First published: Mon Oct 12 2015(Updated: )
Last updated 24 July 2024
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU qemu | <=2.4.1 | |
Debian Debian Linux | =8.0 | |
debian/qemu | 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u7 1:9.2.0+ds-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-8745 is a vulnerability in QEMU, specifically in the VMWARE VMXNET3 paravirtual NIC emulator support, that could allow a privileged guest user to crash the QEMU process instance resulting in a denial-of-service (DoS) attack.
CVE-2015-8745 has a severity rating of 5.5, which is classified as medium.
QEMU versions up to and including 2.0.0+dfsg-2ubuntu1.22, 1:2.3+dfsg-5ubuntu9.2, and up to version 2.4.1 are affected. Debian Linux version 8.0 and certain versions of qemu package in Debian and Ubuntu are also affected.
To fix CVE-2015-8745, update QEMU to version 2.0.0+dfsg-2ubuntu1.22 or later, 1:2.3+dfsg-5ubuntu9.2 or later, or QEMU version 2.4.2 or later. For Debian and Ubuntu systems, follow the remediation steps provided in the respective security advisories.
You can find more information about CVE-2015-8745 on the following references: - [SecurityTracker](http://www.securitytracker.com/id/1034575) - [SecurityFocus](http://www.securityfocus.com/bid/79822) - [Debian Security Advisory](http://www.debian.org/security/2016/dsa-3471)