Описание
hw/usb/bus.c in QEMU 1.6.2 allows remote attackers to execute arbitrary code via crafted savevm data, which triggers a heap-based buffer overflow, related to "USB post load checks."
Пакеты
Пакет | Статус | Версия исправления | Релиз | Тип |
---|---|---|---|---|
qemu | fixed | 2.1+dfsg-1 | package | |
qemu-kvm | removed | package | ||
qemu | no-dsa | wheezy | package | |
qemu-kvm | no-dsa | wheezy | package | |
qemu | end-of-life | squeeze | package | |
qemu-kvm | end-of-life | squeeze | package |
Примечания
http://article.gmane.org/gmane.comp.emulators.qemu/272322
EPSS
Связанные уязвимости
hw/usb/bus.c in QEMU 1.6.2 allows remote attackers to execute arbitrary code via crafted savevm data, which triggers a heap-based buffer overflow, related to "USB post load checks."
hw/usb/bus.c in QEMU 1.6.2 allows remote attackers to execute arbitrary code via crafted savevm data, which triggers a heap-based buffer overflow, related to "USB post load checks."
hw/usb/bus.c in QEMU 1.6.2 allows remote attackers to execute arbitrary code via crafted savevm data, which triggers a heap-based buffer overflow, related to "USB post load checks."
hw/usb/bus.c in QEMU 1.6.2 allows remote attackers to execute arbitrary code via crafted savevm data, which triggers a heap-based buffer overflow, related to "USB post load checks."
ELSA-2014-0743: qemu-kvm security and bug fix update (MODERATE)
EPSS