CVE-2015-3209

Priority
Description
Heap-based buffer overflow in the PCNET controller in QEMU allows remote
attackers to execute arbitrary code by sending a packet with
TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS
set.
Assigned-to
mdeslaur
Notes
Package
Source: qemu (LP Ubuntu Debian)
Upstream:needs-triage
Ubuntu 14.04 ESM (Trusty Tahr):released (2.0.0+dfsg-2ubuntu1.13)
Patches:
Upstream:http://git.qemu.org/?p=qemu.git;a=commitdiff;h=7b50d00911ddd6d56a766ac5671e47304c20a21b (bp)
Package
Upstream:needs-triage
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Package
Source: xen (LP Ubuntu Debian)
Upstream:needed
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was released [4.4.2-0ubuntu0.14.04.2])
Binaries built from this source package are in universe and so are supported by the community. For more details see https://wiki.ubuntu.com/SecurityTeam/FAQ#Official_Support
More Information

Updated: 2020-01-29 19:52:01 UTC (commit 768ceb2fdee6790d707d0f681e1b54916744af1e)