security/2016/dsa-3470
- http://www.debian.org/security/2016/dsa-3471
- http://www.openwall.com/lists/oss-security/2016/01/16/1
- http://www.openwall.com/lists/oss-security/2016/01/16/6
- http://www.securityfocus.com/bid/81058
- https://bugzilla.redhat.com/show_bug.cgi?id=1283934
- https://lists.gnu.org/archive/html/qemu-devel/2016-01/msg02812.html
- https://security.gentoo.org/glsa/201604-01
- http://www.debian.org/security/2016/dsa-3469
- http://www.debian.org/security/2016/dsa-3470
- http://www.debian.org/security/2016/dsa-3471
- http://www.openwall.com/lists/oss-security/2016/01/16/1
- http://www.openwall.com/lists/oss-security/2016/01/16/6
- http://www.securityfocus.com/bid/81058
- https://bugzilla.redhat.com/show_bug.cgi?id=1283934
- https://lists.gnu.org/archive/html/qemu-devel/2016-01/msg02812.html
- https://security.gentoo.org/glsa/201604-01
Modified: 2025-04-12
CVE-2016-1981
QEMU (aka Quick Emulator) built with the e1000 NIC emulation support is vulnerable to an infinite loop issue. It could occur while processing data via transmit or receive descriptors, provided the initial receive/transmit descriptor head (TDH/RDH) is set outside the allocated descriptor buffer. A privileged user inside guest could use this flaw to crash the QEMU instance resulting in DoS.
- http://rhn.redhat.com/errata/RHSA-2016-2585.html
- http://www.debian.org/security/2016/dsa-3469
- http://www.debian.org/security/2016/dsa-3470
- http://www.debian.org/security/2016/dsa-3471
- http://www.openwall.com/lists/oss-security/2016/01/19/10
- http://www.openwall.com/lists/oss-security/2016/01/22/1
- http://www.securityfocus.com/bid/81549
- https://bugzilla.redhat.com/show_bug.cgi?id=1298570
- https://lists.gnu.org/archive/html/qemu-devel/2016-01/msg03454.html
- https://security.gentoo.org/glsa/201604-01
- http://rhn.redhat.com/errata/RHSA-2016-2585.html
- http://www.debian.org/security/2016/dsa-3469
- http://www.debian.org/security/2016/dsa-3470
- http://www.debian.org/security/2016/dsa-3471
- http://www.openwall.com/lists/oss-security/2016/01/19/10
- http://www.openwall.com/lists/oss-security/2016/01/22/1
- http://www.securityfocus.com/bid/81549
- https://bugzilla.redhat.com/show_bug.cgi?id=1298570
- https://lists.gnu.org/archive/html/qemu-devel/2016-01/msg03454.html
- https://security.gentoo.org/glsa/201604-01
Modified: 2025-04-12
CVE-2016-2197
QEMU (aka Quick Emulator) built with an IDE AHCI emulation support is vulnerable to a null pointer dereference flaw. It occurs while unmapping the Frame Information Structure (FIS) and Command List Block (CLB) entries. A privileged user inside guest could use this flaw to crash the QEMU process instance resulting in DoS.
- http://www.openwall.com/lists/oss-security/2016/01/29/2
- http://www.openwall.com/lists/oss-security/2016/01/30/1
- http://www.securityfocus.com/bid/82235
- https://bugzilla.redhat.com/show_bug.cgi?id=1302057
- https://lists.gnu.org/archive/html/qemu-devel/2016-01/msg05742.html
- https://security.gentoo.org/glsa/201604-01
- http://www.openwall.com/lists/oss-security/2016/01/29/2
- http://www.openwall.com/lists/oss-security/2016/01/30/1
- http://www.securityfocus.com/bid/82235
- https://bugzilla.redhat.com/show_bug.cgi?id=1302057
- https://lists.gnu.org/archive/html/qemu-devel/2016-01/msg05742.html
- https://security.gentoo.org/glsa/201604-01
Modified: 2025-04-12
CVE-2016-2198
QEMU (aka Quick Emulator) built with the USB EHCI emulation support is vulnerable to a null pointer dereference flaw. It could occur when an application attempts to write to EHCI capabilities registers. A privileged user inside quest could use this flaw to crash the QEMU process instance resulting in DoS.
