Name | CVE-2015-5279 |
Description | Heap-based buffer overflow in the ne2000_receive function in hw/net/ne2000.c in QEMU before 2.4.0.1 allows guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via vectors related to receiving packets. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more) |
References | DSA-3361-1, DSA-3362-1 |
NVD severity | high |
Debian Bugs | 799074 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
qemu (PTS) | stretch | 1:2.8+dfsg-6+deb9u9 | fixed |
| stretch (security) | 1:2.8+dfsg-6+deb9u14 | fixed |
| buster, buster (security) | 1:3.1+dfsg-8+deb10u8 | fixed |
| bullseye | 1:5.2+dfsg-9 | fixed |
| sid | 1:5.2+dfsg-10 | fixed |
The information below is based on the following data on fixed versions.
Notes
[squeeze] - qemu <end-of-life> (Not supported in Squeeze LTS)
[squeeze] - qemu-kvm <end-of-life> (Not supported in Squeeze LTS)
https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg03984.html