First published: Tue May 19 2015(Updated: )
Qemu's user mode networking stack(SLiRP) is vulnerable to a predictable temporary file names creation flaw. It occurs when using -smb option. An unprivileged user could use this to thwart instantiation of Qemu guests, resulting in DoS. Reference: -> <a href="http://seclists.org/oss-sec/2015/q2/426">http://seclists.org/oss-sec/2015/q2/426</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU qemu | <=2.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.