{"id":"CVE-2015-8745","details":"QEMU (aka Quick Emulator) built with a VMWARE VMXNET3 paravirtual NIC emulator support is vulnerable to crash issue. It could occur while reading Interrupt Mask Registers (IMR). A privileged (CAP_SYS_RAWIO) guest user could use this flaw to crash the QEMU process instance resulting in DoS.","modified":"2026-04-16T01:43:08.164321990Z","published":"2016-12-29T22:59:00Z","withdrawn":"2026-01-27T04:15:16.953702Z","related":["SUSE-SU-2016:0873-1","SUSE-SU-2016:0955-1","SUSE-SU-2016:1154-1","SUSE-SU-2016:1318-1","SUSE-SU-2016:1560-1","SUSE-SU-2016:1703-1","SUSE-SU-2016:1745-1","openSUSE-SU-2024:10196-1"],"references":[{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3471"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2016/01/04/4"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2016/01/04/7"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/79822"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1034575"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201602-01"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1270876"},{"type":"WEB","url":"http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=c6048f849c7e3f009786df76206e895"}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}