First published: Wed Dec 09 2015(Updated: )
Last updated 24 July 2024
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU qemu | <=2.5.1.1 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =15.10 | |
Debian Debian Linux | =8.0 | |
SUSE Linux Enterprise Debuginfo | =11-sp4 | |
openSUSE Leap | =42.1 | |
openSUSE openSUSE | =13.2 | |
SUSE Linux Enterprise Desktop | =11-sp4 | |
SUSE Linux Enterprise Desktop | =12 | |
SUSE Linux Enterprise Desktop | =12-sp1 | |
SUSE Linux Enterprise Server | =11-sp4 | |
SUSE Linux Enterprise Server | =12 | |
SUSE Linux Enterprise Server | =12-sp1 | |
SUSE Linux Enterprise Software Development Kit | =11-sp4 | |
SUSE Linux Enterprise Software Development Kit | =12 | |
SUSE Linux Enterprise Software Development Kit | =12-sp1 | |
Fedoraproject Fedora | =22 | |
Fedoraproject Fedora | =23 | |
debian/qemu | 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u7 1:9.1.1+ds-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-8567 is a vulnerability in QEMU that allows remote attackers to cause a denial of service by consuming excessive memory.
CVE-2015-8567 has a severity rating of 7.7, which is considered high.
CVE-2015-8567 affects QEMU versions 2.0.0+dfsg-2ubuntu1.22, 1:2.3+dfsg-5ubuntu9.2, and 2.5.1.1, as well as various versions of Ubuntu, Debian, SUSE, openSUSE, Fedora, and Canonical Ubuntu Linux.
To fix CVE-2015-8567, you should apply the appropriate security patches provided by the software vendor.
You can find more information about CVE-2015-8567 at the following references: http://www.securityfocus.com/bid/79721, http://www.debian.org/security/2016/dsa-3471, http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176558.html