First published: Tue Apr 11 2017(Updated: )
Last updated 24 July 2024
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU qemu | <=2.5.1 | |
Debian Debian Linux | =8.0 | |
debian/qemu | 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u7 1:9.2.0+ds-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2015-8568.
The title of the vulnerability is 'Memory leak in QEMU when built with a VMWARE VMXNET3 paravirtual NIC emulator support allows local g…'.
The severity of CVE-2015-8568 is medium (6.5).
CVE-2015-8568 affects QEMU when built with a VMWARE VMXNET3 paravirtual NIC emulator support.
Local guest users can cause a denial of service (host memory consumption) by trying to activate the vmxnet3 device repeatedly.
QEMU versions 2.0.0+dfsg-2ubuntu1.22, 1:2.3+dfsg-5ubuntu9.2, and 2.5.1 are affected by CVE-2015-8568.
To fix CVE-2015-8568 in QEMU on Ubuntu Trusty, update to version 2.0.0+dfsg-2ubuntu1.22 or later.
To fix CVE-2015-8568 in QEMU on Ubuntu Wily, update to version 1:2.3+dfsg-5ubuntu9.2 or later.
To fix CVE-2015-8568 in QEMU on Debian 8.0, update to the latest version available.
To fix CVE-2015-8568 in QEMU on Debian 10, update to version 1:3.1+dfsg-8+deb10u8 or later.
To fix CVE-2015-8568 in QEMU on Debian 11, update to version 1:5.2+dfsg-11+deb11u3 or later.
To fix CVE-2015-8568 in QEMU on Debian 12, update to version 1:8.1.2+ds-1 or later.
You can find more information about CVE-2015-8568 in the following references: [SecurityFocus](http://www.securityfocus.com/bid/79721), [Debian Security Advisory](http://www.debian.org/security/2016/dsa-3471), [Gentoo Linux Security Advisory](https://security.gentoo.org/glsa/201602-01).
The CWE ID associated with CVE-2015-8568 is CWE-772.