First published: Mon May 09 2016(Updated: )
QEMU (aka Quick Emulator), when built with VMWARE PVSCSI paravirtual SCSI bus emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds array access) via vectors related to the (1) PVSCSI_CMD_SETUP_RINGS or (2) PVSCSI_CMD_SETUP_MSG_RING SCSI command.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU KVM | <=2.6.2 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =16.04 | |
Debian Debian Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-4952 has a severity rating of medium due to its potential to cause a denial of service.
To fix CVE-2016-4952, you should update QEMU to a version newer than 2.6.2 or apply any relevant patches provided by your distribution.
CVE-2016-4952 affects QEMU versions up to and including 2.6.2 when built with VMWARE PVSCSI paravirtual SCSI bus emulation support.
CVE-2016-4952 is a denial of service vulnerability caused by an out-of-bounds array access.
CVE-2016-4952 impacts QEMU as well as specific versions of Ubuntu Linux and Debian Linux that utilize QEMU with the mentioned configurations.