High severity7.1NVD Advisory· Published Dec 29, 2016· Updated May 6, 2026
CVE-2015-8743
CVE-2015-8743
Description
QEMU (aka Quick Emulator) built with the NE2000 device emulation support is vulnerable to an OOB r/w access issue. It could occur while performing 'ioport' r/w operations. A privileged (CAP_SYS_RAWIO) user/process could use this flaw to leak or corrupt QEMU memory bytes.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
10- lists.gnu.org/archive/html/qemu-devel/2016-01/msg00050.htmlnvdPatchVendor Advisory
- www.debian.org/security/2016/dsa-3469nvdThird Party Advisory
- www.debian.org/security/2016/dsa-3470nvdThird Party Advisory
- www.debian.org/security/2016/dsa-3471nvdThird Party Advisory
- www.openwall.com/lists/oss-security/2016/01/04/1nvdMailing ListThird Party Advisory
- www.openwall.com/lists/oss-security/2016/01/04/2nvdMailing ListThird Party Advisory
- www.securityfocus.com/bid/79820nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1034574nvdThird Party AdvisoryVDB Entry
- security.gentoo.org/glsa/201602-01nvdThird Party Advisory
- bugzilla.redhat.com/show_bug.cginvdIssue Tracking
News mentions
0No linked articles in our index yet.