First published: Tue May 19 2015(Updated: )
Qemu's user mode networking stack(SLiRP) is vulnerable to a predictable temporary file names creation flaw. It occurs when using -smb option. An unprivileged user could use this to thwart instantiation of Qemu guests, resulting in DoS. Reference: -> <a href="http://seclists.org/oss-sec/2015/q2/426">http://seclists.org/oss-sec/2015/q2/426</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU KVM | <=2.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-4037 has a severity rating that indicates it can lead to denial of service (DoS) for Qemu guests.
To fix CVE-2015-4037, you should update to QEMU version 2.3.1 or later, where this vulnerability is addressed.
CVE-2015-4037 affects QEMU versions up to and including 2.3.0.
CVE-2015-4037 specifically impacts the user mode networking stack of QEMU when using the -smb option.
Yes, an unprivileged user can exploit CVE-2015-4037 to disrupt the instantiation of Qemu guests.