QEMU net/pcnet. c Buffer Overflow Vulnerability (CVE-2015-7512)
QEMU net/pcnet. c Buffer Overflow Vulnerability (CVE-2015-7512)
Release date:
Updated on:
Affected Systems:
QEMU
Description:
CVE (CAN) ID: CVE-2015-7512
QEMU is an open source simulator software.
The Qemu of the amd pc-Net II Ethernet Controller is enabled with the heap buffer overflow vulnerability. When receiving data packets in non-return mode, the size of the received data cannot be verified, leading to buffer overflow and arbitrary code execution on the host.
<* Source: Jason Wang
Ling Liu
*>
Suggestion:
Vendor patch:
QEMU
----
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:
Https://lists.gnu.org/archive/html/qemu-devel/2015-11/msg06341.html
Use KVM + Qemu to build a virtual machine in Ubuntu
Linux getting started Tutorial: QEMU for Virtual Machine experience
Ubuntu 12.04 cannot find the Qemu command
Install QEMU + efi bios on Arch Linux
QEMU translation framework and debugging tools
QEMU code analysis: BIOS loading process
QEMU details: click here
QEMU: click here
This article permanently updates the link address: