First published: Thu Feb 05 2015(Updated: )
Array index error in the tcm_vhost_make_tpg function in drivers/vhost/scsi.c in the Linux kernel before 4.0 might allow guest OS users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted VHOST_SCSI_SET_ENDPOINT ioctl call. NOTE: the affected function was renamed to vhost_scsi_make_tpg before the vulnerability was announced.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >3.6<3.10.90 | |
Linux Kernel | >=3.11<3.12.44 | |
Linux Kernel | >=3.13<3.14.57 | |
Linux Kernel | >=3.15<3.16.35 | |
Linux Kernel | >=3.17<3.18.25 | |
Linux Kernel | >=3.19<4.0 | |
Linux Kernel | =3.6 | |
Linux Kernel | =3.6-rc2 | |
Linux Kernel | =3.6-rc3 | |
Linux Kernel | =3.6-rc4 | |
Linux Kernel | =3.6-rc5 | |
Linux Kernel | =3.6-rc6 | |
Linux Kernel | =3.6-rc7 | |
Linux Kernel | <=3.18.0 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-4036 has a high severity rating due to its potential to cause denial of service and memory corruption.
To fix CVE-2015-4036, upgrade your Linux kernel to version 4.0 or higher.
CVE-2015-4036 affects Linux kernel versions prior to 4.0, including several specific versions between 3.6 and 3.19.
CVE-2015-4036 could allow attackers to cause memory corruption and potentially disrupt system services.
Yes, CVE-2015-4036 is considered a significant vulnerability due to its impact on widely used Linux kernel versions.