CVE-2015-8745
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
29/12/2016
Last modified:
12/04/2025
Description
QEMU (aka Quick Emulator) built with a VMWARE VMXNET3 paravirtual NIC emulator support is vulnerable to crash issue. It could occur while reading Interrupt Mask Registers (IMR). A privileged (CAP_SYS_RAWIO) guest user could use this flaw to crash the QEMU process instance resulting in DoS.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Base Score 2.0
2.10
Severity 2.0
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:* | 2.4.1 (including) | |
| cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://git.qemu.org/?p=qemu.git%3Ba%3Dcommit%3Bh%3Dc6048f849c7e3f009786df76206e895
- http://www.debian.org/security/2016/dsa-3471
- http://www.openwall.com/lists/oss-security/2016/01/04/4
- http://www.openwall.com/lists/oss-security/2016/01/04/7
- http://www.securityfocus.com/bid/79822
- http://www.securitytracker.com/id/1034575
- https://bugzilla.redhat.com/show_bug.cgi?id=1270876
- https://security.gentoo.org/glsa/201602-01
- http://git.qemu.org/?p=qemu.git%3Ba%3Dcommit%3Bh%3Dc6048f849c7e3f009786df76206e895
- http://www.debian.org/security/2016/dsa-3471
- http://www.openwall.com/lists/oss-security/2016/01/04/4
- http://www.openwall.com/lists/oss-security/2016/01/04/7
- http://www.securityfocus.com/bid/79822
- http://www.securitytracker.com/id/1034575
- https://bugzilla.redhat.com/show_bug.cgi?id=1270876
- https://security.gentoo.org/glsa/201602-01



