Описание
Buffer overflow in the SCSI implementation in QEMU, as used in Xen, when a SCSI controller has more than 256 attached devices, allows local users to gain privileges via a small transfer buffer in a REPORT LUNS command.
Пакеты
Пакет | Статус | Версия исправления | Релиз | Тип |
---|---|---|---|---|
xen | fixed | 4.2-1 | package | |
xen | not-affected | wheezy | package | |
xen | end-of-life | squeeze | package | |
qemu | fixed | 1.6.0+dfsg-2 | package | |
qemu-kvm | removed | package | ||
xen-qemu-dm-4.0 | removed | package | ||
xen-qemu-dm-4.0 | end-of-life | squeeze | package |
Примечания
Qemu only exploitable by privileged administrator with malicious configuration
Xen in Squeeze uses a separate source package: xen-qemu-dm-4.0
Xen in Wheezy includes qemu
Xen after Wheezy uses qemu-system-x86 from qemu, marking 4.2 as pseudo fixed
EPSS
Связанные уязвимости
Buffer overflow in the SCSI implementation in QEMU, as used in Xen, when a SCSI controller has more than 256 attached devices, allows local users to gain privileges via a small transfer buffer in a REPORT LUNS command.
Buffer overflow in the SCSI implementation in QEMU, as used in Xen, when a SCSI controller has more than 256 attached devices, allows local users to gain privileges via a small transfer buffer in a REPORT LUNS command.
Buffer overflow in the SCSI implementation in QEMU, as used in Xen, when a SCSI controller has more than 256 attached devices, allows local users to gain privileges via a small transfer buffer in a REPORT LUNS command.
Buffer overflow in the SCSI implementation in QEMU, as used in Xen, when a SCSI controller has more than 256 attached devices, allows local users to gain privileges via a small transfer buffer in a REPORT LUNS command.
ELSA-2013-1553: qemu-kvm security, bug fix, and enhancement update (IMPORTANT)
EPSS