ALT-PU-2015-1865-1
Closed vulnerabilities
BDU:2015-10394
Уязвимость эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю выполнить произвольный код
BDU:2015-10395
Уязвимость гипервизора Xen, позволяющая нарушителю выполнить произвольный код
BDU:2015-10460
Уязвимость эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю повысить свои привилегии, вызвать отказ в обслуживании или получить доступ к защищаемой информации
BDU:2015-11288
Уязвимость эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю выполнить произвольный код на хостовой операционной системе
BDU:2015-11298
Уязвимость эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2015-11313
Уязвимость гипервизора Xen, позволяющая нарушителю выполнить произвольный код
BDU:2015-11547
Уязвимость эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
Modified: 2024-11-21
CVE-2015-3209
Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698
- FEDORA-2015-10001
- FEDORA-2015-10001
- FEDORA-2015-9978
- FEDORA-2015-9978
- FEDORA-2015-9965
- FEDORA-2015-9965
- SUSE-SU-2015:1042
- SUSE-SU-2015:1042
- SUSE-SU-2015:1045
- SUSE-SU-2015:1045
- SUSE-SU-2015:1152
- SUSE-SU-2015:1152
- SUSE-SU-2015:1156
- SUSE-SU-2015:1156
- SUSE-SU-2015:1157
- SUSE-SU-2015:1157
- SUSE-SU-2015:1206
- SUSE-SU-2015:1206
- SUSE-SU-2015:1426
- SUSE-SU-2015:1426
- SUSE-SU-2015:1519
- SUSE-SU-2015:1519
- SUSE-SU-2015:1643
- SUSE-SU-2015:1643
- RHSA-2015:1087
- RHSA-2015:1087
- RHSA-2015:1088
- RHSA-2015:1088
- RHSA-2015:1089
- RHSA-2015:1089
- RHSA-2015:1189
- RHSA-2015:1189
- DSA-3284
- DSA-3284
- DSA-3285
- DSA-3285
- DSA-3286
- DSA-3286
- 75123
- 75123
- 1032545
- 1032545
- USN-2630-1
- USN-2630-1
- http://xenbits.xen.org/xsa/advisory-135.html
- http://xenbits.xen.org/xsa/advisory-135.html
- https://kb.juniper.net/JSA10783
- https://kb.juniper.net/JSA10783
- GLSA-201510-02
- GLSA-201510-02
- GLSA-201604-03
- GLSA-201604-03
- https://www.arista.com/en/support/advisories-notices/security-advisories/1180-security-advisory-13
- https://www.arista.com/en/support/advisories-notices/security-advisories/1180-security-advisory-13
Modified: 2024-11-21
CVE-2015-3214
The pit_ioport_read in i8254.c in the Linux kernel before 2.6.33 and QEMU before 2.3.1 does not distinguish between read lengths and write lengths, which might allow guest OS users to execute arbitrary code on the host OS by triggering use of an invalid index.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ee73f656a604d5aa9df86a97102e4e462dd79924
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ee73f656a604d5aa9df86a97102e4e462dd79924
- http://mirror.linux.org.au/linux/kernel/v2.6/ChangeLog-2.6.33
- http://mirror.linux.org.au/linux/kernel/v2.6/ChangeLog-2.6.33
- RHSA-2015:1507
- RHSA-2015:1507
- RHSA-2015:1508
- RHSA-2015:1508
- RHSA-2015:1512
- RHSA-2015:1512
- DSA-3348
- DSA-3348
- [oss-security] 20150625 Re: CVE request -- Linux kernel - kvm: x86: out-of-bounds memory access in pit_ioport_read function
- [oss-security] 20150625 Re: CVE request -- Linux kernel - kvm: x86: out-of-bounds memory access in pit_ioport_read function
- 75273
- 75273
- 1032598
- 1032598
- https://bugzilla.redhat.com/show_bug.cgi?id=1229640
- https://bugzilla.redhat.com/show_bug.cgi?id=1229640
- https://github.com/torvalds/linux/commit/ee73f656a604d5aa9df86a97102e4e462dd79924
- https://github.com/torvalds/linux/commit/ee73f656a604d5aa9df86a97102e4e462dd79924
- GLSA-201510-02
- GLSA-201510-02
- https://support.lenovo.com/product_security/qemu
- https://support.lenovo.com/product_security/qemu
- https://support.lenovo.com/us/en/product_security/qemu
- https://support.lenovo.com/us/en/product_security/qemu
- https://www.arista.com/en/support/advisories-notices/security-advisories/1180-security-advisory-13
- https://www.arista.com/en/support/advisories-notices/security-advisories/1180-security-advisory-13
- 37990
- 37990
- [qemu-devel] 20150617 Re: [PATCH] i8254: fix out-of-bounds memory access in pit_ioport_read()
- [qemu-devel] 20150617 Re: [PATCH] i8254: fix out-of-bounds memory access in pit_ioport_read()
Modified: 2024-11-21
CVE-2015-3456
The Floppy Disk Controller (FDC) in QEMU, as used in Xen 4.5.x and earlier and KVM, allows local guest users to cause a denial of service (out-of-bounds write and guest crash) or possibly execute arbitrary code via the (1) FD_CMD_READ_ID, (2) FD_CMD_DRIVE_SPECIFICATION_COMMAND, or other unspecified commands, aka VENOM.
- http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=e907746266721f305d67bc0718795fedee2e824c
- http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=e907746266721f305d67bc0718795fedee2e824c
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10693
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10693
- FEDORA-2015-8249
- FEDORA-2015-8249
- SUSE-SU-2015:0889
- SUSE-SU-2015:0889
- openSUSE-SU-2015:0893
- openSUSE-SU-2015:0893
- openSUSE-SU-2015:0894
- openSUSE-SU-2015:0894
- SUSE-SU-2015:0923
- SUSE-SU-2015:0923
- SUSE-SU-2015:0927
- SUSE-SU-2015:0927
- SUSE-SU-2015:0929
- SUSE-SU-2015:0929
- SUSE-SU-2015:0896
- SUSE-SU-2015:0896
- openSUSE-SU-2015:0983
- openSUSE-SU-2015:0983
- openSUSE-SU-2015:1400
- openSUSE-SU-2015:1400
- HPSBMU03336
- HPSBMU03336
- SSRT102076
- SSRT102076
- HPSBMU03349
- HPSBMU03349
- RHSA-2015:0998
- RHSA-2015:0998
- RHSA-2015:0999
- RHSA-2015:0999
- RHSA-2015:1000
- RHSA-2015:1000
- RHSA-2015:1001
- RHSA-2015:1001
- RHSA-2015:1002
- RHSA-2015:1002
- RHSA-2015:1003
- RHSA-2015:1003
- RHSA-2015:1004
- RHSA-2015:1004
- RHSA-2015:1011
- RHSA-2015:1011
- http://support.citrix.com/article/CTX201078
- http://support.citrix.com/article/CTX201078
- http://venom.crowdstrike.com/
- http://venom.crowdstrike.com/
- DSA-3259
- DSA-3259
- DSA-3262
- DSA-3262
- DSA-3274
- DSA-3274
- http://www.fortiguard.com/advisory/2015-05-19-cve-2015-3456-venom-vulnerability
- http://www.fortiguard.com/advisory/2015-05-19-cve-2015-3456-venom-vulnerability
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- 74640
- 74640
- 1032306
- 1032306
- 1032311
- 1032311
- 1032917
- 1032917
- USN-2608-1
- USN-2608-1
- http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-438937.htm
- http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-438937.htm
- http://xenbits.xen.org/xsa/advisory-133.html
- http://xenbits.xen.org/xsa/advisory-133.html
- https://access.redhat.com/articles/1444903
- https://access.redhat.com/articles/1444903
- https://bto.bluecoat.com/security-advisory/sa95
- https://bto.bluecoat.com/security-advisory/sa95
- https://kb.juniper.net/JSA10783
- https://kb.juniper.net/JSA10783
- https://kc.mcafee.com/corporate/index?page=content&id=SB10118
- https://kc.mcafee.com/corporate/index?page=content&id=SB10118
- GLSA-201602-01
- GLSA-201602-01
- GLSA-201604-03
- GLSA-201604-03
- GLSA-201612-27
- GLSA-201612-27
- https://securityblog.redhat.com/2015/05/13/venom-dont-get-bitten/
- https://securityblog.redhat.com/2015/05/13/venom-dont-get-bitten/
- https://support.lenovo.com/us/en/product_security/venom
- https://support.lenovo.com/us/en/product_security/venom
- https://www.arista.com/en/support/advisories-notices/security-advisories/1128-security-advisory-10
- https://www.arista.com/en/support/advisories-notices/security-advisories/1128-security-advisory-10
- 37053
- 37053
- https://www.suse.com/security/cve/CVE-2015-3456.html
- https://www.suse.com/security/cve/CVE-2015-3456.html
Modified: 2024-11-21
CVE-2015-4037
The slirp_smb function in net/slirp.c in QEMU 2.3.0 and earlier creates temporary files with predictable names, which allows local users to cause a denial of service (instantiation failure) by creating /tmp/qemu-smb.*-* files before the program.
- FEDORA-2015-9601
- FEDORA-2015-9601
- FEDORA-2015-9599
- FEDORA-2015-9599
- SUSE-SU-2015:1152
- SUSE-SU-2015:1152
- SUSE-SU-2015:1519
- SUSE-SU-2015:1519
- openSUSE-SU-2015:1965
- openSUSE-SU-2015:1965
- DSA-3284
- DSA-3284
- DSA-3285
- DSA-3285
- [oss-security] 20150513 QEMU 2.3.0 tmp vulns CVE request
- [oss-security] 20150513 QEMU 2.3.0 tmp vulns CVE request
- [oss-security] 20150516 Re: QEMU 2.3.0 tmp vulns CVE request
- [oss-security] 20150516 Re: QEMU 2.3.0 tmp vulns CVE request
- [oss-security] 20150523 Re: QEMU 2.3.0 tmp vulns CVE request
- [oss-security] 20150523 Re: QEMU 2.3.0 tmp vulns CVE request
- 74809
- 74809
- 1032547
- 1032547
- USN-2630-1
- USN-2630-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1222892
- https://bugzilla.redhat.com/show_bug.cgi?id=1222892
Modified: 2024-11-21
CVE-2015-4106
QEMU does not properly restrict write access to the PCI config space for certain PCI pass-through devices, which might allow local x86 HVM guests to gain privileges, cause a denial of service (host crash), obtain sensitive information, or possibly have other unspecified impact via unknown vectors.
- FEDORA-2015-9466
- FEDORA-2015-9466
- FEDORA-2015-9456
- FEDORA-2015-9456
- FEDORA-2015-9965
- FEDORA-2015-9965
- SUSE-SU-2015:1042
- SUSE-SU-2015:1042
- SUSE-SU-2015:1045
- SUSE-SU-2015:1045
- SUSE-SU-2015:1156
- SUSE-SU-2015:1156
- SUSE-SU-2015:1157
- SUSE-SU-2015:1157
- http://support.citrix.com/article/CTX201145
- http://support.citrix.com/article/CTX201145
- DSA-3284
- DSA-3284
- DSA-3286
- DSA-3286
- 74949
- 74949
- 1032467
- 1032467
- USN-2630-1
- USN-2630-1
- http://xenbits.xen.org/xsa/advisory-131.html
- http://xenbits.xen.org/xsa/advisory-131.html
- GLSA-201604-03
- GLSA-201604-03
- https://support.citrix.com/article/CTX206006
- https://support.citrix.com/article/CTX206006
Modified: 2024-11-21
CVE-2015-5154
Heap-based buffer overflow in the IDE subsystem in QEMU, as used in Xen 4.5.x and earlier, when the container has a CDROM drive enabled, allows local guest users to execute arbitrary code on the host via unspecified ATAPI commands.