- http://www.openwall.com/lists/oss-security/2016/01/29/6
- http://www.openwall.com/lists/oss-security/2016/01/30/2
- https://bugzilla.redhat.com/show_bug.cgi?id=1301643
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-01/msg05899.html
- https://security.gentoo.org/glsa/201604-01
- http://www.openwall.com/lists/oss-security/2016/01/29/6
- http://www.openwall.com/lists/oss-security/2016/01/30/2
- https://bugzilla.redhat.com/show_bug.cgi?id=1301643
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-01/msg05899.html
- https://security.gentoo.org/glsa/201604-01
Modified: 2025-04-12
CVE-2016-2391
The ohci_bus_start function in the USB OHCI emulation support (hw/usb/hcd-ohci.c) in QEMU allows local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors related to multiple eof_timers.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=fa1298c2d623522eda7b4f1f721fcb935abb7360
- http://www.openwall.com/lists/oss-security/2016/02/16/2
- http://www.securityfocus.com/bid/83263
- http://www.ubuntu.com/usn/USN-2974-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1304794
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-02/msg03374.html
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=fa1298c2d623522eda7b4f1f721fcb935abb7360
- http://www.openwall.com/lists/oss-security/2016/02/16/2
- http://www.securityfocus.com/bid/83263
- http://www.ubuntu.com/usn/USN-2974-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1304794
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-02/msg03374.html
Modified: 2025-04-12
CVE-2016-2857
The net_checksum_calculate function in net/checksum.c in QEMU allows local guest OS users to cause a denial of service (out-of-bounds heap read and crash) via the payload length in a crafted packet.
- http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=362786f14a753d8a5256ef97d7c10ed576d6572b
- http://rhn.redhat.com/errata/RHSA-2016-2670.html
- http://rhn.redhat.com/errata/RHSA-2016-2671.html
- http://rhn.redhat.com/errata/RHSA-2016-2704.html
- http://rhn.redhat.com/errata/RHSA-2016-2705.html
- http://rhn.redhat.com/errata/RHSA-2016-2706.html
- http://rhn.redhat.com/errata/RHSA-2017-0083.html
- http://rhn.redhat.com/errata/RHSA-2017-0309.html
- http://rhn.redhat.com/errata/RHSA-2017-0334.html
- http://rhn.redhat.com/errata/RHSA-2017-0344.html
- http://rhn.redhat.com/errata/RHSA-2017-0350.html
- http://www.openwall.com/lists/oss-security/2016/03/03/9
- http://www.openwall.com/lists/oss-security/2016/03/07/3
- http://www.securityfocus.com/bid/84130
- http://www.ubuntu.com/usn/USN-2974-1
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=362786f14a753d8a5256ef97d7c10ed576d6572b
- http://rhn.redhat.com/errata/RHSA-2016-2670.html
- http://rhn.redhat.com/errata/RHSA-2016-2671.html
- http://rhn.redhat.com/errata/RHSA-2016-2704.html
- http://rhn.redhat.com/errata/RHSA-2016-2705.html
- http://rhn.redhat.com/errata/RHSA-2016-2706.html
- http://rhn.redhat.com/errata/RHSA-2017-0083.html
- http://rhn.redhat.com/errata/RHSA-2017-0309.html
- http://rhn.redhat.com/errata/RHSA-2017-0334.html
- http://rhn.redhat.com/errata/RHSA-2017-0344.html
- http://rhn.redhat.com/errata/RHSA-2017-0350.html
- http://www.openwall.com/lists/oss-security/2016/03/03/9
- http://www.openwall.com/lists/oss-security/2016/03/07/3
- http://www.securityfocus.com/bid/84130
- http://www.ubuntu.com/usn/USN-2974-1
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
Modified: 2025-04-12
CVE-2016-2858
QEMU, when built with the Pseudo Random Number Generator (PRNG) back-end support, allows local guest OS users to cause a denial of service (process crash) via an entropy request, which triggers arbitrary stack based allocation and memory corruption.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=60253ed1e6ec6d8e5ef2efe7bf755f475dce9956
- http://www.openwall.com/lists/oss-security/2016/03/04/1
- http://www.openwall.com/lists/oss-security/2016/03/07/4
- http://www.securityfocus.com/bid/84134
- http://www.ubuntu.com/usn/USN-2974-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1314676
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://security.gentoo.org/glsa/201604-01
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=60253ed1e6ec6d8e5ef2efe7bf755f475dce9956
- http://www.openwall.com/lists/oss-security/2016/03/04/1
- http://www.openwall.com/lists/oss-security/2016/03/07/4
- http://www.securityfocus.com/bid/84134
- http://www.ubuntu.com/usn/USN-2974-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1314676
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://security.gentoo.org/glsa/201604-01
Modified: 2025-04-12
CVE-2016-3710
The VGA module in QEMU improperly performs bounds checking on banked access to video memory, which allows local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the "Dark Portal" issue.
- http://rhn.redhat.com/errata/RHSA-2016-0724.html
- http://rhn.redhat.com/errata/RHSA-2016-0725.html
- http://rhn.redhat.com/errata/RHSA-2016-0997.html
- http://rhn.redhat.com/errata/RHSA-2016-0999.html
- http://rhn.redhat.com/errata/RHSA-2016-1000.html
- http://rhn.redhat.com/errata/RHSA-2016-1001.html
- http://rhn.redhat.com/errata/RHSA-2016-1002.html
- http://rhn.redhat.com/errata/RHSA-2016-1019.html
- http://rhn.redhat.com/errata/RHSA-2016-1943.html
- http://support.citrix.com/article/CTX212736
- http://www.debian.org/security/2016/dsa-3573
- http://www.openwall.com/lists/oss-security/2016/05/09/3
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.securityfocus.com/bid/90316
- http://www.securitytracker.com/id/1035794
- http://www.ubuntu.com/usn/USN-2974-1
- http://xenbits.xen.org/xsa/advisory-179.html
- https://access.redhat.com/errata/RHSA-2016:1224
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05164862
- https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg01197.html
- http://rhn.redhat.com/errata/RHSA-2016-0724.html
- http://rhn.redhat.com/errata/RHSA-2016-0725.html
- http://rhn.redhat.com/errata/RHSA-2016-0997.html
- http://rhn.redhat.com/errata/RHSA-2016-0999.html
- http://rhn.redhat.com/errata/RHSA-2016-1000.html
- http://rhn.redhat.com/errata/RHSA-2016-1001.html
- http://rhn.redhat.com/errata/RHSA-2016-1002.html
- http://rhn.redhat.com/errata/RHSA-2016-1019.html
- http://rhn.redhat.com/errata/RHSA-2016-1943.html
- http://support.citrix.com/article/CTX212736
- http://www.debian.org/security/2016/dsa-3573
- http://www.openwall.com/lists/oss-security/2016/05/09/3
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.securityfocus.com/bid/90316
- http://www.securitytracker.com/id/1035794
- http://www.ubuntu.com/usn/USN-2974-1
- http://xenbits.xen.org/xsa/advisory-179.html
- https://access.redhat.com/errata/RHSA-2016:1224
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05164862
- https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg01197.html
Modified: 2025-04-12
CVE-2016-3712
Integer overflow in the VGA module in QEMU allows local guest OS users to cause a denial of service (out-of-bounds read and QEMU process crash) by editing VGA registers in VBE mode.
- http://rhn.redhat.com/errata/RHSA-2016-2585.html
- http://rhn.redhat.com/errata/RHSA-2017-0621.html
- http://support.citrix.com/article/CTX212736
- http://www.debian.org/security/2016/dsa-3573
- http://www.openwall.com/lists/oss-security/2016/05/09/4
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.securityfocus.com/bid/90314
- http://www.securitytracker.com/id/1035794
- http://www.ubuntu.com/usn/USN-2974-1
- http://xenbits.xen.org/xsa/advisory-179.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg01196.html
- http://rhn.redhat.com/errata/RHSA-2016-2585.html
- http://rhn.redhat.com/errata/RHSA-2017-0621.html
- http://support.citrix.com/article/CTX212736
- http://www.debian.org/security/2016/dsa-3573
- http://www.openwall.com/lists/oss-security/2016/05/09/4
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.securityfocus.com/bid/90314
- http://www.securitytracker.com/id/1035794
- http://www.ubuntu.com/usn/USN-2974-1
- http://xenbits.xen.org/xsa/advisory-179.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg01196.html
Modified: 2025-04-12
CVE-2016-4001
Buffer overflow in the stellaris_enet_receive function in hw/net/stellaris_enet.c in QEMU, when the Stellaris ethernet controller is configured to accept large packets, allows remote attackers to cause a denial of service (QEMU crash) via a large packet.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=3a15cc0e1ee7168db0782133d2607a6bfa422d66
- http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183275.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183350.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184209.html
- http://www.openwall.com/lists/oss-security/2016/04/11/4
- http://www.openwall.com/lists/oss-security/2016/04/12/6
- http://www.securityfocus.com/bid/85976
- http://www.ubuntu.com/usn/USN-2974-1
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-04/msg01334.html
- https://security.gentoo.org/glsa/201609-01
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=3a15cc0e1ee7168db0782133d2607a6bfa422d66
- http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183275.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183350.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184209.html
- http://www.openwall.com/lists/oss-security/2016/04/11/4
- http://www.openwall.com/lists/oss-security/2016/04/12/6
- http://www.securityfocus.com/bid/85976
- http://www.ubuntu.com/usn/USN-2974-1
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-04/msg01334.html
- https://security.gentoo.org/glsa/201609-01
Modified: 2025-04-12
CVE-2016-4439
The esp_reg_write function in hw/scsi/esp.c in the 53C9X Fast SCSI Controller (FSC) support in QEMU does not properly check command buffer length, which allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or potentially execute arbitrary code on the QEMU host via unspecified vectors.
