oss-sec mailing list archives
CVE request Qemu: scsi: megasas: host memory leakage in megasas_handle_dcmd
From: P J P <ppandit () redhat com>
Date: Wed, 1 Feb 2017 21:06:39 +0530 (IST)
Hello,Quick Emulator(Qemu) built with the MegaRAID SAS 8708EM2 Host Bus Adapter emulation support is vulnerable to a memory leakage issue. It could occur while processing MegaRAID Firmware Interface(MFI) command in 'megasas_handle_dcmd' routine.
A privileged user inside guest could use this flaw to leak host memory resulting DoS issue.
Upstream patch: --------------- -> http://git.qemu.org/?p=qemu.git;a=commit;h=765a707000e838c30b18d712fe6cb3dd8e0435f3 Reference: ---------- -> https://bugzilla.redhat.com/show_bug.cgi?id=1418342 This issue was reported by Mr Li Qiang of 360.cn Inc. Thank you. -- Prasad J Pandit / Red Hat Product Security Team 47AF CE69 3A90 54AA 9045 1053 DD13 3D32 FE5B 041F
Current thread:
- CVE request Qemu: scsi: megasas: host memory leakage in megasas_handle_dcmd P J P (Feb 01)
- Re: CVE request Qemu: scsi: megasas: host memory leakage in megasas_handle_dcmd cve-assign (Feb 01)