The process_tx_desc function in hw/net/e1000.c in QEMU before 2.4.0.1 does not properly process transmit descriptor data when sending a network packet, which allows attackers to cause a denial of service (infinite loop and guest crash) via unspecified vectors.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-3361-1 | qemu security update |
Debian DSA |
DSA-3362-1 | qemu-kvm security update |
EUVD |
EUVD-2015-6752 | The process_tx_desc function in hw/net/e1000.c in QEMU before 2.4.0.1 does not properly process transmit descriptor data when sending a network packet, which allows attackers to cause a denial of service (infinite loop and guest crash) via unspecified vectors. |
Ubuntu USN |
USN-2745-1 | QEMU vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T07:29:24.837Z
Reserved: 2015-09-05T00:00:00
Link: CVE-2015-6815
No data.
Status : Modified
Published: 2020-01-31T22:15:11.277
Modified: 2024-11-21T02:35:42.110
Link: CVE-2015-6815
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Ubuntu USN