- http://www.openwall.com/lists/oss-security/2016/05/19/3
- http://www.securityfocus.com/bid/90760
- http://www.ubuntu.com/usn/USN-3047-1
- http://www.ubuntu.com/usn/USN-3047-2
- https://bugzilla.redhat.com/show_bug.cgi?id=1337502
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg03273.html
- https://security.gentoo.org/glsa/201609-01
- http://www.openwall.com/lists/oss-security/2016/05/19/3
- http://www.securityfocus.com/bid/90760
- http://www.ubuntu.com/usn/USN-3047-1
- http://www.ubuntu.com/usn/USN-3047-2
- https://bugzilla.redhat.com/show_bug.cgi?id=1337502
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg03273.html
- https://security.gentoo.org/glsa/201609-01
Modified: 2025-04-12
CVE-2016-4441
The get_cmd function in hw/scsi/esp.c in the 53C9X Fast SCSI Controller (FSC) support in QEMU does not properly check DMA length, which allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via unspecified vectors, involving an SCSI command.
- http://www.openwall.com/lists/oss-security/2016/05/19/4
- http://www.securityfocus.com/bid/90762
- http://www.ubuntu.com/usn/USN-3047-1
- http://www.ubuntu.com/usn/USN-3047-2
- https://bugzilla.redhat.com/show_bug.cgi?id=1337505
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg03274.html
- https://security.gentoo.org/glsa/201609-01
- http://www.openwall.com/lists/oss-security/2016/05/19/4
- http://www.securityfocus.com/bid/90762
- http://www.ubuntu.com/usn/USN-3047-1
- http://www.ubuntu.com/usn/USN-3047-2
- https://bugzilla.redhat.com/show_bug.cgi?id=1337505
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg03274.html
- https://security.gentoo.org/glsa/201609-01
Modified: 2025-04-12
CVE-2016-4453
The vmsvga_fifo_run function in hw/display/vmware_vga.c in QEMU allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a VGA command.
- http://www.openwall.com/lists/oss-security/2016/05/30/2
- http://www.securityfocus.com/bid/90928
- http://www.ubuntu.com/usn/USN-3047-1
- http://www.ubuntu.com/usn/USN-3047-2
- https://bugzilla.redhat.com/show_bug.cgi?id=1336650
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg05270.html
- https://security.gentoo.org/glsa/201609-01
- http://www.openwall.com/lists/oss-security/2016/05/30/2
- http://www.securityfocus.com/bid/90928
- http://www.ubuntu.com/usn/USN-3047-1
- http://www.ubuntu.com/usn/USN-3047-2
- https://bugzilla.redhat.com/show_bug.cgi?id=1336650
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg05270.html
- https://security.gentoo.org/glsa/201609-01
Modified: 2025-04-12
CVE-2016-4454
The vmsvga_fifo_read_raw function in hw/display/vmware_vga.c in QEMU allows local guest OS administrators to obtain sensitive host memory information or cause a denial of service (QEMU process crash) by changing FIFO registers and issuing a VGA command, which triggers an out-of-bounds read.
- http://www.openwall.com/lists/oss-security/2016/05/30/3
- http://www.securityfocus.com/bid/90927
- http://www.ubuntu.com/usn/USN-3047-1
- http://www.ubuntu.com/usn/USN-3047-2
- https://bugzilla.redhat.com/show_bug.cgi?id=1336429
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg05271.html
- https://security.gentoo.org/glsa/201609-01
- http://www.openwall.com/lists/oss-security/2016/05/30/3
- http://www.securityfocus.com/bid/90927
- http://www.ubuntu.com/usn/USN-3047-1
- http://www.ubuntu.com/usn/USN-3047-2
- https://bugzilla.redhat.com/show_bug.cgi?id=1336429
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg05271.html
- https://security.gentoo.org/glsa/201609-01
Modified: 2025-04-12
CVE-2016-4952
QEMU (aka Quick Emulator), when built with VMWARE PVSCSI paravirtual SCSI bus emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds array access) via vectors related to the (1) PVSCSI_CMD_SETUP_RINGS or (2) PVSCSI_CMD_SETUP_MSG_RING SCSI command.
- http://www.openwall.com/lists/oss-security/2016/05/23/1
- http://www.openwall.com/lists/oss-security/2016/05/23/4
- http://www.ubuntu.com/usn/USN-3047-1
- http://www.ubuntu.com/usn/USN-3047-2
- https://bugzilla.redhat.com/show_bug.cgi?id=1334384
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg03774.html
- http://www.openwall.com/lists/oss-security/2016/05/23/1
- http://www.openwall.com/lists/oss-security/2016/05/23/4
- http://www.ubuntu.com/usn/USN-3047-1
- http://www.ubuntu.com/usn/USN-3047-2
- https://bugzilla.redhat.com/show_bug.cgi?id=1334384
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg03774.html
Modified: 2025-04-12
CVE-2016-5403
The virtqueue_pop function in hw/virtio/virtio.c in QEMU allows local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by submitting requests without waiting for completion.
