Qemu post-release Reuse Vulnerability (CVE-2015-5166)
Qemu post-release Reuse Vulnerability (CVE-2015-5166)
Release date:
Updated on:
Affected Systems:
QEMU
Description:
CVE (CAN) ID: CVE-2015-5166
QEMU is an open source simulator software.
When the Qemu supporting IDE Emulation PCI PIIX3/4 writes data to the client's I/O port, the vulnerability is released and reused. Client users can exploit this vulnerability to crash the Qemu instance, this causes a denial of service.
<* Source: Donghai Zhu
Link: https://bugzilla.redhat.com/show_bug.cgi? Id = 1248760
*>
Suggestion:
Vendor patch:
QEMU
----
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:
Http://fabrice.bellard.free.fr/qemu/
Http://xenbits.xen.org/xsa/advisory-139.html
Http://xenbits.xen.org/xsa/advisory-140.html
Linux getting started Tutorial: QEMU for Virtual Machine experience
Ubuntu 12.04 cannot find the Qemu command
Install QEMU + efi bios on Arch Linux
QEMU translation framework and debugging tools
QEMU code analysis: BIOS loading process
QEMU details: click here
QEMU: click here
This article permanently updates the link address: