First published: Thu Nov 19 2015(Updated: )
Heap-based buffer overflow in QEMU, when built with the Q35-chipset-based PC system emulator.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/qemu | 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u12 1:9.2.0+ds-2 1:9.2.0+ds-5 | |
QEMU KVM | <=2.4.1 | |
QEMU KVM | =2.5.0-rc0 | |
Debian Debian Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-8666 is a vulnerability in QEMU that allows for a heap-based buffer overflow.
CVE-2015-8666 affects QEMU when it is built with the Q35-chipset-based PC system emulator.
CVE-2015-8666 has a low severity.
QEMU versions 2.0.0+dfsg-2ubuntu1.22, 1:2.3+dfsg-5ubuntu9.2, and several other Debian versions are affected by CVE-2015-8666.
To fix CVE-2015-8666, update QEMU to version 2.0.0+dfsg-2ubuntu1.22 or apply the appropriate security patch for the specific Debian version being used.