First published: Fri Nov 06 2015(Updated: )
hw/ide/core.c in QEMU does not properly restrict the commands accepted by an ATAPI device, which allows guest users to cause a denial of service or possibly have unspecified other impact via certain IDE commands, as demonstrated by a WIN_READ_NATIVE_MAX command to an empty drive, which triggers a divide-by-zero error and instance crash.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU | <=2.4.1 | |
Debian | =7.0 | |
Debian | =8.0 | |
Debian | =9.0 | |
Fedora | =21 | |
Fedora | =22 | |
Fedora | =23 | |
SUSE Linux Enterprise Desktop | =12 | |
SUSE Linux Enterprise Server | =12 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =15.04 | |
Arista EOS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-6855 is classified as a medium severity vulnerability due to its potential for denial of service.
To fix CVE-2015-6855, update QEMU to version 2.4.2 or later, or apply the appropriate patches provided by your distribution.
CVE-2015-6855 affects multiple versions of QEMU and various Linux distributions including Debian, Fedora, SUSE, and Ubuntu.
CVE-2015-6855 can lead to denial of service or potentially other unspecified impacts when exploited.
CVE-2015-6855 was reported in October 2015.