Please read this before reporting a bug:
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
FS#44958 - [qemu] CVE-2015-3456: vm escape -> arbitrary code execution on host system
Attached to Project:
Arch Linux
Opened by Levente Polyak (anthraxx) - Wednesday, 13 May 2015, 22:49 GMT
Last edited by Doug Newgard (Scimmia) - Wednesday, 13 May 2015, 22:55 GMT
Opened by Levente Polyak (anthraxx) - Wednesday, 13 May 2015, 22:49 GMT
Last edited by Doug Newgard (Scimmia) - Wednesday, 13 May 2015, 22:55 GMT
|
DetailsIt has been discovered [0] that qemu (including 2.3.x in testing) is vulnerable to arbitrary code execution affecting all default configurations.
This vulnerability is a out-of-bounds buffer access within the hardware fdc allowing vm escape and arbitrary code execution on the host system. It is highly recommended to apply the upstream patch [1] to the current release versions to mitigate this issue. The patch forces the fifo access to be in bounds of the allocated buffer. [0] http://venom.crowdstrike.com/ [1] http://git.qemu.org/?p=qemu.git;a=commitdiff;h=e907746266721f305d67bc0718795fedee2e824c |
This task depends upon
Closed by Doug Newgard (Scimmia)
Wednesday, 13 May 2015, 22:55 GMT
Reason for closing: Duplicate
Additional comments about closing: FS#44954
Wednesday, 13 May 2015, 22:55 GMT
Reason for closing: Duplicate
Additional comments about closing: