First published: Wed Nov 04 2015(Updated: )
Qemu emulator built with the USB EHCI emulation support is vulnerable to an infinite loop issue. It occurs during communication between host controller interface(EHCI) and a respective device driver. These two communicate via a isochronous transfer descriptor list(iTD) and an infinite loop unfolds if there is a closed loop in this list. A privileges used inside guest could use this flaw to consume excessive CPU cycles & resources on the host. Upstream fix: ------------- -> git.qemu.org/?p=qemu.git;a=commit;h=156a2e4dbffa85997636a7a39ef12da6f1b40254 Reference: ---------- -> <a href="http://www.openwall.com/lists/oss-security/2015/12/14/16">http://www.openwall.com/lists/oss-security/2015/12/14/16</a>
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU qemu | <=2.5.1.1 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
ubuntu/qemu | <2.0.0+dfsg-2ubuntu1.22 | 2.0.0+dfsg-2ubuntu1.22 |
ubuntu/qemu | <1:2.3+dfsg-5ubuntu9.2 | 1:2.3+dfsg-5ubuntu9.2 |
ubuntu/qemu-kvm | <1.0+ | 1.0+ |
debian/qemu | 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u7 1:9.0.2+ds-2 1:9.1.0+ds-3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-8558 is a vulnerability that allows local guest OS administrators to cause a denial of service in QEMU via a circular isochronous transfer descriptor list.
CVE-2015-8558 affects QEMU version 2.0.0+dfsg-2ubuntu1.22, 1:2.3+dfsg-5ubuntu9.2, qemu-kvm version 1.0+, and other Debian versions.
CVE-2015-8558 has a low severity level.
To fix CVE-2015-8558, update QEMU to version 2.0.0+dfsg-2ubuntu1.22 or higher, 1:2.3+dfsg-5ubuntu9.2 or higher, or use the latest available version for qemu-kvm.
You can find more information about CVE-2015-8558 on the following websites: http://www.securityfocus.com/bid/80694, http://www.debian.org/security/2016/dsa-3469, http://www.debian.org/security/2016/dsa-3470