First published: Tue Mar 01 2016(Updated: )
It was found that one malicious guest inside a virtual machine can take control of the corresponding Qemu process in the host using crafted primary surface parameters. This issue is similar to <a href="https://access.redhat.com/security/cve/CVE-2015-5261">CVE-2015-5261</a>, but it's using different path in the code.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Enterprise Linux | =7.0 | |
Red Hat Enterprise Linux | =7.0 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux HPC Node | =7.2 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Server | =7.2 | |
Red Hat Enterprise Linux Server | =7.2 | |
Red Hat Enterprise Linux Workstation | =7.0 | |
Microsoft Windows | ||
SUSE Linux | =42.1 | |
SUSE Linux | =13.2 | |
Debian | =8.0 | |
Red Hat Enterprise Linux | =6.0 | |
Red Hat Enterprise Linux | =6.0 | |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Workstation | =6.0 | |
SPICE |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2016-2150 is classified as high due to the potential for a malicious guest to control the host Qemu process.
To fix CVE-2016-2150, it is recommended to apply the latest patches provided by your operating system vendor.
CVE-2016-2150 affects several versions of Red Hat Enterprise Linux and OpenSUSE, particularly those around versions 6.0, 7.0, and specific Debian releases.
CVE-2016-2150 requires an attacker to have access to a virtual machine, meaning it cannot be exploited remotely without guest access.
The impact of CVE-2016-2150 on virtualization security is significant as it allows guest OS users to gain control over the host system, potentially leading to a complete compromise.