ALT-PU-2017-2829-1
Closed vulnerabilities
BDU:2017-02299
Уязвимость функции load_multiboot (hw/i386/multiboot.c) эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю выполнить произвольный код
BDU:2019-04100
Уязвимость сервера Network Block Device (NBD) эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-04104
Уязвимость функции mode4and5 (hw/display/cirrus_vga.c) эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-04122
Уязвимость компонента Virtio Vring эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-04161
Уязвимость компонента ROUND_UP (n, d) эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-04-20
CVE-2017-13672
QEMU (aka Quick Emulator), when built with the VGA display emulator support, allows local guest OS privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) via vectors involving display update.
- http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00042.html
- http://www.debian.org/security/2017/dsa-3991
- http://www.openwall.com/lists/oss-security/2017/08/30/3
- http://www.securityfocus.com/bid/100540
- https://access.redhat.com/errata/RHSA-2018:0816
- https://access.redhat.com/errata/RHSA-2018:1104
- https://access.redhat.com/errata/RHSA-2018:1113
- https://access.redhat.com/errata/RHSA-2018:2162
- https://bugzilla.redhat.com/show_bug.cgi?id=1486560
- https://lists.gnu.org/archive/html/qemu-devel/2017-08/msg04684.html
- https://usn.ubuntu.com/3575-1/
- http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00042.html
- http://www.debian.org/security/2017/dsa-3991
- http://www.openwall.com/lists/oss-security/2017/08/30/3
- http://www.securityfocus.com/bid/100540
- https://access.redhat.com/errata/RHSA-2018:0816
- https://access.redhat.com/errata/RHSA-2018:1104
- https://access.redhat.com/errata/RHSA-2018:1113
- https://access.redhat.com/errata/RHSA-2018:2162
- https://bugzilla.redhat.com/show_bug.cgi?id=1486560
- https://lists.gnu.org/archive/html/qemu-devel/2017-08/msg04684.html
- https://usn.ubuntu.com/3575-1/
Modified: 2025-04-20
CVE-2017-13711
Use-after-free vulnerability in the sofree function in slirp/socket.c in QEMU (aka Quick Emulator) allows attackers to cause a denial of service (QEMU instance crash) by leveraging failure to properly clear ifq_so from pending packets.
- http://www.debian.org/security/2017/dsa-3991
- http://www.openwall.com/lists/oss-security/2017/08/29/6
- http://www.securityfocus.com/bid/100534
- https://access.redhat.com/errata/RHSA-2018:0816
- https://access.redhat.com/errata/RHSA-2018:1104
- https://access.redhat.com/errata/RHSA-2018:1113
- https://bugzilla.redhat.com/show_bug.cgi?id=1486400
- https://lists.gnu.org/archive/html/qemu-devel/2017-08/msg05201.html
- http://www.debian.org/security/2017/dsa-3991
- http://www.openwall.com/lists/oss-security/2017/08/29/6
- http://www.securityfocus.com/bid/100534
- https://access.redhat.com/errata/RHSA-2018:0816
- https://access.redhat.com/errata/RHSA-2018:1104
- https://access.redhat.com/errata/RHSA-2018:1113
- https://bugzilla.redhat.com/show_bug.cgi?id=1486400
- https://lists.gnu.org/archive/html/qemu-devel/2017-08/msg05201.html
Modified: 2025-04-20
CVE-2017-14167
Integer overflow in the load_multiboot function in hw/i386/multiboot.c in QEMU (aka Quick Emulator) allows local guest OS users to execute arbitrary code on the host via crafted multiboot header address values, which trigger an out-of-bounds write.
- http://www.debian.org/security/2017/dsa-3991
- http://www.openwall.com/lists/oss-security/2017/09/07/2
- http://www.securityfocus.com/bid/100694
- https://access.redhat.com/errata/RHSA-2017:3368
- https://access.redhat.com/errata/RHSA-2017:3369
- https://access.redhat.com/errata/RHSA-2017:3466
- https://access.redhat.com/errata/RHSA-2017:3470
- https://access.redhat.com/errata/RHSA-2017:3471
- https://access.redhat.com/errata/RHSA-2017:3472
- https://access.redhat.com/errata/RHSA-2017:3473
- https://access.redhat.com/errata/RHSA-2017:3474
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
- https://lists.nongnu.org/archive/html/qemu-devel/2017-09/msg01032.html
- https://usn.ubuntu.com/3575-1/
- http://www.debian.org/security/2017/dsa-3991
- http://www.openwall.com/lists/oss-security/2017/09/07/2
- http://www.securityfocus.com/bid/100694
- https://access.redhat.com/errata/RHSA-2017:3368
- https://access.redhat.com/errata/RHSA-2017:3369
- https://access.redhat.com/errata/RHSA-2017:3466
- https://access.redhat.com/errata/RHSA-2017:3470
- https://access.redhat.com/errata/RHSA-2017:3471
- https://access.redhat.com/errata/RHSA-2017:3472
- https://access.redhat.com/errata/RHSA-2017:3473
- https://access.redhat.com/errata/RHSA-2017:3474
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
- https://lists.nongnu.org/archive/html/qemu-devel/2017-09/msg01032.html
- https://usn.ubuntu.com/3575-1/
Modified: 2024-11-21
CVE-2017-15118
A stack-based buffer overflow vulnerability was found in NBD server implementation in qemu before 2.11 allowing a client to request an export name of size up to 4096 bytes, which in fact should be limited to 256 bytes, causing an out-of-bounds stack write in the qemu process. If NBD server requires TLS, the attacker cannot trigger the buffer overflow without first successfully negotiating TLS.
