Описание
hw/usb/bus.c in QEMU 1.6.2 allows remote attackers to execute arbitrary code via crafted savevm data, which triggers a heap-based buffer overflow, related to "USB post load checks."
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | 2.1+dfsg-2ubuntu1 |
esm-infra-legacy/trusty | not-affected | 2.0.0+dfsg-2ubuntu1.3 |
lucid | DNE | |
precise | DNE | |
quantal | DNE | |
saucy | ignored | end of life |
trusty | released | 2.0.0+dfsg-2ubuntu1.3 |
trusty/esm | not-affected | 2.0.0+dfsg-2ubuntu1.3 |
upstream | needed |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra-legacy/trusty | DNE | |
lucid | not-affected | code not present |
precise | released | 1.0+noroms-0ubuntu14.17 |
quantal | ignored | end of life |
saucy | DNE | |
trusty | DNE | |
trusty/esm | DNE | |
upstream | needed |
Показывать по
6.8 Medium
CVSS2
Связанные уязвимости
hw/usb/bus.c in QEMU 1.6.2 allows remote attackers to execute arbitrary code via crafted savevm data, which triggers a heap-based buffer overflow, related to "USB post load checks."
hw/usb/bus.c in QEMU 1.6.2 allows remote attackers to execute arbitrary code via crafted savevm data, which triggers a heap-based buffer overflow, related to "USB post load checks."
hw/usb/bus.c in QEMU 1.6.2 allows remote attackers to execute arbitrar ...
hw/usb/bus.c in QEMU 1.6.2 allows remote attackers to execute arbitrary code via crafted savevm data, which triggers a heap-based buffer overflow, related to "USB post load checks."
ELSA-2014-0743: qemu-kvm security and bug fix update (MODERATE)
6.8 Medium
CVSS2