Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2015-8745

Опубликовано: 29 дек. 2016
Источник: ubuntu
Приоритет: medium
CVSS2: 2.1
CVSS3: 5.5

Описание

QEMU (aka Quick Emulator) built with a VMWARE VMXNET3 paravirtual NIC emulator support is vulnerable to crash issue. It could occur while reading Interrupt Mask Registers (IMR). A privileged (CAP_SYS_RAWIO) guest user could use this flaw to crash the QEMU process instance resulting in DoS.

РелизСтатусПримечание
devel

not-affected

1:2.5+dfsg-1ubuntu3
esm-infra-legacy/trusty

released

2.0.0+dfsg-2ubuntu1.22
precise

DNE

trusty

released

2.0.0+dfsg-2ubuntu1.22
trusty/esm

released

2.0.0+dfsg-2ubuntu1.22
upstream

needs-triage

vivid

ignored

end of life
vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

wily

released

1:2.3+dfsg-5ubuntu9.2

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

precise

not-affected

code not present
trusty

DNE

trusty/esm

DNE

upstream

needs-triage

vivid

DNE

vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

wily

DNE

Показывать по

2.1 Low

CVSS2

5.5 Medium

CVSS3

Связанные уязвимости

redhat
больше 10 лет назад

QEMU (aka Quick Emulator) built with a VMWARE VMXNET3 paravirtual NIC emulator support is vulnerable to crash issue. It could occur while reading Interrupt Mask Registers (IMR). A privileged (CAP_SYS_RAWIO) guest user could use this flaw to crash the QEMU process instance resulting in DoS.

CVSS3: 5.5
nvd
около 9 лет назад

QEMU (aka Quick Emulator) built with a VMWARE VMXNET3 paravirtual NIC emulator support is vulnerable to crash issue. It could occur while reading Interrupt Mask Registers (IMR). A privileged (CAP_SYS_RAWIO) guest user could use this flaw to crash the QEMU process instance resulting in DoS.

CVSS3: 5.5
debian
около 9 лет назад

QEMU (aka Quick Emulator) built with a VMWARE VMXNET3 paravirtual NIC ...

CVSS3: 5.5
github
больше 3 лет назад

QEMU (aka Quick Emulator) built with a VMWARE VMXNET3 paravirtual NIC emulator support is vulnerable to crash issue. It could occur while reading Interrupt Mask Registers (IMR). A privileged (CAP_SYS_RAWIO) guest user could use this flaw to crash the QEMU process instance resulting in DoS.

suse-cvrf
почти 10 лет назад

Security update for xen

2.1 Low

CVSS2

5.5 Medium

CVSS3

Уязвимость CVE-2015-8745