- FEDORA-2015-12679
- FEDORA-2015-12679
- FEDORA-2015-12657
- FEDORA-2015-12657
- FEDORA-2015-12714
- FEDORA-2015-12714
- SUSE-SU-2015:1299
- SUSE-SU-2015:1299
- SUSE-SU-2015:1302
- SUSE-SU-2015:1302
- SUSE-SU-2015:1409
- SUSE-SU-2015:1409
- SUSE-SU-2015:1421
- SUSE-SU-2015:1421
- SUSE-SU-2015:1426
- SUSE-SU-2015:1426
- SUSE-SU-2015:1455
- SUSE-SU-2015:1455
- SUSE-SU-2015:1643
- SUSE-SU-2015:1643
- SUSE-SU-2015:1782
- SUSE-SU-2015:1782
- RHSA-2015:1507
- RHSA-2015:1507
- RHSA-2015:1508
- RHSA-2015:1508
- RHSA-2015:1512
- RHSA-2015:1512
- http://support.citrix.com/article/CTX201593
- http://support.citrix.com/article/CTX201593
- DSA-3348
- DSA-3348
- 76048
- 76048
- 1033074
- 1033074
- http://xenbits.xen.org/xsa/advisory-138.html
- http://xenbits.xen.org/xsa/advisory-138.html
- GLSA-201510-02
- GLSA-201510-02
- GLSA-201604-03
- GLSA-201604-03
Modified: 2024-11-21
CVE-2015-5158
Stack-based buffer overflow in hw/scsi/scsi-bus.c in QEMU, when built with SCSI-device emulation support, allows guest OS users with CAP_SYS_RAWIO permissions to cause a denial of service (instance crash) via an invalid opcode in a SCSI command descriptor block.
Modified: 2024-11-21
CVE-2015-5225
Buffer overflow in the vnc_refresh_server_surface function in the VNC display driver in QEMU before 2.4.0.1 allows guest users to cause a denial of service (heap memory corruption and process crash) or possibly execute arbitrary code on the host via unspecified vectors, related to refreshing the server display surface.
- FEDORA-2015-16368
- FEDORA-2015-16368
- FEDORA-2015-14783
- FEDORA-2015-14783
- FEDORA-2015-15364
- FEDORA-2015-15364
- RHSA-2015:1772
- RHSA-2015:1772
- RHSA-2015:1837
- RHSA-2015:1837
- DSA-3348
- DSA-3348
- [oss-security] 20150822 CVE-2015-5225 Qemu: ui: vnc: heap memory corruption issue
- [oss-security] 20150822 CVE-2015-5225 Qemu: ui: vnc: heap memory corruption issue
- 76506
- 76506
- 1033547
- 1033547
- [Qemu-devel] 20150821 [PATCH] vnc: fix memory corruption (CVE-2015-5225)
- [Qemu-devel] 20150821 [PATCH] vnc: fix memory corruption (CVE-2015-5225)
- [Qemu-deve] 20150915 [ANNOUNCE] QEMU 2.4.0.1 CVE update released
- [Qemu-deve] 20150915 [ANNOUNCE] QEMU 2.4.0.1 CVE update released
- GLSA-201602-01
- GLSA-201602-01
Modified: 2024-11-21
CVE-2015-5278
The ne2000_receive function in hw/net/ne2000.c in QEMU before 2.4.0.1 allows attackers to cause a denial of service (infinite loop and instance crash) or possibly execute arbitrary code via vectors related to receiving packets.
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168077.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168077.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168646.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168646.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168671.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168671.html
- http://www.openwall.com/lists/oss-security/2015/09/15/2
- http://www.openwall.com/lists/oss-security/2015/09/15/2
- http://www.ubuntu.com/usn/USN-2745-1
- http://www.ubuntu.com/usn/USN-2745-1
- https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg03985.html
- https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg03985.html
- https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg05832.html
- https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg05832.html
- https://www.arista.com/en/support/advisories-notices/security-advisories/1188-security-advisory-14
- https://www.arista.com/en/support/advisories-notices/security-advisories/1188-security-advisory-14
Modified: 2024-11-21
CVE-2015-5279
Heap-based buffer overflow in the ne2000_receive function in hw/net/ne2000.c in QEMU before 2.4.0.1 allows guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via vectors related to receiving packets.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=7aa2bcad0ca837dd6d4bf4fa38a80314b4a6b755
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=7aa2bcad0ca837dd6d4bf4fa38a80314b4a6b755
- FEDORA-2015-16369
- FEDORA-2015-16369
- FEDORA-2015-16368
- FEDORA-2015-16368
- FEDORA-2015-16370
- FEDORA-2015-16370
- SUSE-SU-2015:1782
- SUSE-SU-2015:1782
- RHSA-2015:1896
- RHSA-2015:1896
- RHSA-2015:1923
- RHSA-2015:1923
- RHSA-2015:1924
- RHSA-2015:1924
- RHSA-2015:1925
- RHSA-2015:1925
- DSA-3361
- DSA-3361
- DSA-3362
- DSA-3362
- [oss-security] 20150915 CVE-2015-5279 Qemu: net: add checks to validate ring buffer pointers
- [oss-security] 20150915 CVE-2015-5279 Qemu: net: add checks to validate ring buffer pointers
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 76746
- 76746
- 1033569
- 1033569
- [Qemu-devel] 20150915 [PULL 2/3] net: add checks to validate ring buffer pointers
- [Qemu-devel] 20150915 [PULL 2/3] net: add checks to validate ring buffer pointers
- GLSA-201602-01
- GLSA-201602-01
- https://www.arista.com/en/support/advisories-notices/security-advisories/1188-security-advisory-14
- https://www.arista.com/en/support/advisories-notices/security-advisories/1188-security-advisory-14
Modified: 2024-11-21
CVE-2015-5745
Buffer overflow in the send_control_msg function in hw/char/virtio-serial-bus.c in QEMU before 2.4.0 allows guest users to cause a denial of service (QEMU process crash) via a crafted virtio control message.
