Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 555680 (CVE-2015-5158)

Summary: <app-emulation/qemu-2.3.0-r4: scsi stack buffer overflow (CVE-2015-5158)
Product: Gentoo Security Reporter: Agostino Sarubbo <ago>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Severity: minor CC: qemu+disabled
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
Whiteboard: B3 [glsa cve]
Package list:
Runtime testing required: ---
Bug Depends on: 556052    
Bug Blocks:    

Description Agostino Sarubbo gentoo-dev 2015-07-23 11:00:53 UTC
From ${URL} :

Qemu emulator built with the SCSI device emulation support is vulnerable to a 
stack buffer overflow issue. It could occur while parsing SCSI command 
descriptor block with an invalid operation code.

A privileged(CAP_SYS_RAWIO) user inside guest could use this flaw to crash the 
Qemu instance resulting in DoS.

Upstream fix:

@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 Doug Goldstein (RETIRED) gentoo-dev 2015-07-25 19:54:23 UTC
*qemu-2.3.0-r3 (25 Jul 2015)

  25 Jul 2015; Doug Goldstein <>
  +files/qemu-2.3.0-CVE-2015-5158.patch, +qemu-2.3.0-r3.ebuild:
  Add fix from upstream for CVE-2015-5158 #555680 by Agostino Sarubbo.
Comment 2 Agostino Sarubbo gentoo-dev 2015-07-27 14:10:35 UTC
Arches, please test and mark stable:                                                                                                                                                                                                                                           
Target keywords : "amd64 x86"
Comment 3 SpanKY gentoo-dev 2015-07-28 02:33:33 UTC
let's use bug 556052 for stabilization since it's a newer rev
Comment 4 GLSAMaker/CVETool Bot gentoo-dev 2015-10-31 15:07:00 UTC
This issue was resolved and addressed in
 GLSA 201510-02 at
by GLSA coordinator Kristian Fiskerstrand (K_F).