CVE-2016-5105Use of Uninitialized Resource in Qemu

Severity
4.4MEDIUMNVD
OSV6.7
EPSS
0.1%
top 78.17%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 2
Latest updateMay 13

Description

The megasas_dcmd_cfg_read function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, uses an uninitialized variable, which allows local guest administrators to read host memory via vectors involving a MegaRAID Firmware Interface (MFI) command.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:NExploitability: 0.8 | Impact: 3.6

Affected Packages4 packages

debiandebian/qemu< qemu 1:2.6+dfsg-2 (bookworm)
Debianqemu/qemu< 1:2.6+dfsg-2+3
Ubuntuqemu/qemu< 2.0.0+dfsg-2ubuntu1.26+3
NVDqemu/qemu2.6.2

Also affects: Debian Linux 8.0, Ubuntu Linux 12.04, 14.04, 16.04

Patches

🔴Vulnerability Details

4
GHSA
GHSA-fj37-m473-29p7: The megasas_dcmd_cfg_read function in hw/scsi/megasas2022-05-13
OSV
CVE-2016-5105: The megasas_dcmd_cfg_read function in hw/scsi/megasas2016-09-02
OSV
qemu, qemu-kvm regression2016-08-12
OSV
qemu, qemu-kvm vulnerabilities2016-08-04

📋Vendor Advisories

4
Ubuntu
QEMU regression2016-08-12
Ubuntu
QEMU vulnerabilities2016-08-04
Red Hat
Qemu: scsi: megasas: stack information leakage while reading configuration2016-05-25
Debian
CVE-2016-5105: qemu - The megasas_dcmd_cfg_read function in hw/scsi/megasas.c in QEMU, when built with...2016

💬Community

2
Bugzilla
CVE-2016-5105 Qemu: scsi: megasas: stack information leakage while reading configuration [fedora-all]2016-05-25
Bugzilla
CVE-2016-5105 Qemu: scsi: megasas: stack information leakage while reading configuration2016-05-25