- http://rhn.redhat.com/errata/RHSA-2016-1585.html
- http://rhn.redhat.com/errata/RHSA-2016-1586.html
- http://rhn.redhat.com/errata/RHSA-2016-1606.html
- http://rhn.redhat.com/errata/RHSA-2016-1607.html
- http://rhn.redhat.com/errata/RHSA-2016-1652.html
- http://rhn.redhat.com/errata/RHSA-2016-1653.html
- http://rhn.redhat.com/errata/RHSA-2016-1654.html
- http://rhn.redhat.com/errata/RHSA-2016-1655.html
- http://rhn.redhat.com/errata/RHSA-2016-1756.html
- http://rhn.redhat.com/errata/RHSA-2016-1763.html
- http://rhn.redhat.com/errata/RHSA-2016-1943.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.securityfocus.com/bid/92148
- http://www.securitytracker.com/id/1036476
- http://www.ubuntu.com/usn/USN-3047-1
- http://www.ubuntu.com/usn/USN-3047-2
- http://xenbits.xen.org/xsa/advisory-184.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1358359
- https://lists.debian.org/debian-lts-announce/2019/09/msg00021.html
- http://rhn.redhat.com/errata/RHSA-2016-1585.html
- http://rhn.redhat.com/errata/RHSA-2016-1586.html
- http://rhn.redhat.com/errata/RHSA-2016-1606.html
- http://rhn.redhat.com/errata/RHSA-2016-1607.html
- http://rhn.redhat.com/errata/RHSA-2016-1652.html
- http://rhn.redhat.com/errata/RHSA-2016-1653.html
- http://rhn.redhat.com/errata/RHSA-2016-1654.html
- http://rhn.redhat.com/errata/RHSA-2016-1655.html
- http://rhn.redhat.com/errata/RHSA-2016-1756.html
- http://rhn.redhat.com/errata/RHSA-2016-1763.html
- http://rhn.redhat.com/errata/RHSA-2016-1943.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.securityfocus.com/bid/92148
- http://www.securitytracker.com/id/1036476
- http://www.ubuntu.com/usn/USN-3047-1
- http://www.ubuntu.com/usn/USN-3047-2
- http://xenbits.xen.org/xsa/advisory-184.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1358359
- https://lists.debian.org/debian-lts-announce/2019/09/msg00021.html
Modified: 2025-04-12
CVE-2016-6835
The vmxnet_tx_pkt_parse_headers function in hw/net/vmxnet_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (buffer over-read) by leveraging failure to check IP header length.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=93060258ae748573ca7197204125a2670047896d
- http://www.openwall.com/lists/oss-security/2016/08/11/7
- http://www.openwall.com/lists/oss-security/2016/08/18/4
- https://access.redhat.com/errata/RHSA-2017:2392
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
- https://lists.gnu.org/archive/html/qemu-stable/2016-08/msg00077.html
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=93060258ae748573ca7197204125a2670047896d
- http://www.openwall.com/lists/oss-security/2016/08/11/7
- http://www.openwall.com/lists/oss-security/2016/08/18/4
- https://access.redhat.com/errata/RHSA-2017:2392
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
- https://lists.gnu.org/archive/html/qemu-stable/2016-08/msg00077.html
Package kernel-image-un-def updated to version 4.9.133-alt0.M70C.1 for branch c7.1 in task 215002.
Closed vulnerabilities
BDU:2019-01057
Уязвимость функции ext4_xattr_set_entry() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01058
Уязвимость функции ext4_update_inline_data() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-03459
Уязвимость функции fd_locked_ioctl ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2020-00735
Уязвимость функции xenvif_set_hash_mapping гипервизора Xen, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность
Modified: 2024-11-21
CVE-2018-10879
A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause a use-after-free in ext4_xattr_set_entry function and a denial of service or unspecified other impact may occur by renaming a file in a crafted ext4 filesystem image.
