CVE-2015-6815

Publication date 8 September 2015

Last updated 24 July 2024


Ubuntu priority

Cvss 3 Severity Score

3.5 · Low

Score breakdown

The process_tx_desc function in hw/net/e1000.c in QEMU before 2.4.0.1 does not properly process transmit descriptor data when sending a network packet, which allows attackers to cause a denial of service (infinite loop and guest crash) via unspecified vectors.

Status

Package Ubuntu Release Status
qemu 15.04 vivid
Fixed 1:2.2+dfsg-5expubuntu9.5
14.04 LTS trusty
Fixed 2.0.0+dfsg-2ubuntu1.19
12.04 LTS precise Not in release
qemu-kvm 15.04 vivid Not in release
14.04 LTS trusty Not in release
12.04 LTS precise
Fixed 1.0+noroms-0ubuntu14.25

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
qemu

Severity score breakdown

Parameter Value
Base score 3.5 · Low
Attack vector Adjacent
Attack complexity Low
Privileges required Low
User interaction None
Scope Unchanged
Confidentiality None
Integrity impact None
Availability impact Low
Vector CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

References

Related Ubuntu Security Notices (USN)

    • USN-2745-1
    • QEMU vulnerabilities
    • 24 September 2015

Other references