Medium severity6.5NVD Advisory· Published Apr 11, 2017· Updated May 13, 2026
CVE-2015-8613
CVE-2015-8613
Description
Stack-based buffer overflow in the megasas_ctrl_get_info function in QEMU, when built with SCSI MegaRAID SAS HBA emulation support, allows local guest users to cause a denial of service (QEMU instance crash) via a crafted SCSI controller CTRL_GET_INFO command.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- lists.gnu.org/archive/html/qemu-devel/2015-12/msg03737.htmlnvdMailing ListPatchThird Party Advisory
- www.debian.org/security/2016/dsa-3471nvdThird Party Advisory
- www.openwall.com/lists/oss-security/2015/12/22/1nvdMailing ListThird Party Advisory
- www.securityfocus.com/bid/79719nvdThird Party AdvisoryVDB Entry
- bugzilla.redhat.com/show_bug.cginvdIssue TrackingThird Party Advisory
- security.gentoo.org/glsa/201604-01nvdThird Party Advisory
News mentions
0No linked articles in our index yet.