QEMU 'hw/scsi/esp.c'远程代码执行漏洞(CVE-2016-6351)

漏洞描述
QEMU是一款开源模拟器软件。
QEMU若支持ESP/NCR53C9x控制器仿真,在hw/scsi/esp.c/esp_do_dma函数存在安全漏洞。本地客户端管理员可造成QEMU主机拒绝服务或执行任意代码。
解决方法
以下是各Linux/Unix发行版系统针对此漏洞发布的安全公告,可以参考对应系统的安全公告修复该漏洞:
Ubuntu
----------------
USN-3047-1: [USN-3047-1] QEMU vulnerabilities
链接: https://www.ubuntu.com/usn/usn-3047-1
openSUSE
----------------
openSUSE-SU-2016:2497-1: openSUSE Security Update: Security update for xen
链接: https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00022.html
openSUSE-SU-2016:2494-1: openSUSE Security Update: Security update for xen
链接: https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html
SUSE
----------------
链接: https://www.suse.com/security/cve/CVE-2016-6351/
Fedora
----------------
FEDORA-2016-a56fb613a8: Fedora 24 Update: qemu-2.6.2-2.fc24
链接: https://lists.fedoraproject.org/archives/list/[email protected]/thread/2RYQ3BOGMGS2MIBXWHCTGWK6KURJ5EHM/
FEDORA-2016-0049aa6e5d: Fedora 23 Update: xen-4.5.3-9.fc23
链接: https://lists.fedoraproject.org/archives/list/[email protected]/thread/4ONTL7WMM4WUFAMADI7KQREYSPCSKWDR/
FEDORA-2016-01cc766201: Fedora 24 Update: xen-4.6.3-4.fc24
链接: https://lists.fedoraproject.org/archives/list/[email protected]/thread/GXKRUQ7SNOOBWOQLZI5AH7D5MSDQGYPT/

猜你喜欢

转载自www.cnblogs.com/mrhonest/p/10910439.html