First published: Mon May 30 2016(Updated: )
Heap-based buffer overflow in the iscsi_aio_ioctl function in block/iscsi.c in QEMU allows local guest OS users to cause a denial of service (QEMU process crash) or possibly execute arbitrary code via a crafted iSCSI asynchronous I/O ioctl call.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU KVM | <=2.6.2 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Oracle Linux | =7 | |
Debian | =8.0 | |
redhat openstack | =6.0 | |
redhat openstack | =7.0 | |
redhat openstack | =8 | |
redhat openstack | =9 | |
redhat enterprise Linux desktop | =7.0 | |
redhat enterprise Linux eus | =7.2 | |
redhat enterprise Linux eus | =7.3 | |
redhat enterprise Linux eus | =7.4 | |
redhat enterprise Linux eus | =7.5 | |
redhat enterprise Linux eus | =7.6 | |
redhat enterprise Linux eus | =7.7 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux server aus | =7.2 | |
redhat enterprise Linux server aus | =7.3 | |
redhat enterprise Linux server aus | =7.4 | |
redhat enterprise Linux server aus | =7.6 | |
redhat enterprise Linux server aus | =7.7 | |
redhat enterprise Linux server tus | =7.2 | |
redhat enterprise Linux server tus | =7.3 | |
redhat enterprise Linux server tus | =7.6 | |
redhat enterprise Linux server tus | =7.7 | |
redhat enterprise Linux workstation | =7.0 | |
redhat openstack | =5.0 | |
Red Hat Enterprise Virtualization | =3.0 | |
Red Hat Enterprise Linux | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2016-5126 is classified as critical due to its potential to cause denial of service and possible arbitrary code execution.
To fix CVE-2016-5126, you should upgrade QEMU to version 2.6.3 or later where the vulnerability has been patched.
CVE-2016-5126 affects various versions of QEMU and multiple Linux distributions including Ubuntu 12.04, 14.04, and 16.04, among others.
CVE-2016-5126 is a heap-based buffer overflow vulnerability found in the iscsi_aio_ioctl function of QEMU.
If you cannot upgrade, consider restricting access to the QEMU instance and applying network security measures to minimize exposure.