Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <e20f4834ce7d414aa961627bf0a8b961@imshyb01.MITRE.ORG>
Date: Thu, 2 Feb 2017 01:11:53 -0500
From: <cve-assign@...re.org>
To: <ppandit@...hat.com>
CC: <cve-assign@...re.org>, <oss-security@...ts.openwall.com>,
	<liqiang6-s@....cn>
Subject: Re: CVE request Qemu: scsi: megasas: host memory leakage in megasas_handle_dcmd

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

> Quick Emulator(Qemu) built with the MegaRAID SAS 8708EM2 Host Bus Adapter
> emulation support is vulnerable to a memory leakage issue. It could occur
> while processing MegaRAID Firmware Interface(MFI) command in
> 'megasas_handle_dcmd' routine.
> 
> A privileged user inside guest could use this flaw to leak host memory
> resulting DoS issue.
> 
> http://git.qemu.org/?p=qemu.git;a=commit;h=765a707000e838c30b18d712fe6cb3dd8e0435f3
> https://bugzilla.redhat.com/show_bug.cgi?id=1418342

Use CVE-2017-5856.

- -- 
CVE Assignment Team
M/S M300, 202 Burlington Road, Bedford, MA 01730 USA
[ A PGP key is available for encrypted communications at
  http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=Q4be
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.