Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.703471
Category:Debian Local Security Checks
Title:Debian: Security Advisory (DSA-3471-1)
Summary:The remote host is missing an update for the Debian 'qemu' package(s) announced via the DSA-3471-1 advisory.
Description:Summary:
The remote host is missing an update for the Debian 'qemu' package(s) announced via the DSA-3471-1 advisory.

Vulnerability Insight:
Several vulnerabilities were discovered in qemu, a full virtualization solution on x86 hardware.

CVE-2015-7295

Jason Wang of Red Hat Inc. discovered that the Virtual Network Device support is vulnerable to denial-of-service, that could occur when receiving large packets.

CVE-2015-7504

Qinghao Tang of Qihoo 360 Inc. and Ling Liu of Qihoo 360 Inc. discovered that the PC-Net II ethernet controller is vulnerable to a heap-based buffer overflow that could result in denial-of-service (via application crash) or arbitrary code execution.

CVE-2015-7512

Ling Liu of Qihoo 360 Inc. and Jason Wang of Red Hat Inc. discovered that the PC-Net II ethernet controller is vulnerable to a buffer overflow that could result in denial-of-service (via application crash) or arbitrary code execution.

CVE-2015-7549

Qinghao Tang of Qihoo 360 Inc. and Ling Liu of Qihoo 360 Inc. discovered that the PCI MSI-X emulator is vulnerable to a null pointer dereference issue, that could lead to denial-of-service (via application crash).

CVE-2015-8345

Qinghao Tang of Qihoo 360 Inc. discovered that the eepro100 emulator contains a flaw that could lead to an infinite loop when processing Command Blocks, eventually resulting in denial-of-service (via application crash).

CVE-2015-8504

Lian Yihan of Qihoo 360 Inc. discovered that the VNC display driver support is vulnerable to an arithmetic exception flaw that could lead to denial-of-service (via application crash).

CVE-2015-8550

Felix Wilhelm of ERNW Research discovered that the PV backend drivers are vulnerable to double fetch vulnerabilities, possibly resulting in arbitrary code execution.

CVE-2015-8558

Qinghao Tang of Qihoo 360 Inc. discovered that the USB EHCI emulation support contains a flaw that could lead to an infinite loop during communication between the host controller and a device driver. This could lead to denial-of-service (via resource exhaustion).

CVE-2015-8567

CVE-2015-8568

Qinghao Tang of Qihoo 360 Inc. discovered that the vmxnet3 device emulator could be used to intentionally leak host memory, thus resulting in denial-of-service.

CVE-2015-8613

Qinghao Tang of Qihoo 360 Inc. discovered that the SCSI MegaRAID SAS HBA emulation support is vulnerable to a stack-based buffer overflow issue, that could lead to denial-of-service (via application crash).

CVE-2015-8619

Ling Liu of Qihoo 360 Inc. discovered that the Human Monitor Interface support is vulnerable to an out-of-bound write access issue that could result in denial-of-service (via application crash).

CVE-2015-8743

Ling Liu of Qihoo 360 Inc. discovered that the NE2000 emulator is vulnerable to an out-of-bound read/write access issue, potentially resulting in information leak or memory corruption.

CVE-2015-8744

The vmxnet3 driver incorrectly processes small packets, which could result in denial-of-service (via application crash).

CVE-2015-8745

The vmxnet3 driver ... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'qemu' package(s) on Debian 8.

Solution:
Please install the updated package(s).

