6.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
2.1 Low
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:N/I:N/A:P
0.001 Low
EPSS
Percentile
24.8%
Debian Security Advisory DSA-3470-1 [email protected]
https://www.debian.org/security/ Sebastien Delafond
February 08, 2016 https://www.debian.org/security/faq
Package : qemu-kvm
CVE ID : CVE-2015-7295 CVE-2015-7504 CVE-2015-7512 CVE-2015-8345
CVE-2015-8504 CVE-2015-8558 CVE-2015-8743 CVE-2016-1568 CVE-2016-1714 CVE-2016-1922
Debian Bug : 799452 806373 806741 806742 808130 808144 810519 810527 811201
Several vulnerabilities were discovered in qemu-kvm, a full
virtualization solution on x86 hardware.
CVE-2015-7295
Jason Wang of Red Hat Inc. discovered that the Virtual Network
Device support is vulnerable to denial-of-service (via resource
exhaustion), that could occur when receiving large packets.
CVE-2015-7504
Qinghao Tang of Qihoo 360 Inc. and Ling Liu of Qihoo 360 Inc.
discovered that the PC-Net II ethernet controller is vulnerable to
a heap-based buffer overflow that could result in
denial-of-service (via application crash) or arbitrary code
execution.
CVE-2015-7512
Ling Liu of Qihoo 360 Inc. and Jason Wang of Red Hat Inc.
discovered that the PC-Net II ethernet controller is vulnerable to
a buffer overflow that could result in denial-of-service (via
application crash) or arbitrary code execution.
CVE-2015-8345
Qinghao Tang of Qihoo 360 Inc. discovered that the eepro100
emulator contains a flaw that could lead to an infinite loop when
processing Command Blocks, eventually resulting in
denial-of-service (via application crash).
CVE-2015-8504
Lian Yihan of Qihoo 360 Inc. discovered that the VNC display
driver support is vulnerable to an arithmetic exception flaw that
could lead to denial-of-service (via application crash).
CVE-2015-8558
Qinghao Tang of Qihoo 360 Inc. discovered that the USB EHCI
emulation support contains a flaw that could lead to an infinite
loop during communication between the host controller and a device
driver. This could lead to denial-of-service (via resource
exhaustion).
CVE-2015-8743
Ling Liu of Qihoo 360 Inc. discovered that the NE2000 emulator is
vulnerable to an out-of-bound read/write access issue, potentially
resulting in information leak or memory corruption.
CVE-2016-1568
Qinghao Tang of Qihoo 360 Inc. discovered that the IDE AHCI
emulation support is vulnerable to a use-after-free issue, that
could lead to denial-of-service (via application crash) or
arbitrary code execution.
CVE-2016-1714
Donghai Zhu of Alibaba discovered that the Firmware Configuration
emulation support is vulnerable to an out-of-bound read/write
access issue, that could lead to denial-of-service (via
application crash) or arbitrary code execution.
CVE-2016-1922
Ling Liu of Qihoo 360 Inc. discovered that 32-bit Windows guests
support is vulnerable to a null pointer dereference issue, that
could lead to denial-of-service (via application crash).
For the oldstable distribution (wheezy), these problems have been fixed
in version 1.1.2+dfsg-6+deb7u12.
We recommend that you upgrade your qemu-kvm packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: [email protected]
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 8 | s390x | qemu-system-mips | < 1:2.1+dfsg-12+deb8u5a | qemu-system-mips_1:2.1+dfsg-12+deb8u5a_s390x.deb |
Debian | 8 | ppc64el | qemu-system-sparc | < 1:2.1+dfsg-12+deb8u5a | qemu-system-sparc_1:2.1+dfsg-12+deb8u5a_ppc64el.deb |
Debian | 8 | ppc64el | qemu-user | < 1:2.1+dfsg-12+deb8u5a | qemu-user_1:2.1+dfsg-12+deb8u5a_ppc64el.deb |
Debian | 8 | amd64 | qemu | < 1:2.1+dfsg-12+deb8u5a | qemu_1:2.1+dfsg-12+deb8u5a_amd64.deb |
Debian | 8 | mips | qemu-system | < 1:2.1+dfsg-12+deb8u5a | qemu-system_1:2.1+dfsg-12+deb8u5a_mips.deb |
Debian | 7 | s390x | qemu | < 1.1.2+dfsg-6a+deb7u12 | qemu_1.1.2+dfsg-6a+deb7u12_s390x.deb |
Debian | 7 | ia64 | qemu-user | < 1.1.2+dfsg-6a+deb7u12 | qemu-user_1.1.2+dfsg-6a+deb7u12_ia64.deb |
Debian | 7 | i386 | qemu-utils | < 1.1.2+dfsg-6a+deb7u12 | qemu-utils_1.1.2+dfsg-6a+deb7u12_i386.deb |
Debian | 7 | armhf | qemu-system | < 1.1.2+dfsg-6a+deb7u12 | qemu-system_1.1.2+dfsg-6a+deb7u12_armhf.deb |
Debian | 8 | armhf | qemu-system-x86 | < 1:2.1+dfsg-12+deb8u5a | qemu-system-x86_1:2.1+dfsg-12+deb8u5a_armhf.deb |
6.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
2.1 Low
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:N/I:N/A:P
0.001 Low
EPSS
Percentile
24.8%