Medium severity5.5NVD Advisory· Published Jun 14, 2016· Updated May 6, 2026
CVE-2016-5337
CVE-2016-5337
Description
The megasas_ctrl_get_info function in hw/scsi/megasas.c in QEMU allows local guest OS administrators to obtain sensitive host memory information via vectors related to reading device control information.
Affected products
17- osv-coords17 versionspkg:rpm/opensuse/qemu&distro=openSUSE%20Tumbleweedpkg:rpm/suse/kvm&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kvm&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP1pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP1pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2011%20SP4pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP1
< 2.6.1-1.5+ 16 more
- (no CPE)range: < 2.6.1-1.5
- (no CPE)range: < 1.4.2-47.1
- (no CPE)range: < 1.4.2-47.1
- (no CPE)range: < 2.3.1-21.1
- (no CPE)range: < 2.3.1-21.1
- (no CPE)range: < 2.0.2-48.22.1
- (no CPE)range: < 2.0.2-48.22.1
- (no CPE)range: < 2.3.1-21.1
- (no CPE)range: < 4.5.3_08-17.1
- (no CPE)range: < 4.4.4_07-37.1
- (no CPE)range: < 4.5.3_08-17.1
- (no CPE)range: < 4.4.4_04-22.22.2
- (no CPE)range: < 4.4.4_07-37.1
- (no CPE)range: < 4.4.4_04-22.22.2
- (no CPE)range: < 4.5.3_08-17.1
- (no CPE)range: < 4.4.4_07-37.1
- (no CPE)range: < 4.5.3_08-17.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
9- lists.gnu.org/archive/html/qemu-devel/2016-06/msg01969.htmlnvdMailing ListPatchThird Party Advisory
- www.openwall.com/lists/oss-security/2016/06/08/13nvdMailing ListThird Party Advisory
- www.openwall.com/lists/oss-security/2016/06/08/3nvdMailing ListThird Party Advisory
- www.securityfocus.com/bid/91097nvdThird Party AdvisoryVDB Entry
- www.ubuntu.com/usn/USN-3047-1nvdThird Party Advisory
- www.ubuntu.com/usn/USN-3047-2nvdThird Party Advisory
- lists.debian.org/debian-lts-announce/2018/11/msg00038.htmlnvdMailing ListThird Party Advisory
- security.gentoo.org/glsa/201609-01nvdThird Party Advisory
- git.qemu.orgnvd
News mentions
0No linked articles in our index yet.