Description
QEMU (aka Quick Emulator) built with the NE2000 device emulation support is vulnerable to an OOB r/w access issue. It could occur while performing 'ioport' r/w operations. A privileged (CAP_SYS_RAWIO) user/process could use this flaw to leak or corrupt QEMU memory bytes.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-3469-1 | qemu security update |
Debian DSA |
DSA-3470-1 | qemu-kvm security update |
Debian DSA |
DSA-3471-1 | qemu security update |
EUVD |
EUVD-2015-8620 | QEMU (aka Quick Emulator) built with the NE2000 device emulation support is vulnerable to an OOB r/w access issue. It could occur while performing 'ioport' r/w operations. A privileged (CAP_SYS_RAWIO) user/process could use this flaw to leak or corrupt QEMU memory bytes. |
Ubuntu USN |
USN-2891-1 | QEMU vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T08:29:21.247Z
Reserved: 2016-01-04T00:00:00.000Z
Link: CVE-2015-8743
No data.
Status : Modified
Published: 2016-12-29T22:59:00.200
Modified: 2026-05-06T22:30:45.220
Link: CVE-2015-8743
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Ubuntu USN