Medium severity5.5NVD Advisory· Published Dec 29, 2016· Updated May 6, 2026
CVE-2015-8818
CVE-2015-8818
Description
The cpu_physical_memory_write_rom_internal function in exec.c in QEMU (aka Quick Emulator) does not properly skip MMIO regions, which allows local privileged guest users to cause a denial of service (guest crash) via unspecified vectors.
Affected products
18- osv-coords18 versionspkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Desktop%2012pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP1pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Server%2012pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Desktop%2011%20SP4pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Desktop%2012pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP1pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2012pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2011%20SP4pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP1
< 2.0.2-48.19.1+ 17 more
- (no CPE)range: < 2.0.2-48.19.1
- (no CPE)range: < 2.3.1-14.1
- (no CPE)range: < 2.0.2-48.19.1
- (no CPE)range: < 2.3.1-14.1
- (no CPE)range: < 2.0.2-48.19.1
- (no CPE)range: < 2.3.1-14.1
- (no CPE)range: < 4.4.4_02-32.1
- (no CPE)range: < 4.4.4_02-22.19.1
- (no CPE)range: < 4.5.2_06-7.1
- (no CPE)range: < 4.4.4_02-32.1
- (no CPE)range: < 4.4.4_02-22.19.1
- (no CPE)range: < 4.5.2_06-7.1
- (no CPE)range: < 4.4.4_02-32.1
- (no CPE)range: < 4.4.4_02-22.19.1
- (no CPE)range: < 4.5.2_06-7.1
- (no CPE)range: < 4.4.4_02-32.1
- (no CPE)range: < 4.4.4_02-22.19.1
- (no CPE)range: < 4.5.2_06-7.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
9- rhn.redhat.com/errata/RHSA-2016-2670.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2016-2671.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2016-2704.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2016-2705.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2016-2706.htmlnvdThird Party Advisory
- www.openwall.com/lists/oss-security/2016/03/01/1nvdMailing ListThird Party Advisory
- www.openwall.com/lists/oss-security/2016/03/01/10nvdMailing ListThird Party Advisory
- bugzilla.redhat.com/show_bug.cginvdIssue Tracking
- git.qemu.orgnvd
News mentions
0No linked articles in our index yet.