5.6 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1.9 Low
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:M/Au:N/C:P/I:N/A:N
0.001 Low
EPSS
Percentile
24.5%
Package : qemu
Version : 1.1.2+dfsg-6+deb7u24
CVE ID : CVE-2017-14167 CVE-2017-15038
Multiple vulnerabilities were discovered in qemu, a fast processor
emulator. The Common Vulnerabilities and Exposures project identifies
the following problems:
CVE-2017-14167
Incorrect validation of multiboot headers could result in the
execution of arbitrary code.
CVE-2017-15038
When using 9pfs qemu-kvm is vulnerable to an information
disclosure issue. It could occur while accessing extended attributes
of a file due to a race condition. This could be used to disclose
heap memory contents of the host.
For Debian 7 "Wheezy", these problems have been fixed in version
1.1.2+dfsg-6+deb7u24.
We recommend that you upgrade your qemu packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
Attachment:
signature.asc
Description: PGP signature
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 8 | armhf | qemu-system-arm | < 1:2.1+dfsg-12+deb8u7 | qemu-system-arm_1:2.1+dfsg-12+deb8u7_armhf.deb |
Debian | 9 | mipsel | qemu-utils | < 1:2.8+dfsg-6+deb9u4 | qemu-utils_1:2.8+dfsg-6+deb9u4_mipsel.deb |
Debian | 8 | armhf | qemu-user-static | < 1:2.1+dfsg-12+deb8u7 | qemu-user-static_1:2.1+dfsg-12+deb8u7_armhf.deb |
Debian | 9 | armhf | qemu-system-arm-dbgsym | < 1:2.8+dfsg-6+deb9u4 | qemu-system-arm-dbgsym_1:2.8+dfsg-6+deb9u4_armhf.deb |
Debian | 9 | i386 | qemu-system-mips-dbgsym | < 1:2.8+dfsg-6+deb9u4 | qemu-system-mips-dbgsym_1:2.8+dfsg-6+deb9u4_i386.deb |
Debian | 7 | amd64 | qemu-kvm-dbg | < 1.1.2+dfsg-6+deb7u24 | qemu-kvm-dbg_1.1.2+dfsg-6+deb7u24_amd64.deb |
Debian | 9 | armhf | qemu-system-x86 | < 1:2.8+dfsg-6+deb9u4 | qemu-system-x86_1:2.8+dfsg-6+deb9u4_armhf.deb |
Debian | 9 | amd64 | qemu-utils-dbgsym | < 1:2.8+dfsg-6+deb9u4 | qemu-utils-dbgsym_1:2.8+dfsg-6+deb9u4_amd64.deb |
Debian | 7 | armel | qemu-utils | < 1.1.2+dfsg-6+deb7u24 | qemu-utils_1.1.2+dfsg-6+deb7u24_armel.deb |
Debian | 9 | mips | qemu-system-mips | < 1:2.8+dfsg-6+deb9u4 | qemu-system-mips_1:2.8+dfsg-6+deb9u4_mips.deb |
5.6 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1.9 Low
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:M/Au:N/C:P/I:N/A:N
0.001 Low
EPSS
Percentile
24.5%