First published: Mon Oct 12 2015(Updated: )
Last updated 24 July 2024
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU qemu | <=2.4.1 | |
Debian Debian Linux | =8.0 | |
debian/qemu | 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u7 1:9.2.0+ds-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-8744 is a vulnerability in QEMU (Quick Emulator) that occurs when a guest sends a Layer-2 packet smaller than 22 bytes, resulting in a crash issue and possible DoS.
CVE-2015-8744 is considered to be a low severity vulnerability.
QEMU (Quick Emulator) versions 2.0.0 up to exclusive 2.0.0+dfsg-2ubuntu1.22, 1:2.3+dfsg-5ubuntu9.2, and other versions listed in the vulnerability description are affected.
To fix CVE-2015-8744, update QEMU to version 2.0.0+dfsg-2ubuntu1.22 or apply the appropriate security patches for other affected versions.
You can find more information about CVE-2015-8744 on the following websites: SecurityTracker (http://www.securitytracker.com/id/1034576), SecurityFocus (http://www.securityfocus.com/bid/79821), and Debian Security Advisory (http://www.debian.org/security/2016/dsa-3471).