First published: Tue Jun 14 2016(Updated: )
The (1) esp_reg_read and (2) esp_reg_write functions in hw/scsi/esp.c in QEMU allow local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the QEMU host via vectors related to the information transfer buffer.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU KVM | <=2.6.2 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Debian | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-5338 is considered a high severity vulnerability due to its potential to cause denial of service and execute arbitrary code.
To fix CVE-2016-5338, update your QEMU version to 2.6.3 or later.
CVE-2016-5338 affects QEMU versions up to and including 2.6.2.
CVE-2016-5338 impacts systems running vulnerable versions of QEMU, including certain versions of Ubuntu and Debian.
Yes, CVE-2016-5338 can allow local guest OS administrators to execute arbitrary code on the QEMU host.