First published: Wed Feb 01 2017(Updated: )
Quick Emulator(Qemu) built with the MegaRAID SAS 8708EM2 Host Bus Adapter emulation support is vulnerable to a memory leakage issue. It could occur while processing MegaRAID Firmware Interface(MFI) command in 'megasas_handle_dcmd' routine. A privileged user inside guest could use this flaw to leak host memory resulting DoS issue. Upstream patch: --------------- -> <a href="http://git.qemu.org/?p=qemu.git;a=commit;h=765a707000e838c30b18d712fe6cb3dd8e0435f3">http://git.qemu.org/?p=qemu.git;a=commit;h=765a707000e838c30b18d712fe6cb3dd8e0435f3</a> Reference: ---------- -> <a href="http://www.openwall.com/lists/oss-security/2017/02/01/19">http://www.openwall.com/lists/oss-security/2017/02/01/19</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU qemu | <=2.8.1.1 | |
Debian Debian Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.