- http://www.openwall.com/lists/oss-security/2017/11/28/8
- http://www.securityfocus.com/bid/101975
- https://access.redhat.com/errata/RHSA-2018:1104
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-15118
- https://lists.gnu.org/archive/html/qemu-devel/2017-11/msg05045.html
- https://usn.ubuntu.com/3575-1/
- https://www.exploit-db.com/exploits/43194/
- http://www.openwall.com/lists/oss-security/2017/11/28/8
- http://www.securityfocus.com/bid/101975
- https://access.redhat.com/errata/RHSA-2018:1104
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-15118
- https://lists.gnu.org/archive/html/qemu-devel/2017-11/msg05045.html
- https://usn.ubuntu.com/3575-1/
- https://www.exploit-db.com/exploits/43194/
Modified: 2024-11-21
CVE-2017-15119
The Network Block Device (NBD) server in Quick Emulator (QEMU) before 2.11 is vulnerable to a denial of service issue. It could occur if a client sent large option requests, making the server waste CPU time on reading up to 4GB per request. A client could use this flaw to keep the NBD server from serving other requests, resulting in DoS.
- http://www.openwall.com/lists/oss-security/2017/11/28/9
- http://www.securityfocus.com/bid/102011
- https://access.redhat.com/errata/RHSA-2018:1104
- https://access.redhat.com/errata/RHSA-2018:1113
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-15119
- https://lists.gnu.org/archive/html/qemu-devel/2017-11/msg05044.html
- https://usn.ubuntu.com/3575-1/
- https://www.debian.org/security/2018/dsa-4213
- http://www.openwall.com/lists/oss-security/2017/11/28/9
- http://www.securityfocus.com/bid/102011
- https://access.redhat.com/errata/RHSA-2018:1104
- https://access.redhat.com/errata/RHSA-2018:1113
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-15119
- https://lists.gnu.org/archive/html/qemu-devel/2017-11/msg05044.html
- https://usn.ubuntu.com/3575-1/
- https://www.debian.org/security/2018/dsa-4213
Modified: 2025-04-20
CVE-2017-15289
The mode4and5 write functions in hw/display/cirrus_vga.c in Qemu allow local OS guest privileged users to cause a denial of service (out-of-bounds write access and Qemu process crash) via vectors related to dst calculation.
- http://www.openwall.com/lists/oss-security/2017/10/12/16
- http://www.securityfocus.com/bid/101262
- https://access.redhat.com/errata/RHSA-2017:3368
- https://access.redhat.com/errata/RHSA-2017:3369
- https://access.redhat.com/errata/RHSA-2017:3466
- https://access.redhat.com/errata/RHSA-2017:3470
- https://access.redhat.com/errata/RHSA-2017:3471
- https://access.redhat.com/errata/RHSA-2017:3472
- https://access.redhat.com/errata/RHSA-2017:3473
- https://access.redhat.com/errata/RHSA-2017:3474
- https://access.redhat.com/errata/RHSA-2018:0516
- https://bugzilla.redhat.com/show_bug.cgi?id=1501290
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
- https://lists.gnu.org/archive/html/qemu-devel/2017-10/msg02557.html
- https://usn.ubuntu.com/3575-1/
- https://www.debian.org/security/2018/dsa-4213
- http://www.openwall.com/lists/oss-security/2017/10/12/16
- http://www.securityfocus.com/bid/101262
- https://access.redhat.com/errata/RHSA-2017:3368
- https://access.redhat.com/errata/RHSA-2017:3369
- https://access.redhat.com/errata/RHSA-2017:3466
- https://access.redhat.com/errata/RHSA-2017:3470
- https://access.redhat.com/errata/RHSA-2017:3471
- https://access.redhat.com/errata/RHSA-2017:3472
- https://access.redhat.com/errata/RHSA-2017:3473
- https://access.redhat.com/errata/RHSA-2017:3474
- https://access.redhat.com/errata/RHSA-2018:0516
- https://bugzilla.redhat.com/show_bug.cgi?id=1501290
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
- https://lists.gnu.org/archive/html/qemu-devel/2017-10/msg02557.html
- https://usn.ubuntu.com/3575-1/
- https://www.debian.org/security/2018/dsa-4213
Modified: 2025-04-20
CVE-2017-17381
The Virtio Vring implementation in QEMU allows local OS guest users to cause a denial of service (divide-by-zero error and QEMU process crash) by unsetting vring alignment while updating Virtio rings.
- http://www.openwall.com/lists/oss-security/2017/12/05/2
- http://www.securityfocus.com/bid/102059
- https://lists.gnu.org/archive/html/qemu-devel/2017-12/msg00166.html
- https://usn.ubuntu.com/3575-1/
- https://www.debian.org/security/2018/dsa-4213
- http://www.openwall.com/lists/oss-security/2017/12/05/2
- http://www.securityfocus.com/bid/102059
- https://lists.gnu.org/archive/html/qemu-devel/2017-12/msg00166.html
- https://usn.ubuntu.com/3575-1/
- https://www.debian.org/security/2018/dsa-4213
Modified: 2024-11-21
CVE-2017-18043
Integer overflow in the macro ROUND_UP (n, d) in Quick Emulator (Qemu) allows a user to cause a denial of service (Qemu process crash).
- http://www.openwall.com/lists/oss-security/2018/01/19/1
- http://www.securityfocus.com/bid/102759
- https://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=2098b073f398cd628c09c5a78537a6854
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
- https://usn.ubuntu.com/3575-1/
- https://www.debian.org/security/2018/dsa-4213
- http://www.openwall.com/lists/oss-security/2018/01/19/1
- http://www.securityfocus.com/bid/102759
- https://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=2098b073f398cd628c09c5a78537a6854
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
- https://usn.ubuntu.com/3575-1/
- https://www.debian.org/security/2018/dsa-4213
