
oss-sec mailing list archives
Re: CVE request Qemu: scsi: megasas: host memory leakage in megasas_handle_dcmd
From: <cve-assign () mitre org>
Date: Thu, 2 Feb 2017 01:11:53 -0500
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
Quick Emulator(Qemu) built with the MegaRAID SAS 8708EM2 Host Bus Adapter emulation support is vulnerable to a memory leakage issue. It could occur while processing MegaRAID Firmware Interface(MFI) command in 'megasas_handle_dcmd' routine. A privileged user inside guest could use this flaw to leak host memory resulting DoS issue. http://git.qemu.org/?p=qemu.git;a=commit;h=765a707000e838c30b18d712fe6cb3dd8e0435f3 https://bugzilla.redhat.com/show_bug.cgi?id=1418342
Use CVE-2017-5856. - -- CVE Assignment Team M/S M300, 202 Burlington Road, Bedford, MA 01730 USA [ A PGP key is available for encrypted communications at http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCAAGBQJYkscyAAoJEHb/MwWLVhi2s5oP/jYh93aApBYo3m5bh8kmdha3 EYpRvBBDGgHo/wuvrj3M7x4kS2i5K0ZUZa4BHffNJFaERsQ7/XyEVf0U33HxnSOi eeWIcz5xE6YY34DZYlfUylfHYlRH0fb90EIWoaBkb0uECnPhQrFdagS6+Ihl482V xlALnTq3BrL9CLFWPadb8xbdxHuR+dXj2c6XX1jnGojcy+TCUhKY6ombMv7tOBfz Jq83D5Y9kFHIPf+SB+FSRbVRvywwkceuZRFRIlO+bZVs9OHftr4jNwJBEieivVJg k181Add+BzE6yFmM2mGwhX24XgyF67uD55lrajULawq5rCiqifm6532XfDozkhuq +gWAHdz8mPJte8nYVPMXP2HdA3I9q0TW9fk/5cMQnDoga+qxcBo6sLkc/cQHAakb 6HZxXtV3syH+fJGZbuV28oWkavKsOsW5M6ydpNRV2I9zGxvodpyBppO7Qlhcm7tN NA+Omyqi10GH5uGc/EkdNmnLtzTqbyW8J8UK5LfA52oCBHEValqzkPDTMy2VcZxH jy8ZCh/XIAQ004ZjGV2MIsFZ5byiJuYN+06WV98IgPjdoh9zjppD0Ky90vlpHf6J EK7iOaPUyc1TEK5Y/Sr9x/mhvRUOZq8ERBQwqnmwTeIAbL88kWJIXZ7gFk8T87ep n+xkZYb9YnHTamyViyC2 =Q4be -----END PGP SIGNATURE-----
Current thread:
- CVE request Qemu: scsi: megasas: host memory leakage in megasas_handle_dcmd P J P (Feb 01)
- Re: CVE request Qemu: scsi: megasas: host memory leakage in megasas_handle_dcmd cve-assign (Feb 01)