CVE-2015-8817
Severity CVSS v4.0:
Pending analysis
Type:
CWE-125
Out-of-bounds Read
Publication date:
29/12/2016
Last modified:
12/04/2025
Description
QEMU (aka Quick Emulator) built to use 'address_space_translate' to map an address to a MemoryRegionSection is vulnerable to an OOB r/w access issue. It could occur while doing pci_dma_read/write calls. Affects QEMU versions >= 1.6.0 and
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Base Score 2.0
2.10
Severity 2.0
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:qemu:qemu:1.6.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:qemu:qemu:1.6.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:a:qemu:qemu:1.6.0:rc2:*:*:*:*:*:* | ||
| cpe:2.3:a:qemu:qemu:1.6.0:rc3:*:*:*:*:*:* | ||
| cpe:2.3:a:qemu:qemu:1.6.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:qemu:qemu:1.6.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:qemu:qemu:1.7.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:qemu:qemu:2.0.0:-:*:*:*:*:*:* | ||
| cpe:2.3:a:qemu:qemu:2.0.0:rc0:*:*:*:*:*:* | ||
| cpe:2.3:a:qemu:qemu:2.0.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:a:qemu:qemu:2.0.0:rc2:*:*:*:*:*:* | ||
| cpe:2.3:a:qemu:qemu:2.0.0:rc3:*:*:*:*:*:* | ||
| cpe:2.3:a:qemu:qemu:2.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:qemu:qemu:2.1.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:qemu:qemu:2.1.0:rc0:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://git.qemu.org/?p=qemu.git%3Ba%3Dcommit%3Bh%3D23820dbfc79d1c9dce090b4c555994f2bb6a69b3
- http://git.qemu.org/?p=qemu.git%3Ba%3Dcommit%3Bh%3Dc3c1bb99d1c11978d9ce94d1bdcf0705378c1459
- http://rhn.redhat.com/errata/RHSA-2016-2670.html
- http://rhn.redhat.com/errata/RHSA-2016-2671.html
- http://rhn.redhat.com/errata/RHSA-2016-2704.html
- http://rhn.redhat.com/errata/RHSA-2016-2705.html
- http://rhn.redhat.com/errata/RHSA-2016-2706.html
- http://www.openwall.com/lists/oss-security/2016/03/01/1
- http://www.openwall.com/lists/oss-security/2016/03/01/10
- https://bugzilla.redhat.com/show_bug.cgi?id=1300771
- https://lists.gnu.org/archive/html/qemu-stable/2016-01/msg00060.html
- http://git.qemu.org/?p=qemu.git%3Ba%3Dcommit%3Bh%3D23820dbfc79d1c9dce090b4c555994f2bb6a69b3
- http://git.qemu.org/?p=qemu.git%3Ba%3Dcommit%3Bh%3Dc3c1bb99d1c11978d9ce94d1bdcf0705378c1459
- http://rhn.redhat.com/errata/RHSA-2016-2670.html
- http://rhn.redhat.com/errata/RHSA-2016-2671.html
- http://rhn.redhat.com/errata/RHSA-2016-2704.html
- http://rhn.redhat.com/errata/RHSA-2016-2705.html
- http://rhn.redhat.com/errata/RHSA-2016-2706.html
- http://www.openwall.com/lists/oss-security/2016/03/01/1
- http://www.openwall.com/lists/oss-security/2016/03/01/10
- https://bugzilla.redhat.com/show_bug.cgi?id=1300771
- https://lists.gnu.org/archive/html/qemu-stable/2016-01/msg00060.html



