Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue,  6 Sep 2016 20:56:28 -0400 (EDT)
From: cve-assign@...re.org
To: ppandit@...hat.com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com, vv474172261@...il.com
Subject: Re: CVE Request Qemu: scsi: mptsas: invalid memory access while building configuration pages

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

> Quick emulator(Qemu) built with the LSI SAS1068 Host Bus emulation support, is
> vulnerable to an invalid memory access issue. It could occur while building
> configuration page headers in 'mptsas_config_manufacturing_1'.
> 
> A privileged user inside guest could use this flaw to crash the Qemu process
> on the host, resulting in DoS.
> 
> https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg04295.html

>> When LSI SAS1068 Host Bus emulator builds configuration page
>> headers, the format string used in 'mptsas_config_manufacturing_1'
>> was wrong. It could lead to an invalid memory access.

Use CVE-2016-7157.

This is not yet available at
http://git.qemu.org/?p=qemu.git;a=history;f=hw/scsi/mptconfig.c but
that may be an expected place for a later update.


> https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg04296.html

>> When LSI SAS1068 Host Bus emulator builds configuration page
>> headers, mptsas_config_pack() asserts to check returned size
>> value is within limit of 256 bytes. Fix that assert expression.

Our interpretation is that this assert issue is not an independently
relevant security problem, and does not need its own unique CVE ID.

- -- 
CVE Assignment Team
M/S M300, 202 Burlington Road, Bedford, MA 01730 USA
[ A PGP key is available for encrypted communications at
  http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIcBAEBCAAGBQJXz2PsAAoJEHb/MwWLVhi2XXcP/1ZIu5eguJjtVoGHYTsE8IrY
+4CzVNeYbdHFzIunDooQkT062zPsRzzBGIVYng2cSrAw5segRhmt6cQ/jbG6UNPe
TPvsRpwlhm9qTpc0FSGpNW/lr4sWF8eIfJIvOmUcYp+j/MhlUlFFQbSL79AtABkr
vnKTyqbVf6iwRM2UB+ywbzoD004eeZaefuVN13vk5GTjhRkxoeSyd4Erpe/E1IzP
37Vsx0b1LdeNimkDJC0QfTxIHesRTcd9UkZq4No9Ztj4bBh0WIyhBZGS0W5FonUB
H1tRHi/zSJlZKHhqhfoszM4xQOst0yfcOqOhUueX92zThAvt8FIPZJq9v23tg9ib
9lYaX+1GzupRhqjbB+yDnUh8NLYhAQqpLAi/ryva1J3dsaVrbZyZwpwBZNjvUfG8
2Vgf0s+4WTcLvaanYKh+T/tSwtHIeaHEh+O65vvPKVDbox9FSjgOlHzr9ANUks0v
eoRz9telzBkKUOZMALOxIFRmB4z18a5il+MLsmV0cKM3jFSKrkx83d/L/t/3n7ub
oBD3dAEHri+nH/MiIGZUBKrN6r1cD6tylySTvLerMQpH7C7ovxOIpTEWv1CW8FYg
7OH6ZBGiH0QpjWI45vIVk1nrZ/H5krpPnmEnBJZIJ9v/H6nIVWoosP134GMAKjlL
xQG3c8wAuTo62bt7kHsQ
=yZzK
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