First published: Wed May 25 2016(Updated: )
Quick Emulator(Qemu) built with the MegaRAID SAS 8708EM2 Host Bus Adapter emulation support is vulnerable to an information leakage issue. It could occur while processing MegaRAID Firmware Interface(MFI) command to read device configuration in 'megasas_dcmd_cfg_read'. A privileged user inside guest could use this flaw to leak host memory bytes. Upstream patch -------------- -> <a href="https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg04419.html">https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg04419.html</a> Reference: ---------- -> <a href="http://www.openwall.com/lists/oss-security/2016/05/25/5">http://www.openwall.com/lists/oss-security/2016/05/25/5</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU qemu | <=2.6.2 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Debian Debian Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.