CVSS Score:
6.9

CVSS Vector:
AV:L/AC:M/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2015-7295
82672
http://www.securityfocus.com/bid/82672
DSA-3469
http://www.debian.org/security/2016/dsa-3469
DSA-3470
http://www.debian.org/security/2016/dsa-3470
DSA-3471
http://www.debian.org/security/2016/dsa-3471
FEDORA-2015-d5c1048b47
http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169802.html
FEDORA-2015-d8510319c0
http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169624.html
FEDORA-2015-fca1900745
http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169767.html
GLSA-201602-01
https://security.gentoo.org/glsa/201602-01
[oss-security] 20150918 CVE request Qemu: net: virtio-net possible remote DoS
http://www.openwall.com/lists/oss-security/2015/09/18/5
[oss-security] 20150918 Re: CVE request Qemu: net: virtio-net possible remote DoS
http://www.openwall.com/lists/oss-security/2015/09/18/9
Common Vulnerability Exposure (CVE) ID: CVE-2015-7504
1034268
http://www.securitytracker.com/id/1034268
78227
http://www.securityfocus.com/bid/78227
GLSA-201604-03
https://security.gentoo.org/glsa/201604-03
RHSA-2015:2694
http://rhn.redhat.com/errata/RHSA-2015-2694.html
RHSA-2015:2695
http://rhn.redhat.com/errata/RHSA-2015-2695.html
RHSA-2015:2696
http://rhn.redhat.com/errata/RHSA-2015-2696.html
[Qemu-devel] 20151130 [PATCH for 2.5 1/2] net: pcnet: add check to validate receive data size(CVE-2015-7504)
https://lists.gnu.org/archive/html/qemu-devel/2015-11/msg06342.html
[oss-security] 20151130 CVE-2015-7504 Qemu: net: pcnet: heap overflow vulnerability in loopback mode
http://www.openwall.com/lists/oss-security/2015/11/30/2
http://xenbits.xen.org/xsa/advisory-162.html
Common Vulnerability Exposure (CVE) ID: CVE-2015-7512
1034527
http://www.securitytracker.com/id/1034527
78230
http://www.securityfocus.com/bid/78230
[oss-security] 20151130 CVE-2015-7512 Qemu: net: pcnet: buffer overflow in non-loopback mode
http://www.openwall.com/lists/oss-security/2015/11/30/3
http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=8b98a2f07175d46c3f7217639bd5e03f
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
Common Vulnerability Exposure (CVE) ID: CVE-2015-7549
80761
http://www.securityfocus.com/bid/80761
FEDORA-2016-e9bba2bb01
http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175380.html
[oss-security] 20151214 CVE-2015-7549 Qemu: pci: msi-x: null pointer dereference issue
http://www.openwall.com/lists/oss-security/2015/12/14/2
http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=43b11a91dd861a946b231b89b754285
https://bugzilla.redhat.com/show_bug.cgi?id=1291137
Common Vulnerability Exposure (CVE) ID: CVE-2015-8345
BugTraq ID: 77985
http://www.securityfocus.com/bid/77985
Debian Security Information: DSA-3469 (Google Search)
Debian Security Information: DSA-3470 (Google Search)
Debian Security Information: DSA-3471 (Google Search)
http://www.openwall.com/lists/oss-security/2015/11/25/11
https://lists.gnu.org/archive/html/qemu-devel/2015-10/msg03911.html
Common Vulnerability Exposure (CVE) ID: CVE-2015-8504
78708
http://www.securityfocus.com/bid/78708
[oss-security] 20151208 Re: CVE request: Qemu: ui: vnc: avoid floating point exception
http://www.openwall.com/lists/oss-security/2015/12/08/7
http://git.qemu-project.org/?p=qemu.git%3Ba=commitdiff%3Bh=4c65fed8bdf96780735dbdb92a8
https://bugzilla.redhat.com/show_bug.cgi?id=1289541
Common Vulnerability Exposure (CVE) ID: CVE-2015-8550
BugTraq ID: 79592
http://www.securityfocus.com/bid/79592
Debian Security Information: DSA-3434 (Google Search)
http://www.debian.org/security/2016/dsa-3434
Debian Security Information: DSA-3519 (Google Search)
http://www.debian.org/security/2016/dsa-3519
http://www.securitytracker.com/id/1034479
SuSE Security Announcement: SUSE-SU-2016:0911 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html
SuSE Security Announcement: SUSE-SU-2016:1102 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html
SuSE Security Announcement: SUSE-SU-2016:1764 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
Common Vulnerability Exposure (CVE) ID: CVE-2015-8558
