CVE-2015-3209

Publication date 10 June 2015

Last updated 24 July 2024


Ubuntu priority

Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.

Status

Package Ubuntu Release Status
qemu 15.04 vivid
Fixed 1:2.2+dfsg-5expubuntu9.2
14.10 utopic
Fixed 2.1+dfsg-4ubuntu6.7
14.04 LTS trusty
Fixed 2.0.0+dfsg-2ubuntu1.13
12.04 LTS precise Not in release
qemu-kvm 15.04 vivid Not in release
14.10 utopic Not in release
14.04 LTS trusty Not in release
12.04 LTS precise
Fixed 1.0+noroms-0ubuntu14.23
xen 15.04 vivid
Not affected
14.10 utopic Ignored end of life
14.04 LTS trusty
Fixed 4.4.2-0ubuntu0.14.04.2
12.04 LTS precise
Fixed 4.1.6.1-0ubuntu0.12.04.6

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
qemu

References

Related Ubuntu Security Notices (USN)

Other references