|
|
Log in / Subscribe / Register

qemu: multiple vulnerabilities

Package(s):qemu CVE #(s):CVE-2015-8613 CVE-2015-8619 CVE-2015-8743 CVE-2016-1568 CVE-2016-1714
Created:January 18, 2016 Updated:February 1, 2016
Description: From the Mageia advisory:

A stack buffer-overflow vulnerability has been discovered in the QEMU emulator built with SCSI MegaRAID SAS HBA emulation support. The flaw occurs when processing the SCSI controller's CTRL_GET_INFO command. A privileged guest user could exploit this flaw to crash the QEMU process instance (denial of service). (CVE-2015-8613)

An out-of-bounds write vulnerability has been found in the QEMU emulator built with Human Monitor Interface(HMP) support. The issue occurs when the 'sendkey' command (in hmp_sendkey) is processed with a 'keyname_len' that is greater than the 'keyname_buf' array size. A user or process could exploit this flaw to crash the QEMU process instance (denial of service). (CVE-2015-8619)

An out-of-bounds read-write access flaw was found in the QEMU emulator built with NE2000-device emulation support. The flaw occurred while performing 'ioport' read-write operations. A privileged (CAP_SYS_RAWIO) user or process could exploit the flaw to leak or corrupt QEMU memory bytes (CVE-2015-8743)

A user-after-free vulnerability was discovered in the QEMU emulator built with IDE AHCI emulation support. The flaw could occur after processing AHCI Native Command Queuing(NCQ) AIO commands. A privileged user inside the guest could use this flaw to crash the QEMU process instance (denial of service) or potentially execute arbitrary code on the host with QEMU-process privileges (CVE-2016-1568).

An out-of-bounds read/write flaw was discovered in the QEMU emulator built with Firmware Configuration device emulation support. The flaw could occur while processing firmware configurations if the current configuration entry value was set to be invalid. A privileged(CAP_SYS_RAWIO) user or process inside the guest could exploit this flaw to crash the QEMU process instance (denial of service), or potentially execute arbitrary code on the host with QEMU-process privileges (CVE-2016-1714).

Alerts:
openSUSE openSUSE-SU-2016:2494-1 xen 2016-10-11
SUSE SUSE-SU-2016:1785-1 kvm 2016-07-11
openSUSE openSUSE-SU-2016:1750-1 qemu 2016-07-06
SUSE SUSE-SU-2016:1745-1 xen 2016-07-06
SUSE SUSE-SU-2016:1703-1 qemu 2016-06-29
SUSE SUSE-SU-2016:1698-1 kvm 2016-06-28
Fedora FEDORA-2016-e1784417af xen 2016-02-01
CentOS CESA-2016:0082 qemu-kvm 2016-02-01
CentOS CESA-2016:0083 qemu-kvm 2016-02-01
Fedora FEDORA-2016-2c15b72b01 xen 2016-01-28
Scientific Linux SLSA-2016:0083-1 qemu-kvm 2016-01-28
Scientific Linux SLSA-2016:0082-1 qemu-kvm 2016-01-28
Oracle ELSA-2016-0082 qemu-kvm 2016-01-28
Oracle ELSA-2016-0083 qemu-kvm 2016-01-28
Red Hat RHSA-2016:0087-01 qemu-kvm-rhev 2016-01-28
Red Hat RHSA-2016:0088-01 qemu-kvm-rhev 2016-01-28
Red Hat RHSA-2016:0085-01 qemu-kvm-rhev 2016-01-28
Red Hat RHSA-2016:0086-01 qemu-kvm-rhev 2016-01-28
Red Hat RHSA-2016:0083-01 qemu-kvm 2016-01-28
Red Hat RHSA-2016:0082-01 qemu-kvm 2016-01-28
Fedora FEDORA-2016-42778e8c82 qemu 2016-01-24
Mageia MGASA-2016-0023 qemu 2016-01-17
SUSE SUSE-SU-2016:1560-1 qemu 2016-06-13
SUSE SUSE-SU-2016:1445-1 Xen 2016-05-30
SUSE SUSE-SU-2016:1318-1 xen 2016-05-17
Oracle ELSA-2016-0997 qemu-kvm 2016-05-17
SUSE SUSE-SU-2016:1154-1 xen 2016-04-26
openSUSE openSUSE-SU-2016:0995-1 xen 2016-04-08
SUSE SUSE-SU-2016:0955-1 xen 2016-04-05
Gentoo 201604-01 qemu 2016-04-02
openSUSE openSUSE-SU-2016:0914-1 xen 2016-03-30
SUSE SUSE-SU-2016:0873-1 xen 2016-03-24
Fedora FEDORA-2016-38b20aa50f xen 2016-03-19
Fedora FEDORA-2016-f4504e9445 xen 2016-03-20
Fedora FEDORA-2016-be042f7e6f qemu 2016-02-25
Fedora FEDORA-2016-b49aaf2c56 qemu 2016-02-21
Debian DSA-3470-1 qemu-kvm 2016-02-08
Debian DSA-3471-1 qemu 2016-02-08
Debian DSA-3469-1 qemu 2016-02-08
Gentoo 201602-01 qemu 2016-02-04
Ubuntu USN-2891-1 qemu, qemu-kvm 2016-02-03
Fedora FEDORA-2016-275e9ff483 qemu 2016-02-02

to post comments


Copyright © 2026, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds