Critical severity9.0NVD Advisory· Published Jan 8, 2016· Updated May 6, 2026
CVE-2015-7512
CVE-2015-7512
Description
Buffer overflow in the pcnet_receive function in hw/net/pcnet.c in QEMU, when a guest NIC has a larger MTU, allows remote attackers to cause a denial of service (guest OS crash) or execute arbitrary code via a large packet.
Affected products
13- cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
11- rhn.redhat.com/errata/RHSA-2015-2694.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2015-2695.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2015-2696.htmlnvdThird Party Advisory
- www.debian.org/security/2016/dsa-3469nvdThird Party Advisory
- www.debian.org/security/2016/dsa-3470nvdThird Party Advisory
- www.debian.org/security/2016/dsa-3471nvdThird Party Advisory
- www.openwall.com/lists/oss-security/2015/11/30/3nvdMailing ListThird Party Advisory
- www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.htmlnvdThird Party Advisory
- www.securityfocus.com/bid/78230nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1034527nvdThird Party AdvisoryVDB Entry
- security.gentoo.org/glsa/201602-01nvdThird Party Advisory
News mentions
0No linked articles in our index yet.