- http://patchwork.ozlabs.org/patch/928666/
- http://patchwork.ozlabs.org/patch/928667/
- http://www.securityfocus.com/bid/104902
- https://access.redhat.com/errata/RHSA-2018:2948
- https://access.redhat.com/errata/RHSA-2018:3083
- https://access.redhat.com/errata/RHSA-2018:3096
- https://bugzilla.kernel.org/show_bug.cgi?id=200001
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10879
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=513f86d73855ce556ea9522b6bfd79f87356dc3a
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5369a762c882c0b6e9599e4ebbb3a9ba9eee7e2d
- https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
- https://usn.ubuntu.com/3753-1/
- https://usn.ubuntu.com/3753-2/
- https://usn.ubuntu.com/3871-1/
- https://usn.ubuntu.com/3871-3/
- https://usn.ubuntu.com/3871-4/
- https://usn.ubuntu.com/3871-5/
- http://patchwork.ozlabs.org/patch/928666/
- http://patchwork.ozlabs.org/patch/928667/
- http://www.securityfocus.com/bid/104902
- https://access.redhat.com/errata/RHSA-2018:2948
- https://access.redhat.com/errata/RHSA-2018:3083
- https://access.redhat.com/errata/RHSA-2018:3096
- https://bugzilla.kernel.org/show_bug.cgi?id=200001
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10879
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=513f86d73855ce556ea9522b6bfd79f87356dc3a
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5369a762c882c0b6e9599e4ebbb3a9ba9eee7e2d
- https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
- https://usn.ubuntu.com/3753-1/
- https://usn.ubuntu.com/3753-2/
- https://usn.ubuntu.com/3871-1/
- https://usn.ubuntu.com/3871-3/
- https://usn.ubuntu.com/3871-4/
- https://usn.ubuntu.com/3871-5/
Modified: 2024-11-21
CVE-2018-10880
Linux kernel is vulnerable to a stack-out-of-bounds write in the ext4 filesystem code when mounting and writing to a crafted ext4 image in ext4_update_inline_data(). An attacker could use this to cause a system crash and a denial of service.
- http://patchwork.ozlabs.org/patch/930639/
- http://www.securityfocus.com/bid/104907
- http://www.securityfocus.com/bid/106503
- https://access.redhat.com/errata/RHSA-2018:2948
- https://bugzilla.kernel.org/show_bug.cgi?id=200005
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10880
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cdb5240ec5928b20490a2bb34cb87e9a5f40226
- https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
- https://usn.ubuntu.com/3821-1/
- https://usn.ubuntu.com/3821-2/
- https://usn.ubuntu.com/3871-1/
- https://usn.ubuntu.com/3871-3/
- https://usn.ubuntu.com/3871-4/
- https://usn.ubuntu.com/3871-5/
- http://patchwork.ozlabs.org/patch/930639/
- http://www.securityfocus.com/bid/104907
- http://www.securityfocus.com/bid/106503
- https://access.redhat.com/errata/RHSA-2018:2948
- https://bugzilla.kernel.org/show_bug.cgi?id=200005
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10880
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cdb5240ec5928b20490a2bb34cb87e9a5f40226
- https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
- https://usn.ubuntu.com/3821-1/
- https://usn.ubuntu.com/3821-2/
- https://usn.ubuntu.com/3871-1/
- https://usn.ubuntu.com/3871-3/
- https://usn.ubuntu.com/3871-4/
- https://usn.ubuntu.com/3871-5/
Modified: 2024-11-21
CVE-2018-15471
An issue was discovered in xenvif_set_hash_mapping in drivers/net/xen-netback/hash.c in the Linux kernel through 4.18.1, as used in Xen through 4.11.x and other products. The Linux netback driver allows frontends to control mapping of requests to request queues. When processing a request to set or change this mapping, some input validation (e.g., for an integer overflow) was missing or flawed, leading to OOB access in hash handling. A malicious or buggy frontend may cause the (usually privileged) backend to make out of bounds memory accesses, potentially resulting in one or more of privilege escalation, Denial of Service (DoS), or information leaks.
- http://xenbits.xen.org/xsa/advisory-270.html
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1607
- https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html
- https://usn.ubuntu.com/3819-1/
- https://usn.ubuntu.com/3820-1/
- https://usn.ubuntu.com/3820-2/
- https://usn.ubuntu.com/3820-3/
- https://www.debian.org/security/2018/dsa-4313
- http://xenbits.xen.org/xsa/advisory-270.html
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1607
- https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html
- https://usn.ubuntu.com/3819-1/
- https://usn.ubuntu.com/3820-1/
- https://usn.ubuntu.com/3820-2/
- https://usn.ubuntu.com/3820-3/
- https://www.debian.org/security/2018/dsa-4313
Modified: 2024-11-21
CVE-2018-7755
An issue was discovered in the fd_locked_ioctl function in drivers/block/floppy.c in the Linux kernel through 4.15.7. The floppy driver will copy a kernel pointer to user memory in response to the FDGETPRM ioctl. An attacker can send the FDGETPRM ioctl and use the obtained kernel pointer to discover the location of kernel code and data and bypass kernel security protections such as KASLR.
