Stack-based buffer overflow in hw/scsi/scsi-bus.c in QEMU, when built with SCSI-device emulation support, allows guest OS users with CAP_SYS_RAWIO permissions to cause a denial of service (instance crash) via an invalid opcode in a SCSI command descriptor block.
                
            References
                    | Link | Resource | 
|---|---|
| http://www.securityfocus.com/bid/76016 | Third Party Advisory VDB Entry | 
| http://www.securitytracker.com/id/1033095 | Third Party Advisory VDB Entry | 
| https://lists.nongnu.org/archive/html/qemu-devel/2015-07/msg04558.html | Mailing List Third Party Advisory | 
| https://security.gentoo.org/glsa/201510-02 | Third Party Advisory | 
| http://www.securityfocus.com/bid/76016 | Third Party Advisory VDB Entry | 
| http://www.securitytracker.com/id/1033095 | Third Party Advisory VDB Entry | 
| https://lists.nongnu.org/archive/html/qemu-devel/2015-07/msg04558.html | Mailing List Third Party Advisory | 
| https://security.gentoo.org/glsa/201510-02 | Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    21 Nov 2024, 02:32
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://www.securityfocus.com/bid/76016 - Third Party Advisory, VDB Entry | |
| References | () http://www.securitytracker.com/id/1033095 - Third Party Advisory, VDB Entry | |
| References | () https://lists.nongnu.org/archive/html/qemu-devel/2015-07/msg04558.html - Mailing List, Third Party Advisory | |
| References | () https://security.gentoo.org/glsa/201510-02 - Third Party Advisory | 
Information
                Published : 2016-04-12 01:59
Updated : 2025-04-12 10:46
NVD link : CVE-2015-5158
Mitre link : CVE-2015-5158
CVE.ORG link : CVE-2015-5158
JSON object : View
Products Affected
                qemu
- qemu
CWE
                
                    
                        
                        CWE-787
                        
            Out-of-bounds Write
