Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-8817

Опубликовано: 29 дек. 2016
Источник: debian
EPSS Низкий

Описание

QEMU (aka Quick Emulator) built to use 'address_space_translate' to map an address to a MemoryRegionSection is vulnerable to an OOB r/w access issue. It could occur while doing pci_dma_read/write calls. Affects QEMU versions >= 1.6.0 and <= 2.3.1. A privileged user inside guest could use this flaw to crash the guest instance resulting in DoS.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
qemufixed1:2.4+dfsg-1apackage
qemuignoredjessiepackage
qemunot-affectedwheezypackage
qemunot-affectedsqueezepackage
qemu-kvmnot-affectedpackage

Примечания

  • https://www.openwall.com/lists/oss-security/2016/03/01/10

  • http://git.qemu.org/?p=qemu.git;a=commit;h=c3c1bb99d1c11978d9ce94d1bdcf0705378c1459 (v2.3.0-rc1)

  • https://lists.gnu.org/archive/html/qemu-stable/2016-01/msg00060.html

  • http://git.qemu.org/?p=qemu.git;a=commit;h=23820dbfc79d1c9dce090b4c555994f2bb6a69b3 (v2.4.0-rc0)

  • https://lists.gnu.org/archive/html/qemu-stable/2016-01/msg00065.html

EPSS

Процентиль: 25%
0.00088
Низкий

Связанные уязвимости

CVSS3: 5.5
ubuntu
около 9 лет назад

QEMU (aka Quick Emulator) built to use 'address_space_translate' to map an address to a MemoryRegionSection is vulnerable to an OOB r/w access issue. It could occur while doing pci_dma_read/write calls. Affects QEMU versions >= 1.6.0 and <= 2.3.1. A privileged user inside guest could use this flaw to crash the guest instance resulting in DoS.

redhat
около 10 лет назад

QEMU (aka Quick Emulator) built to use 'address_space_translate' to map an address to a MemoryRegionSection is vulnerable to an OOB r/w access issue. It could occur while doing pci_dma_read/write calls. Affects QEMU versions >= 1.6.0 and <= 2.3.1. A privileged user inside guest could use this flaw to crash the guest instance resulting in DoS.

CVSS3: 5.5
nvd
около 9 лет назад

QEMU (aka Quick Emulator) built to use 'address_space_translate' to map an address to a MemoryRegionSection is vulnerable to an OOB r/w access issue. It could occur while doing pci_dma_read/write calls. Affects QEMU versions >= 1.6.0 and <= 2.3.1. A privileged user inside guest could use this flaw to crash the guest instance resulting in DoS.

CVSS3: 5.5
github
больше 3 лет назад

QEMU (aka Quick Emulator) built to use 'address_space_translate' to map an address to a MemoryRegionSection is vulnerable to an OOB r/w access issue. It could occur while doing pci_dma_read/write calls. Affects QEMU versions >= 1.6.0 and <= 2.3.1. A privileged user inside guest could use this flaw to crash the guest instance resulting in DoS.

suse-cvrf
больше 9 лет назад

Security update for qemu

EPSS

Процентиль: 25%
0.00088
Низкий