- https://access.redhat.com/errata/RHSA-2019:2029
- https://access.redhat.com/errata/RHSA-2019:2043
- https://lists.debian.org/debian-lts-announce/2018/10/msg00003.html
- https://lkml.org/lkml/2018/3/7/1116
- https://usn.ubuntu.com/3695-1/
- https://usn.ubuntu.com/3695-2/
- https://usn.ubuntu.com/3696-1/
- https://usn.ubuntu.com/3696-2/
- https://usn.ubuntu.com/3697-1/
- https://usn.ubuntu.com/3697-2/
- https://usn.ubuntu.com/3698-1/
- https://usn.ubuntu.com/3698-2/
- https://www.debian.org/security/2018/dsa-4308
- https://access.redhat.com/errata/RHSA-2019:2029
- https://access.redhat.com/errata/RHSA-2019:2043
- https://lists.debian.org/debian-lts-announce/2018/10/msg00003.html
- https://lkml.org/lkml/2018/3/7/1116
- https://usn.ubuntu.com/3695-1/
- https://usn.ubuntu.com/3695-2/
- https://usn.ubuntu.com/3696-1/
- https://usn.ubuntu.com/3696-2/
- https://usn.ubuntu.com/3697-1/
- https://usn.ubuntu.com/3697-2/
- https://usn.ubuntu.com/3698-1/
- https://usn.ubuntu.com/3698-2/
- https://www.debian.org/security/2018/dsa-4308
Package kernel-image-std-def updated to version 4.4.161-alt0.M70C.1 for branch c7.1 in task 215007.
Closed vulnerabilities
BDU:2019-01057
Уязвимость функции ext4_xattr_set_entry() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01058
Уязвимость функции ext4_update_inline_data() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01738
Уязвимость функции chap_server_compute_md5() реализации протокола ISCSI ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании или получить доступ к защищаемой информации
BDU:2019-03459
Уязвимость функции fd_locked_ioctl ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию
Modified: 2024-11-21
CVE-2018-10879
A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause a use-after-free in ext4_xattr_set_entry function and a denial of service or unspecified other impact may occur by renaming a file in a crafted ext4 filesystem image.
- http://patchwork.ozlabs.org/patch/928666/
- http://patchwork.ozlabs.org/patch/928667/
- http://www.securityfocus.com/bid/104902
- https://access.redhat.com/errata/RHSA-2018:2948
- https://access.redhat.com/errata/RHSA-2018:3083
- https://access.redhat.com/errata/RHSA-2018:3096
- https://bugzilla.kernel.org/show_bug.cgi?id=200001
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10879
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=513f86d73855ce556ea9522b6bfd79f87356dc3a
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5369a762c882c0b6e9599e4ebbb3a9ba9eee7e2d
- https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
- https://usn.ubuntu.com/3753-1/
- https://usn.ubuntu.com/3753-2/
- https://usn.ubuntu.com/3871-1/
- https://usn.ubuntu.com/3871-3/
- https://usn.ubuntu.com/3871-4/
- https://usn.ubuntu.com/3871-5/
- http://patchwork.ozlabs.org/patch/928666/
- http://patchwork.ozlabs.org/patch/928667/
- http://www.securityfocus.com/bid/104902
- https://access.redhat.com/errata/RHSA-2018:2948
- https://access.redhat.com/errata/RHSA-2018:3083
- https://access.redhat.com/errata/RHSA-2018:3096
- https://bugzilla.kernel.org/show_bug.cgi?id=200001
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10879
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=513f86d73855ce556ea9522b6bfd79f87356dc3a
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5369a762c882c0b6e9599e4ebbb3a9ba9eee7e2d
- https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
- https://usn.ubuntu.com/3753-1/
- https://usn.ubuntu.com/3753-2/
- https://usn.ubuntu.com/3871-1/
- https://usn.ubuntu.com/3871-3/
- https://usn.ubuntu.com/3871-4/
- https://usn.ubuntu.com/3871-5/
Modified: 2024-11-21
CVE-2018-10880
Linux kernel is vulnerable to a stack-out-of-bounds write in the ext4 filesystem code when mounting and writing to a crafted ext4 image in ext4_update_inline_data(). An attacker could use this to cause a system crash and a denial of service.
- http://patchwork.ozlabs.org/patch/930639/
- http://www.securityfocus.com/bid/104907
- http://www.securityfocus.com/bid/106503
- https://access.redhat.com/errata/RHSA-2018:2948
- https://bugzilla.kernel.org/show_bug.cgi?id=200005
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10880
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cdb5240ec5928b20490a2bb34cb87e9a5f40226
- https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
- https://usn.ubuntu.com/3821-1/
- https://usn.ubuntu.com/3821-2/
- https://usn.ubuntu.com/3871-1/
- https://usn.ubuntu.com/3871-3/
- https://usn.ubuntu.com/3871-4/
- https://usn.ubuntu.com/3871-5/
- http://patchwork.ozlabs.org/patch/930639/
- http://www.securityfocus.com/bid/104907
- http://www.securityfocus.com/bid/106503
- https://access.redhat.com/errata/RHSA-2018:2948
- https://bugzilla.kernel.org/show_bug.cgi?id=200005
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10880
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cdb5240ec5928b20490a2bb34cb87e9a5f40226
- https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
- https://usn.ubuntu.com/3821-1/
- https://usn.ubuntu.com/3821-2/
- https://usn.ubuntu.com/3871-1/
- https://usn.ubuntu.com/3871-3/
- https://usn.ubuntu.com/3871-4/
- https://usn.ubuntu.com/3871-5/
Modified: 2024-11-21
CVE-2018-14633
A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. Kernel versions 4.18.x, 4.14.x and 3.10.x are believed to be vulnerable.
