First published: Thu May 19 2016(Updated: )
Quick Emulator(Qemu) built with the ESP/NCR53C9x controller emulation support is vulnerable to an OOB write access issue. The controller uses 16-byte FIFO buffer for command and data transfer. The OOB write occurs while writing to this command buffer in esp_reg_write(). A privileged user inside guest could use this flaw to crash the Qemu process resulting in DoS OR potentially leverage it to execute arbitrary code with privileges of the Qemu process on the host. Upstream patch: --------------- -> <a href="https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg03273.html">https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg03273.html</a> Reference: ---------- -> <a href="http://www.openwall.com/lists/oss-security/2016/05/19/3">http://www.openwall.com/lists/oss-security/2016/05/19/3</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
QEMU qemu | <=2.6.0 | |
Debian Debian Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.