CVE-2016-5338

Priority
Description
The (1) esp_reg_read and (2) esp_reg_write functions in hw/scsi/esp.c in
QEMU allow local guest OS administrators to cause a denial of service (QEMU
process crash) or execute arbitrary code on the QEMU host via vectors
related to the information transfer buffer.
Assigned-to
mdeslaur
Notes
mdeslaurqemu-kvm in precise doesn't build esp.c on Ubuntu
Package
Source: qemu (LP Ubuntu Debian)
Upstream:needs-triage
Ubuntu 14.04 ESM (Trusty Tahr):released (2.0.0+dfsg-2ubuntu1.26)
Ubuntu 16.04 LTS (Xenial Xerus):released (1:2.5+dfsg-5ubuntu10.3)
Patches:
Upstream:http://git.qemu.org/?p=qemu.git;a=commit;h=ff589551c8e8e9e95e211b9d8daafb4ed39f1aec
Package
Upstream:needs-triage
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):DNE
More Information

Updated: 2019-12-05 18:45:42 UTC (commit dd38ff22974aae499eb50644b9d5a2817483cbdb)