CVE-2015-5158

Stack-based buffer overflow in hw/scsi/scsi-bus.c in QEMU, when built with SCSI-device emulation support, allows guest OS users with CAP_SYS_RAWIO permissions to cause a denial of service (instance crash) via an invalid opcode in a SCSI command descriptor block.
References
Link Resource
https://security.gentoo.org/glsa/201510-02 Third Party Advisory
http://www.securityfocus.com/bid/76016 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1033095 Third Party Advisory VDB Entry
https://lists.nongnu.org/archive/html/qemu-devel/2015-07/msg04558.html Mailing List Third Party Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

OR cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:2.4.0:-:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:2.4.0:rc1:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:2.4.0:rc2:*:*:*:*:*:*

Information

Published : 2016-04-11 18:59

Updated : 2020-09-08 06:54


NVD link : CVE-2015-5158

Mitre link : CVE-2015-5158


JSON object : View

CWE
CWE-787

Out-of-bounds Write

Advertisement

dedicated server usa

Products Affected

qemu

  • qemu