Описание
Integer overflow in the VGA module in QEMU allows local guest OS users to cause a denial of service (out-of-bounds read and QEMU process crash) by editing VGA registers in VBE mode.
Пакеты
| Пакет | Статус | Версия исправления | Релиз | Тип |
|---|---|---|---|---|
| qemu | fixed | 1:2.6+dfsg-1 | package | |
| qemu-kvm | removed | package | ||
| xen | fixed | 4.4.0-1 | package | |
| xen | no-dsa | wheezy | package |
Примечания
Xen switched to qemu-system in 4.4.0-1
http://xenbits.xen.org/xsa/advisory-179.html
mitigation: run HVM in stubdomains, PV, default video card not vulnerable, i386-only
EPSS
Связанные уязвимости
Integer overflow in the VGA module in QEMU allows local guest OS users to cause a denial of service (out-of-bounds read and QEMU process crash) by editing VGA registers in VBE mode.
Integer overflow in the VGA module in QEMU allows local guest OS users to cause a denial of service (out-of-bounds read and QEMU process crash) by editing VGA registers in VBE mode.
Integer overflow in the VGA module in QEMU allows local guest OS users to cause a denial of service (out-of-bounds read and QEMU process crash) by editing VGA registers in VBE mode.
Integer overflow in the VGA module in QEMU allows local guest OS users to cause a denial of service (out-of-bounds read and QEMU process crash) by editing VGA registers in VBE mode.
ELSA-2017-0621: qemu-kvm security and bug fix update (MODERATE)
EPSS