First published: Mon Dec 14 2015(Updated: )
Last updated 24 July 2024
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/qemu | 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u12 1:9.2.1+ds-1 | |
QEMU | <2.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2015-7549 is low.
CVE-2015-7549 allows local guest OS privileged users to cause a denial of service by leveraging failure to define the .write method.
QEMU versions up to exclusive 2.0.0+dfsg-2ubuntu1.22 and 1:2.3+dfsg-5ubuntu9.2 are affected by CVE-2015-7549.
To fix CVE-2015-7549 in QEMU on Ubuntu, update to version 2.0.0+dfsg-2ubuntu1.22 or 1:2.3+dfsg-5ubuntu9.2.
You can find more information about CVE-2015-7549 on the following references: http://www.securityfocus.com/bid/80761, http://www.debian.org/security/2016/dsa-3471, http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175380.html