Out-of-bounds Write The advisory has been revoked - it doesn't affect any version of package qemu-kvm  (opens in a new tab)


Threat Intelligence

EPSS
0.06% (30th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UBUNTU1204-QEMUKVM-620935
  • published2 Sept 2016
  • disclosed2 Sept 2016

Introduced: 2 Sep 2016

CVE-2016-5106  (opens in a new tab)
CWE-787  (opens in a new tab)

Amendment

The Ubuntu security team deemed this advisory irrelevant for Ubuntu:12.04.

NVD Description

Note: Versions mentioned in the description apply only to the upstream qemu-kvm package and not the qemu-kvm package as distributed by Ubuntu.

The megasas_dcmd_set_properties function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allows local guest administrators to cause a denial of service (out-of-bounds write access) via vectors involving a MegaRAID Firmware Interface (MFI) command.