Out-of-bounds write in QEMU - CVE-2016-7423
Published: October 10, 2016 / Updated: August 9, 2020
QEMU
Detailed vulnerability description
The vulnerability allows a local privileged user to perform a denial of service (DoS) attack.
The mptsas_process_scsi_io_request function in QEMU (aka Quick Emulator), when built with LSI SAS1068 Host Bus emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors involving MPTSASRequest objects.
How to mitigate CVE-2016-7423
Sources
- http://git.qemu.org/?p=qemu.git;a=commit;h=670e56d3ed2918b3861d9216f2c0540d9e9ae0d5
- http://www.openwall.com/lists/oss-security/2016/09/16/11
- http://www.openwall.com/lists/oss-security/2016/09/16/5
- http://www.securityfocus.com/bid/92997
- https://bugzilla.redhat.com/show_bug.cgi?id=1376776
- https://lists.gnu.org/archive/html/qemu-devel/2016-09/msg03604.html
- https://security.gentoo.org/glsa/201611-11