Описание
hw/usb/bus.c in QEMU 1.6.2 allows remote attackers to execute arbitrary code via crafted savevm data, which triggers a heap-based buffer overflow, related to "USB post load checks."
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Enterprise Linux 5 | kvm | Will not fix | ||
| Red Hat Enterprise Linux 6 | qemu-kvm-rhev | Affected | ||
| OpenStack 3 for RHEL 6 | qemu-kvm-rhev | Fixed | RHSA-2014:0888 | 24.07.2014 |
| OpenStack 4 for RHEL 6 | qemu-kvm-rhev | Fixed | RHSA-2014:0888 | 24.07.2014 |
| Red Hat Enterprise Linux 6 | qemu-kvm | Fixed | RHSA-2014:0743 | 10.06.2014 |
| Red Hat Enterprise Linux 7 | qemu-kvm | Fixed | RHSA-2014:0927 | 23.07.2014 |
| Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7 | qemu-kvm-rhev | Fixed | RHSA-2014:1268 | 22.09.2014 |
| RHEV 3.X Hypervisor and Agents for RHEL-6 | qemu-kvm-rhev | Fixed | RHSA-2014:0744 | 10.06.2014 |
| RHEV 3.X Hypervisor and Agents for RHEL-6 | rhev-hypervisor6 | Fixed | RHSA-2014:0674 | 09.06.2014 |
Показывать по
Дополнительная информация
Статус:
EPSS
3.7 Low
CVSS2
Связанные уязвимости
hw/usb/bus.c in QEMU 1.6.2 allows remote attackers to execute arbitrary code via crafted savevm data, which triggers a heap-based buffer overflow, related to "USB post load checks."
hw/usb/bus.c in QEMU 1.6.2 allows remote attackers to execute arbitrary code via crafted savevm data, which triggers a heap-based buffer overflow, related to "USB post load checks."
hw/usb/bus.c in QEMU 1.6.2 allows remote attackers to execute arbitrar ...
hw/usb/bus.c in QEMU 1.6.2 allows remote attackers to execute arbitrary code via crafted savevm data, which triggers a heap-based buffer overflow, related to "USB post load checks."
ELSA-2014-0743: qemu-kvm security and bug fix update (MODERATE)
EPSS
3.7 Low
CVSS2