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168077.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168077.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168646.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168646.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168671.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168671.html
- http://www.openwall.com/lists/oss-security/2015/08/06/3
- http://www.openwall.com/lists/oss-security/2015/08/06/3
- http://www.openwall.com/lists/oss-security/2015/08/06/5
- http://www.openwall.com/lists/oss-security/2015/08/06/5
- https://github.com/qemu/qemu/commit/7882080388be5088e72c425b02223c02e6cb4295
- https://github.com/qemu/qemu/commit/7882080388be5088e72c425b02223c02e6cb4295
- https://lists.gnu.org/archive/html/qemu-devel/2015-07/msg05458.html
- https://lists.gnu.org/archive/html/qemu-devel/2015-07/msg05458.html
- https://www.arista.com/en/support/advisories-notices/security-advisories/1180-security-advisory-13
- https://www.arista.com/en/support/advisories-notices/security-advisories/1180-security-advisory-13
Modified: 2024-11-21
CVE-2015-6815
The process_tx_desc function in hw/net/e1000.c in QEMU before 2.4.0.1 does not properly process transmit descriptor data when sending a network packet, which allows attackers to cause a denial of service (infinite loop and guest crash) via unspecified vectors.
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168077.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168077.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168646.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168646.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168671.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168671.html
- http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00011.html
- http://www.openwall.com/lists/oss-security/2015/09/04/4
- http://www.openwall.com/lists/oss-security/2015/09/04/4
- http://www.openwall.com/lists/oss-security/2015/09/05/5
- http://www.openwall.com/lists/oss-security/2015/09/05/5
- http://www.ubuntu.com/usn/USN-2745-1
- http://www.ubuntu.com/usn/USN-2745-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1260076
- https://bugzilla.redhat.com/show_bug.cgi?id=1260076
- https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg01199.html
- https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg01199.html
- https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg05832.html
- https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg05832.html
- https://www.arista.com/en/support/advisories-notices/security-advisories/1188-security-advisory-14
- https://www.arista.com/en/support/advisories-notices/security-advisories/1188-security-advisory-14
Modified: 2024-11-21
CVE-2015-8817
QEMU (aka Quick Emulator) built to use 'address_space_translate' to map an address to a MemoryRegionSection is vulnerable to an OOB r/w access issue. It could occur while doing pci_dma_read/write calls. Affects QEMU versions >= 1.6.0 and <= 2.3.1. A privileged user inside guest could use this flaw to crash the guest instance resulting in DoS.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=23820dbfc79d1c9dce090b4c555994f2bb6a69b3
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=23820dbfc79d1c9dce090b4c555994f2bb6a69b3
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=c3c1bb99d1c11978d9ce94d1bdcf0705378c1459
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=c3c1bb99d1c11978d9ce94d1bdcf0705378c1459
- RHSA-2016:2670
- RHSA-2016:2670
- RHSA-2016:2671
- RHSA-2016:2671
- RHSA-2016:2704
- RHSA-2016:2704
- RHSA-2016:2705
- RHSA-2016:2705
