First published: Mon Aug 22 2016(Updated: )
Quick Emulator(Qemu) built with the VMWARE VMXNET3 NIC device support is vulnerable to an OOB access issue. In that it does not check if packet headers does not check for IP header length. It could lead to a OOB access when reading further packet data. A privileged user inside guest could use this issue to crash the Qemu process instance or potentially execute arbitrary code on the host, with privileges of the Qemu process. Upstream patch: --------------- -> <a href="https://lists.gnu.org/archive/html/qemu-stable/2016-08/msg00077.html">https://lists.gnu.org/archive/html/qemu-stable/2016-08/msg00077.html</a> Reference: ---------- -> <a href="http://www.openwall.com/lists/oss-security/2016/08/18/4">http://www.openwall.com/lists/oss-security/2016/08/18/4</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU qemu | <2.6.0 | |
Redhat Virtualization | =4.0 | |
Redhat Enterprise Linux | =7.0 | |
Debian Debian Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.