Description
The process_tx_desc function in hw/net/e1000.c in QEMU before 2.4.0.1 does not properly process transmit descriptor data when sending a network packet, which allows attackers to cause a denial of service (infinite loop and guest crash) via unspecified vectors.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-3361-1 | qemu security update |
Debian DSA |
DSA-3362-1 | qemu-kvm security update |
EUVD |
EUVD-2015-6752 | The process_tx_desc function in hw/net/e1000.c in QEMU before 2.4.0.1 does not properly process transmit descriptor data when sending a network packet, which allows attackers to cause a denial of service (infinite loop and guest crash) via unspecified vectors. |
Ubuntu USN |
USN-2745-1 | QEMU vulnerabilities |
References
History
No history.
Subscriptions
Arista
Subscribe
Eos
Subscribe
Canonical
Subscribe
Ubuntu Linux
Subscribe
Fedoraproject
Subscribe
Fedora
Subscribe
Novell
Subscribe
Suse Linux Enterprise Debuginfo
Subscribe
Suse Linux Enterprise Desktop
Subscribe
Suse Linux Enterprise Server
Subscribe
Suse Linux Enterprise Software Development Kit
Subscribe
Qemu
Subscribe
Qemu
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Openstack
Subscribe
Xen
Subscribe
Xen
Subscribe
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T07:29:24.837Z
Reserved: 2015-09-05T00:00:00.000Z
Link: CVE-2015-6815
No data.
Status : Modified
Published: 2020-01-31T22:15:11.277
Modified: 2024-11-21T02:35:42.110
Link: CVE-2015-6815
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN