{"id":"CVE-2015-6815","details":"The process_tx_desc function in hw/net/e1000.c in QEMU before 2.4.0.1 does not properly process transmit descriptor data when sending a network packet, which allows attackers to cause a denial of service (infinite loop and guest crash) via unspecified vectors.","modified":"2026-01-27T04:14:01.431758Z","published":"2020-01-31T22:15:11Z","withdrawn":"2026-01-27T04:14:01.431758Z","related":["MGASA-2015-0368","MGASA-2015-0369","SUSE-SU-2015:1853-1","SUSE-SU-2015:1894-1","SUSE-SU-2015:1908-1","SUSE-SU-2015:1952-1","SUSE-SU-2015:2324-1","SUSE-SU-2016:2628-1","SUSE-SU-2016:2781-1","openSUSE-SU-2024:10196-1"],"references":[{"type":"ARTICLE","url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168077.html"},{"type":"ARTICLE","url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168646.html"},{"type":"ARTICLE","url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168671.html"},{"type":"FIX","url":"http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00026.html"},{"type":"FIX","url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00005.html"},{"type":"FIX","url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00011.html"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2015/09/04/4"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2015/09/05/5"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2745-1"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1260076"},{"type":"FIX","url":"https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg01199.html"},{"type":"FIX","url":"https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg05832.html"},{"type":"ADVISORY","url":"https://www.arista.com/en/support/advisories-notices/security-advisories/1188-security-advisory-14"}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}]}