80694
http://www.securityfocus.com/bid/80694
[oss-security] 20151214 CVE request Qemu: usb: infinite loop in ehci_advance_state results in DoS
http://www.openwall.com/lists/oss-security/2015/12/14/9
[oss-security] 20151214 Re: CVE request Qemu: usb: infinite loop in ehci_advance_state results in DoS
http://www.openwall.com/lists/oss-security/2015/12/14/16
[qemu-devel] 20151214 [PATCH] ehci: make idt processing more robust
https://lists.gnu.org/archive/html/qemu-devel/2015-12/msg02124.html
http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=156a2e4dbffa85997636a7a39ef12da6f1b40254
https://bugzilla.redhat.com/show_bug.cgi?id=1277983
Common Vulnerability Exposure (CVE) ID: CVE-2015-8567
79721
http://www.securityfocus.com/bid/79721
FEDORA-2016-275e9ff483
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176558.html
FEDORA-2016-2c15b72b01
http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176300.html
FEDORA-2016-42778e8c82
http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175967.html
FEDORA-2016-e1784417af
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176503.html
SUSE-SU-2016:0873
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html
SUSE-SU-2016:0955
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html
SUSE-SU-2016:1318
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html
SUSE-SU-2016:1560
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html
SUSE-SU-2016:1703
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html
USN-2891-1
http://www.ubuntu.com/usn/USN-2891-1
[oss-security] 20151215 Re: CVE request Qemu: net: vmxnet3: host memory leakage
http://www.openwall.com/lists/oss-security/2015/12/15/10
[qemu-devel] 20151215 Re: [Qemu-devel] net: vmxnet3: memory leakage issue
https://lists.gnu.org/archive/html/qemu-devel/2015-12/msg02299.html
openSUSE-SU-2016:0123
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00010.html
openSUSE-SU-2016:0126
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html
openSUSE-SU-2016:1750
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html
Common Vulnerability Exposure (CVE) ID: CVE-2015-8568
https://bugzilla.redhat.com/show_bug.cgi?id=1289816
Common Vulnerability Exposure (CVE) ID: CVE-2015-8613
79719
http://www.securityfocus.com/bid/79719
GLSA-201604-01
https://security.gentoo.org/glsa/201604-01
[oss-security] 20151221 Re: CVE request: Qemu: scsi: stack based buffer overflow in megasas_ctrl_get_info
http://www.openwall.com/lists/oss-security/2015/12/22/1
[qemu-devel] 20151221 [Qemu-devel] [PATCH] scsi: initialise info object with appropriate size
https://lists.gnu.org/archive/html/qemu-devel/2015-12/msg03737.html
https://bugzilla.redhat.com/show_bug.cgi?id=1284008
Common Vulnerability Exposure (CVE) ID: CVE-2015-8619
79668
http://www.securityfocus.com/bid/79668
[oss-security] 20151223 CVE request Qemu: hmp: stack based OOB write in hmp_sendkey routine
http://www.openwall.com/lists/oss-security/2015/12/23/1
[qemu-devel] 20151217 [Qemu-devel] [PATCH] hmp: avoid redundant null termination of buffer
https://lists.gnu.org/archive/html/qemu-devel/2015-12/msg02930.html
Common Vulnerability Exposure (CVE) ID: CVE-2015-8743
1034574
http://www.securitytracker.com/id/1034574
79820
http://www.securityfocus.com/bid/79820
[oss-security] 20160104 CVE request Qemu: net: ne2000: OOB r/w in ioport operations
http://www.openwall.com/lists/oss-security/2016/01/04/1
[oss-security] 20160104 Re: CVE request Qemu: net: ne2000: OOB r/w in ioport operations
http://www.openwall.com/lists/oss-security/2016/01/04/2
[qemu-devel] 20160104 Re: [PATCH v3] net: ne2000: fix bounds check in ioport operations
https://lists.gnu.org/archive/html/qemu-devel/2016-01/msg00050.html
https://bugzilla.redhat.com/show_bug.cgi?id=1264929
Common Vulnerability Exposure (CVE) ID: CVE-2015-8744
1034576
http://www.securitytracker.com/id/1034576
79821
http://www.securityfocus.com/bid/79821
[oss-security] 20160104 CVE request Qemu: net: vmxnet3: incorrect l2 header validation leads to a crash
http://www.openwall.com/lists/oss-security/2016/01/04/3
