CVE-2015-7295
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
09/11/2015
Last modified:
12/04/2025
Description
hw/virtio/virtio.c in the Virtual Network Device (virtio-net) support in QEMU, when big or mergeable receive buffers are not supported, allows remote attackers to cause a denial of service (guest network consumption) via a flood of jumbo frames on the (1) tuntap or (2) macvtap interface.
Impact
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:* | 2.4.1 (including) | |
| cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:* | ||
| cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169624.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169767.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169802.html
- http://www.debian.org/security/2016/dsa-3469
- http://www.debian.org/security/2016/dsa-3470
- http://www.debian.org/security/2016/dsa-3471
- http://www.openwall.com/lists/oss-security/2015/09/18/5
- http://www.openwall.com/lists/oss-security/2015/09/18/9
- http://www.securityfocus.com/bid/82672
- https://security.gentoo.org/glsa/201602-01
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169624.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169767.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169802.html
- http://www.debian.org/security/2016/dsa-3469
- http://www.debian.org/security/2016/dsa-3470
- http://www.debian.org/security/2016/dsa-3471
- http://www.openwall.com/lists/oss-security/2015/09/18/5
- http://www.openwall.com/lists/oss-security/2015/09/18/9
- http://www.securityfocus.com/bid/82672
- https://security.gentoo.org/glsa/201602-01



