Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-8743

Опубликовано: 29 дек. 2016
Источник: debian
EPSS Низкий

Описание

QEMU (aka Quick Emulator) built with the NE2000 device emulation support is vulnerable to an OOB r/w access issue. It could occur while performing 'ioport' r/w operations. A privileged (CAP_SYS_RAWIO) user/process could use this flaw to leak or corrupt QEMU memory bytes.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
qemufixed1:2.5+dfsg-2package
qemuend-of-lifesqueezepackage
qemu-kvmremovedpackage
qemu-kvmend-of-lifesqueezepackage

Примечания

  • https://bugzilla.redhat.com/show_bug.cgi?id=1264929

  • https://lists.gnu.org/archive/html/qemu-devel/2016-01/msg00050.html

  • Introduced by (at least after): http://git.qemu.org/?p=qemu.git;a=commit;h=69b910399a3c40620a5213adaeb14a37366d97ac

  • https://www.openwall.com/lists/oss-security/2016/01/04/1

EPSS

Процентиль: 20%
0.00064
Низкий

Связанные уязвимости

CVSS3: 7.1
ubuntu
около 9 лет назад

QEMU (aka Quick Emulator) built with the NE2000 device emulation support is vulnerable to an OOB r/w access issue. It could occur while performing 'ioport' r/w operations. A privileged (CAP_SYS_RAWIO) user/process could use this flaw to leak or corrupt QEMU memory bytes.

redhat
около 10 лет назад

QEMU (aka Quick Emulator) built with the NE2000 device emulation support is vulnerable to an OOB r/w access issue. It could occur while performing 'ioport' r/w operations. A privileged (CAP_SYS_RAWIO) user/process could use this flaw to leak or corrupt QEMU memory bytes.

CVSS3: 7.1
nvd
около 9 лет назад

QEMU (aka Quick Emulator) built with the NE2000 device emulation support is vulnerable to an OOB r/w access issue. It could occur while performing 'ioport' r/w operations. A privileged (CAP_SYS_RAWIO) user/process could use this flaw to leak or corrupt QEMU memory bytes.

CVSS3: 7.1
github
больше 3 лет назад

QEMU (aka Quick Emulator) built with the NE2000 device emulation support is vulnerable to an OOB r/w access issue. It could occur while performing 'ioport' r/w operations. A privileged (CAP_SYS_RAWIO) user/process could use this flaw to leak or corrupt QEMU memory bytes.

suse-cvrf
почти 10 лет назад

Security update for xen

EPSS

Процентиль: 20%
0.00064
Низкий