Vulnerability Description
Stack-based buffer overflow in hw/scsi/scsi-bus.c in QEMU, when built with SCSI-device emulation support, allows guest OS users with CAP_SYS_RAWIO permissions to cause a denial of service (instance crash) via an invalid opcode in a SCSI command descriptor block.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Qemu | Qemu | >= 2.2.0, < 2.4.0 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/76016Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1033095Third Party AdvisoryVDB Entry
- https://lists.nongnu.org/archive/html/qemu-devel/2015-07/msg04558.htmlMailing ListThird Party Advisory
- https://security.gentoo.org/glsa/201510-02Third Party Advisory
- http://www.securityfocus.com/bid/76016Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1033095Third Party AdvisoryVDB Entry
- https://lists.nongnu.org/archive/html/qemu-devel/2015-07/msg04558.htmlMailing ListThird Party Advisory
- https://security.gentoo.org/glsa/201510-02Third Party Advisory
FAQ
What is CVE-2015-5158?
CVE-2015-5158 is a vulnerability with a CVSS score of 5.5 (MEDIUM). Stack-based buffer overflow in hw/scsi/scsi-bus.c in QEMU, when built with SCSI-device emulation support, allows guest OS users with CAP_SYS_RAWIO permissions to cause a denial of service (instance cr...
How severe is CVE-2015-5158?
CVE-2015-5158 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-5158?
Check the references section above for vendor advisories and patch information. Affected products include: Qemu Qemu.