Medium severity5.5NVD Advisory· Published Dec 29, 2016· Updated May 6, 2026
CVE-2015-8745
CVE-2015-8745
Description
QEMU (aka Quick Emulator) built with a VMWARE VMXNET3 paravirtual NIC emulator support is vulnerable to crash issue. It could occur while reading Interrupt Mask Registers (IMR). A privileged (CAP_SYS_RAWIO) guest user could use this flaw to crash the QEMU process instance resulting in DoS.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- www.debian.org/security/2016/dsa-3471nvdThird Party Advisory
- www.openwall.com/lists/oss-security/2016/01/04/4nvdMailing ListThird Party Advisory
- www.openwall.com/lists/oss-security/2016/01/04/7nvdMailing ListThird Party Advisory
- www.securityfocus.com/bid/79822nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1034575nvdThird Party AdvisoryVDB Entry
- security.gentoo.org/glsa/201602-01nvdThird Party Advisory
- bugzilla.redhat.com/show_bug.cginvdIssue Tracking
News mentions
0No linked articles in our index yet.