Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2014-7840

Опубликовано: 12 дек. 2014
Источник: debian
EPSS Низкий

Описание

The host_from_stream_offset function in arch_init.c in QEMU, when loading RAM during migration, allows remote attackers to execute arbitrary code via a crafted (1) offset or (2) length value in savevm data.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
qemufixed2.1+dfsg-8package
qemuno-dsawheezypackage
qemuno-dsasqueezepackage
qemu-kvmremovedpackage
qemu-kvmno-dsawheezypackage
qemu-kvmno-dsasqueezepackage

Примечания

  • http://thread.gmane.org/gmane.comp.emulators.qemu/306117

EPSS

Процентиль: 85%
0.02455
Низкий

Связанные уязвимости

ubuntu
больше 10 лет назад

The host_from_stream_offset function in arch_init.c in QEMU, when loading RAM during migration, allows remote attackers to execute arbitrary code via a crafted (1) offset or (2) length value in savevm data.

redhat
почти 11 лет назад

The host_from_stream_offset function in arch_init.c in QEMU, when loading RAM during migration, allows remote attackers to execute arbitrary code via a crafted (1) offset or (2) length value in savevm data.

nvd
больше 10 лет назад

The host_from_stream_offset function in arch_init.c in QEMU, when loading RAM during migration, allows remote attackers to execute arbitrary code via a crafted (1) offset or (2) length value in savevm data.

github
больше 3 лет назад

The host_from_stream_offset function in arch_init.c in QEMU, when loading RAM during migration, allows remote attackers to execute arbitrary code via a crafted (1) offset or (2) length value in savevm data.

suse-cvrf
больше 10 лет назад

Security update for qemu

EPSS

Процентиль: 85%
0.02455
Низкий