Bug 1459477 - (CVE-2017-9503) CVE-2017-9503 Qemu: scsi: megasas: null pointer dereference while processing megasas command
CVE-2017-9503 Qemu: scsi: megasas: null pointer dereference while processing ...
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
: Security
Depends On: 1459478
Blocks: 1449494
  Show dependency treegraph
Reported: 2017-06-07 05:15 EDT by Prasad J Pandit
Modified: 2018-01-30 19:20 EST (History)
39 users (show)

See Also:
Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

  None (edit)
Description Prasad J Pandit 2017-06-07 05:15:24 EDT
Quick Emulator(Qemu) built with the MegaRAID SAS 8708EM2 Host Bus Adapter
emulation support is vulnerable to a null pointer dereference issue. It
could occur while processing megasas commands via megasas_command_complete().

A privileged user inside guest could use this flaw to crash the Qemu process
on the host resulting in DoS.

Upstream patch:
  -> https://lists.gnu.org/archive/html/qemu-devel/2017-06/msg01313.html
  -> https://lists.gnu.org/archive/html/qemu-devel/2017-06/msg01309.html

  -> http://www.openwall.com/lists/oss-security/2017/06/08/1
Comment 1 Prasad J Pandit 2017-06-07 05:16:03 EDT

Name: Zhangyanyu
Comment 2 Prasad J Pandit 2017-06-07 05:17:06 EDT
Created qemu tracking bugs for this issue:

Affects: fedora-all [bug 1459478]
Comment 3 Paolo Bonzini 2017-06-07 13:55:37 EDT
Patches at https://lists.gnu.org/archive/html/qemu-devel/2017-06/msg01308.html

Note You need to log in before you can comment on or make changes to this bug.