- RHSA-2016:2706
- RHSA-2016:2706
- [oss-security] 20160301 CVE request Qemu: OOB access in address_space_rw leads to segmentation fault
- [oss-security] 20160301 CVE request Qemu: OOB access in address_space_rw leads to segmentation fault
- [oss-security] 20160301 Re: CVE request Qemu: OOB access in address_space_rw leads to segmentation fault
- [oss-security] 20160301 Re: CVE request Qemu: OOB access in address_space_rw leads to segmentation fault
- https://bugzilla.redhat.com/show_bug.cgi?id=1300771
- https://bugzilla.redhat.com/show_bug.cgi?id=1300771
- [qemu-stable] 20160127 [PATCH for v2.3.1] exec: Respect as_translate_internal length clamp
- [qemu-stable] 20160127 [PATCH for v2.3.1] exec: Respect as_translate_internal length clamp
Modified: 2024-11-21
CVE-2015-8818
The cpu_physical_memory_write_rom_internal function in exec.c in QEMU (aka Quick Emulator) does not properly skip MMIO regions, which allows local privileged guest users to cause a denial of service (guest crash) via unspecified vectors.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=b242e0e0e2969c044a318e56f7988bbd84de1f63
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=b242e0e0e2969c044a318e56f7988bbd84de1f63
- RHSA-2016:2670
- RHSA-2016:2670
- RHSA-2016:2671
- RHSA-2016:2671
- RHSA-2016:2704
- RHSA-2016:2704
- RHSA-2016:2705
- RHSA-2016:2705
- RHSA-2016:2706
- RHSA-2016:2706
- [oss-security] 20160301 CVE request Qemu: OOB access in address_space_rw leads to segmentation fault
- [oss-security] 20160301 CVE request Qemu: OOB access in address_space_rw leads to segmentation fault
- [oss-security] 20160301 Re: CVE request Qemu: OOB access in address_space_rw leads to segmentation fault
- [oss-security] 20160301 Re: CVE request Qemu: OOB access in address_space_rw leads to segmentation fault
- https://bugzilla.redhat.com/show_bug.cgi?id=1300771
- https://bugzilla.redhat.com/show_bug.cgi?id=1300771
Modified: 2024-11-21
CVE-2016-1714
The (1) fw_cfg_write and (2) fw_cfg_read functions in hw/nvram/fw_cfg.c in QEMU before 2.4, when built with the Firmware Configuration device emulation support, allow guest OS users with the CAP_SYS_RAWIO privilege to cause a denial of service (out-of-bounds read or write access and process crash) or possibly execute arbitrary code via an invalid current entry value in a firmware configuration.
- RHSA-2016:0081
- RHSA-2016:0081
- RHSA-2016:0082
- RHSA-2016:0082
- RHSA-2016:0083
- RHSA-2016:0083
- RHSA-2016:0084
- RHSA-2016:0084
- RHSA-2016:0085
- RHSA-2016:0085
- RHSA-2016:0086
- RHSA-2016:0086
- RHSA-2016:0087
- RHSA-2016:0087
- RHSA-2016:0088
- RHSA-2016:0088
- DSA-3469
- DSA-3469
- DSA-3470
- DSA-3470
- DSA-3471
- DSA-3471
- [oss-security] 20160111 CVE request Qemu: nvram: OOB r/w access in processing firmware configurations
- [oss-security] 20160111 CVE request Qemu: nvram: OOB r/w access in processing firmware configurations
- [oss-security] 20160112 Re: CVE request Qemu: nvram: OOB r/w access in processing firmware configurations
- [oss-security] 20160112 Re: CVE request Qemu: nvram: OOB r/w access in processing firmware configurations
- [oss-security] 20160112 Re: Re: CVE request Qemu: nvram: OOB r/w access in processing firmware configurations
- [oss-security] 20160112 Re: Re: CVE request Qemu: nvram: OOB r/w access in processing firmware configurations
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- 80250
- 80250
- 1034858
- 1034858
- [Qemu-devel] 20160106 [PATCH v2 for v2.3.0] fw_cfg: add check to validate current entry value
- [Qemu-devel] 20160106 [PATCH v2 for v2.3.0] fw_cfg: add check to validate current entry value
- GLSA-201604-01
- GLSA-201604-01