Code Affecting qemu package, versions <1:2.3+dfsg-5


0.0
low

Snyk CVSS

    Attack Complexity Low
    User Interaction Required

    Threat Intelligence

    EPSS 0.04% (10th percentile)
Expand this section
NVD
3.3 low
Expand this section
Red Hat
6.2 medium

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-DEBIAN12-QEMU-1558179
  • published 26 Aug 2015
  • disclosed 26 Aug 2015

How to fix?

Upgrade Debian:12 qemu to version 1:2.3+dfsg-5 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream qemu package and not the qemu package as distributed by Debian. See How to fix? for Debian:12 relevant fixed versions and status.

The slirp_smb function in net/slirp.c in QEMU 2.3.0 and earlier creates temporary files with predictable names, which allows local users to cause a denial of service (instantiation failure) by creating /tmp/qemu-smb.- files before the program.