Debian: DSA-3469-1: qemu security update

    Date08 Feb 2016
    CategoryDebian
    261
    Posted ByLinuxSecurity Advisories
    Several vulnerabilities were discovered in qemu, a full virtualization solution on x86 hardware. CVE-2015-7295
    
    - -------------------------------------------------------------------------
    Debian Security Advisory DSA-3469-1                   This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://www.debian.org/security/                       Sebastien Delafond
    February 08, 2016                     https://www.debian.org/security/faq
    - -------------------------------------------------------------------------
    
    Package        : qemu
    CVE ID         : CVE-2015-7295 CVE-2015-7504 CVE-2015-7512 CVE-2015-8345 
                     CVE-2015-8504 CVE-2015-8558 CVE-2015-8743 CVE-2016-1568 CVE-2016-1714 CVE-2016-1922
    Debian Bug     : 799452 806373 806741 806742 808130 808144 810519 810527 811201
    
    Several vulnerabilities were discovered in qemu, a full virtualization
    solution on x86 hardware.
    
    CVE-2015-7295
    
        Jason Wang of Red Hat Inc. discovered that the Virtual Network
        Device support is vulnerable to denial-of-service (via resource
        exhaustion), that could occur when receiving large packets.
    
    CVE-2015-7504
    
        Qinghao Tang of Qihoo 360 Inc. and Ling Liu of Qihoo 360 Inc.
        discovered that the PC-Net II ethernet controller is vulnerable to
        a heap-based buffer overflow that could result in
        denial-of-service (via application crash) or arbitrary code
        execution.
    
    CVE-2015-7512
    
        Ling Liu of Qihoo 360 Inc. and Jason Wang of Red Hat Inc.
        discovered that the PC-Net II ethernet controller is vulnerable to
        a buffer overflow that could result in denial-of-service (via
        application crash) or arbitrary code execution.
    
    CVE-2015-8345
    
        Qinghao Tang of Qihoo 360 Inc. discovered that the eepro100
        emulator contains a flaw that could lead to an infinite loop when
        processing Command Blocks, eventually resulting in
        denial-of-service (via application crash).
    
    CVE-2015-8504
    
        Lian Yihan of Qihoo 360 Inc. discovered that the VNC display
        driver support is vulnerable to an arithmetic exception flaw that
        could lead to denial-of-service (via application crash).
    
    CVE-2015-8558
    
        Qinghao Tang of Qihoo 360 Inc. discovered that the USB EHCI
        emulation support contains a flaw that could lead to an infinite
        loop during communication between the host controller and a device
        driver. This could lead to denial-of-service (via resource
        exhaustion).
    
    CVE-2015-8743
    
        Ling Liu of Qihoo 360 Inc. discovered that the NE2000 emulator is
        vulnerable to an out-of-bound read/write access issue, potentially
        resulting in information leak or memory corruption.
    
    CVE-2016-1568
    
        Qinghao Tang of Qihoo 360 Inc. discovered that the IDE AHCI
        emulation support is vulnerable to a use-after-free issue, that
        could lead to denial-of-service (via application crash) or
        arbitrary code execution.
    
    CVE-2016-1714
    
        Donghai Zhu of Alibaba discovered that the Firmware Configuration
        emulation support is vulnerable to an out-of-bound read/write
        access issue, that could lead to denial-of-service (via
        application crash) or arbitrary code execution.
    
    CVE-2016-1922
    
        Ling Liu of Qihoo 360 Inc. discovered that 32-bit Windows guests
        support is vulnerable to a null pointer dereference issue, that
        could lead to denial-of-service (via application crash).
    
    For the oldstable distribution (wheezy), these problems have been fixed
    in version 1.1.2+dfsg-6a+deb7u12.
    
    We recommend that you upgrade your qemu packages.
    
    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://www.debian.org/security/
    
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"15","type":"x","order":"1","pct":53.57,"resources":[]},{"id":"88","title":"Should be more technical","votes":"4","type":"x","order":"2","pct":14.29,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"9","type":"x","order":"3","pct":32.14,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.