- http://www.securityfocus.com/bid/105388
- https://access.redhat.com/errata/RHSA-2018:3651
- https://access.redhat.com/errata/RHSA-2018:3666
- https://access.redhat.com/errata/RHSA-2019:1946
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14633
- https://git.kernel.org/pub/scm/linux/kernel/git/mkp/scsi.git/commit/?h=4.19/scsi-fixes&id=1816494330a83f2a064499d8ed2797045641f92c
- https://git.kernel.org/pub/scm/linux/kernel/git/mkp/scsi.git/commit/?h=4.19/scsi-fixes&id=8c39e2699f8acb2e29782a834e56306da24937fe
- https://lists.debian.org/debian-lts-announce/2018/10/msg00003.html
- https://seclists.org/oss-sec/2018/q3/270
- https://usn.ubuntu.com/3775-1/
- https://usn.ubuntu.com/3775-2/
- https://usn.ubuntu.com/3776-1/
- https://usn.ubuntu.com/3776-2/
- https://usn.ubuntu.com/3777-1/
- https://usn.ubuntu.com/3777-2/
- https://usn.ubuntu.com/3777-3/
- https://usn.ubuntu.com/3779-1/
- https://www.debian.org/security/2018/dsa-4308
- http://www.securityfocus.com/bid/105388
- https://access.redhat.com/errata/RHSA-2018:3651
- https://access.redhat.com/errata/RHSA-2018:3666
- https://access.redhat.com/errata/RHSA-2019:1946
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14633
- https://git.kernel.org/pub/scm/linux/kernel/git/mkp/scsi.git/commit/?h=4.19/scsi-fixes&id=1816494330a83f2a064499d8ed2797045641f92c
- https://git.kernel.org/pub/scm/linux/kernel/git/mkp/scsi.git/commit/?h=4.19/scsi-fixes&id=8c39e2699f8acb2e29782a834e56306da24937fe
- https://lists.debian.org/debian-lts-announce/2018/10/msg00003.html
- https://seclists.org/oss-sec/2018/q3/270
- https://usn.ubuntu.com/3775-1/
- https://usn.ubuntu.com/3775-2/
- https://usn.ubuntu.com/3776-1/
- https://usn.ubuntu.com/3776-2/
- https://usn.ubuntu.com/3777-1/
- https://usn.ubuntu.com/3777-2/
- https://usn.ubuntu.com/3777-3/
- https://usn.ubuntu.com/3779-1/
- https://www.debian.org/security/2018/dsa-4308
Modified: 2024-11-21
CVE-2018-7755
An issue was discovered in the fd_locked_ioctl function in drivers/block/floppy.c in the Linux kernel through 4.15.7. The floppy driver will copy a kernel pointer to user memory in response to the FDGETPRM ioctl. An attacker can send the FDGETPRM ioctl and use the obtained kernel pointer to discover the location of kernel code and data and bypass kernel security protections such as KASLR.
- https://access.redhat.com/errata/RHSA-2019:2029
- https://access.redhat.com/errata/RHSA-2019:2043
- https://lists.debian.org/debian-lts-announce/2018/10/msg00003.html
- https://lkml.org/lkml/2018/3/7/1116
- https://usn.ubuntu.com/3695-1/
- https://usn.ubuntu.com/3695-2/
- https://usn.ubuntu.com/3696-1/
- https://usn.ubuntu.com/3696-2/
- https://usn.ubuntu.com/3697-1/
- https://usn.ubuntu.com/3697-2/
- https://usn.ubuntu.com/3698-1/
- https://usn.ubuntu.com/3698-2/
- https://www.debian.org/security/2018/dsa-4308
- https://access.redhat.com/errata/RHSA-2019:2029
- https://access.redhat.com/errata/RHSA-2019:2043
- https://lists.debian.org/debian-lts-announce/2018/10/msg00003.html
- https://lkml.org/lkml/2018/3/7/1116
- https://usn.ubuntu.com/3695-1/
- https://usn.ubuntu.com/3695-2/
- https://usn.ubuntu.com/3696-1/
- https://usn.ubuntu.com/3696-2/
- https://usn.ubuntu.com/3697-1/
- https://usn.ubuntu.com/3697-2/
- https://usn.ubuntu.com/3698-1/
- https://usn.ubuntu.com/3698-2/
- https://www.debian.org/security/2018/dsa-4308