First published: Thu Apr 13 2017(Updated: )
The eepro100 emulator in QEMU qemu-kvm blank allows local guest users to cause a denial of service (application crash and infinite loop) via vectors involving the command block list.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU KVM | <=2.4.1 | |
QEMU KVM | =2.5.0-rc0 | |
QEMU KVM | =2.5.0-rc1 | |
QEMU KVM | =2.5.0-rc2 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-8345 is classified as a moderate severity vulnerability due to its potential to cause denial of service.
To fix CVE-2015-8345, you should upgrade to QEMU versions later than 2.4.1 or specific release candidates 2.5.0-rc0, 2.5.0-rc1, or 2.5.0-rc2.
CVE-2015-8345 affects QEMU KVM versions up to 2.4.1 and specific release candidates 2.5.0-rc0, 2.5.0-rc1, and 2.5.0-rc2, as well as Debian versions 7.0 and 8.0.
The impact of CVE-2015-8345 includes application crashes and infinite loops caused by local guest users.
Local guest users on systems running vulnerable versions of QEMU KVM or Debian could be at risk from CVE-2015-8345.