First published: Fri Apr 08 2016(Updated: )
Stack-based buffer overflow in hw/scsi/scsi-bus.c in QEMU, when built with SCSI-device emulation support, allows guest OS users with CAP_SYS_RAWIO permissions to cause a denial of service (instance crash) via an invalid opcode in a SCSI command descriptor block.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU KVM | >=2.2.0<2.4.0 | |
QEMU KVM | =2.4.0 | |
QEMU KVM | =2.4.0-rc1 | |
QEMU KVM | =2.4.0-rc2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5158 is classified as a high severity vulnerability because it can lead to denial of service due to a stack-based buffer overflow.
To fix CVE-2015-5158, it is recommended to update QEMU to version 2.4.0 or later, as these versions contain the necessary patches.
CVE-2015-5158 affects QEMU users who have SCSI-device emulation support and allow guest OS user access with CAP_SYS_RAWIO permissions.
Vulnerable systems include those running QEMU versions between 2.2.0 and 2.4.0, including the specific release candidates.
CVE-2015-5158 does not directly allow for remote exploitation as it requires guest OS user privileges to trigger the vulnerability.