[oss-security] 20160104 Re: CVE request Qemu: net: vmxnet3: incorrect l2 header validation leads to a crash
http://www.openwall.com/lists/oss-security/2016/01/04/6
http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=a7278b36fcab9af469563bd7b
https://bugzilla.redhat.com/show_bug.cgi?id=1270871
Common Vulnerability Exposure (CVE) ID: CVE-2015-8745
1034575
http://www.securitytracker.com/id/1034575
79822
http://www.securityfocus.com/bid/79822
[oss-security] 20160104 CVE request Qemu: net: vmxnet3: reading IMR registers leads to a crash
http://www.openwall.com/lists/oss-security/2016/01/04/4
[oss-security] 20160104 Re: CVE request Qemu: net: vmxnet3: reading IMR registers leads to a crash
http://www.openwall.com/lists/oss-security/2016/01/04/7
http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=c6048f849c7e3f009786df76206e895
https://bugzilla.redhat.com/show_bug.cgi?id=1270876
Common Vulnerability Exposure (CVE) ID: CVE-2016-1568
1034859
http://www.securitytracker.com/id/1034859
80191
http://www.securityfocus.com/bid/80191
RHSA-2016:0084
http://rhn.redhat.com/errata/RHSA-2016-0084.html
RHSA-2016:0086
http://rhn.redhat.com/errata/RHSA-2016-0086.html
RHSA-2016:0087
http://rhn.redhat.com/errata/RHSA-2016-0087.html
RHSA-2016:0088
http://rhn.redhat.com/errata/RHSA-2016-0088.html
[oss-security] 20160109 Qemu: ide: ahci use-after-free vulnerability in aio port commands
http://www.openwall.com/lists/oss-security/2016/01/09/1
[oss-security] 20160109 Re: Qemu: ide: ahci use-after-free vulnerability in aio port commands
http://www.openwall.com/lists/oss-security/2016/01/09/2
http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=4ab0359a8ae182a7ac5c99609667273167703fab
Common Vulnerability Exposure (CVE) ID: CVE-2016-1714
1034858
http://www.securitytracker.com/id/1034858
80250
http://www.securityfocus.com/bid/80250
RHSA-2016:0081
http://rhn.redhat.com/errata/RHSA-2016-0081.html
RHSA-2016:0082
http://rhn.redhat.com/errata/RHSA-2016-0082.html
RHSA-2016:0083
http://rhn.redhat.com/errata/RHSA-2016-0083.html
RHSA-2016:0085
http://rhn.redhat.com/errata/RHSA-2016-0085.html
[Qemu-devel] 20160106 [PATCH v2 for v2.3.0] fw_cfg: add check to validate current entry value
https://lists.gnu.org/archive/html/qemu-devel/2016-01/msg00428.html
[oss-security] 20160111 CVE request Qemu: nvram: OOB r/w access in processing firmware configurations
http://www.openwall.com/lists/oss-security/2016/01/11/7
[oss-security] 20160112 Re: CVE request Qemu: nvram: OOB r/w access in processing firmware configurations
http://www.openwall.com/lists/oss-security/2016/01/12/10
[oss-security] 20160112 Re: Re: CVE request Qemu: nvram: OOB r/w access in processing firmware configurations
http://www.openwall.com/lists/oss-security/2016/01/12/11
Common Vulnerability Exposure (CVE) ID: CVE-2016-1922
81058
http://www.securityfocus.com/bid/81058
[oss-security] 20160116 CVE request Qemu: i386: null pointer dereference in vapic_write
http://www.openwall.com/lists/oss-security/2016/01/16/1
[oss-security] 20160116 Re: CVE request Qemu: i386: null pointer dereference in vapic_write
http://www.openwall.com/lists/oss-security/2016/01/16/6
[qemu-devel] 20160115 [PULL] i386: avoid null pointer dereference
https://lists.gnu.org/archive/html/qemu-devel/2016-01/msg02812.html
https://bugzilla.redhat.com/show_bug.cgi?id=1283934
Common Vulnerability Exposure (CVE) ID: CVE-2016-1981
81549
http://www.securityfocus.com/bid/81549
RHSA-2016:2585
http://rhn.redhat.com/errata/RHSA-2016-2585.html
[oss-security] 20160119 CVE request Qemu: net: e1000 infinite loop in start_xmit and e1000_receive_iov routines
http://www.openwall.com/lists/oss-security/2016/01/19/10
[oss-security] 20160122 Re: CVE request Qemu: net: e1000 infinite loop in start_xmit and e1000_receive_iov routines
http://www.openwall.com/lists/oss-security/2016/01/22/1
[qemu-devel] 20160119 [PATCH] e1000: eliminate infinite loops on out-of-bounds transfer start
https://lists.gnu.org/archive/html/qemu-devel/2016-01/msg03454.html
https://bugzilla.redhat.com/show_bug.cgi?id=1298570
CopyrightCopyright (C) 2016 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.