Vulnerability Description
The process_tx_desc function in hw/net/e1000.c in QEMU before 2.4.0.1 does not properly process transmit descriptor data when sending a network packet, which allows attackers to cause a denial of service (infinite loop and guest crash) via unspecified vectors.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Qemu | Qemu | < 2.4.0.1 |
| Fedoraproject | Fedora | 21 |
| Novell | Suse Linux Enterprise Software Development Kit | 11.0 |
| Novell | Suse Linux Enterprise Debuginfo | 11.0 |
| Novell | Suse Linux Enterprise Desktop | 11.0 |
| Novell | Suse Linux Enterprise Server | 11.0 |
| Canonical | Ubuntu Linux | 12.04 |
| Redhat | Openstack | 5.0 |
| Redhat | Enterprise Linux | 5.0 |
| Xen | Xen | 4.4.3 |
| Arista | Eos | 4.12 |
Related Weaknesses (CWE)
References
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168077.htMailing ListThird Party Advisory
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168646.htMailing ListThird Party Advisory
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168671.htMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00026.htmlMailing ListPatchThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00005.htmlMailing ListPatchThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00011.htmlMailing ListPatchThird Party Advisory
- http://www.openwall.com/lists/oss-security/2015/09/04/4Mailing ListThird Party Advisory
- http://www.openwall.com/lists/oss-security/2015/09/05/5Mailing ListThird Party Advisory
- http://www.ubuntu.com/usn/USN-2745-1Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=1260076Issue TrackingPatchThird Party Advisory
- https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg01199.htmlMailing ListPatchThird Party Advisory
- https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg05832.htmlMailing ListPatchThird Party Advisory
- https://www.arista.com/en/support/advisories-notices/security-advisories/1188-seThird Party Advisory
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168077.htMailing ListThird Party Advisory
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168646.htMailing ListThird Party Advisory
FAQ
What is CVE-2015-6815?
CVE-2015-6815 is a vulnerability with a CVSS score of 3.5 (LOW). The process_tx_desc function in hw/net/e1000.c in QEMU before 2.4.0.1 does not properly process transmit descriptor data when sending a network packet, which allows attackers to cause a denial of serv...
How severe is CVE-2015-6815?
CVE-2015-6815 has been rated LOW with a CVSS base score of 3.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-6815?
Check the references section above for vendor advisories and patch information. Affected products include: Qemu Qemu, Fedoraproject Fedora, Novell Suse Linux Enterprise Software Development Kit, Novell Suse Linux Enterprise Debuginfo, Novell Suse Linux Enterprise Desktop.