First published: Wed May 25 2016(Updated: )
Quick Emulator(Qemu) built with the MegaRAID SAS 8708EM2 Host Bus Adapter emulation support is vulnerable to an information leakage issue. It could occur while processing MegaRAID Firmware Interface(MFI) command to read device configuration in 'megasas_dcmd_cfg_read'. A privileged user inside guest could use this flaw to leak host memory bytes. Upstream patch -------------- -> <a href="https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg04419.html">https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg04419.html</a> Reference: ---------- -> <a href="http://www.openwall.com/lists/oss-security/2016/05/25/5">http://www.openwall.com/lists/oss-security/2016/05/25/5</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU KVM | <=2.6.2 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =16.04 | |
Debian Debian Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-5105 has a severity rating of medium due to its potential for information leakage.
To fix CVE-2016-5105, update QEMU to a version later than 2.6.2 where the vulnerability is patched.
CVE-2016-5105 affects QEMU versions up to 2.6.2 and specific releases of Ubuntu and Debian Linux.
CVE-2016-5105 involves an information leakage issue while processing MegaRAID commands.
No, CVE-2016-5105 requires privileged access within the guest to exploit the information leakage.