First published: Sat Dec 10 2016(Updated: )
Use-after-free vulnerability in the vmxnet3_io_bar0_write function in hw/net/vmxnet3.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (QEMU instance crash) by leveraging failure to check if the device is active.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU KVM | <=2.6.2 | |
QEMU KVM | =2.7.0-rc0 | |
QEMU KVM | =2.7.0-rc1 | |
QEMU KVM | =2.7.0-rc2 | |
Debian Debian Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6833 has been classified as a critical vulnerability due to its potential to cause denial of service in QEMU instances.
To fix CVE-2016-6833, upgrade QEMU to version 2.6.3 or later to mitigate the vulnerability.
CVE-2016-6833 affects QEMU versions up to and including 2.6.2 and specific release candidates 2.7.0-rc0, 2.7.0-rc1, and 2.7.0-rc2.
Local guest OS administrators running vulnerable versions of QEMU may exploit CVE-2016-6833, leading to crashes.
CVE-2016-6833 is classified as a use-after-free vulnerability in the vmxnet3_io_bar0_write function of QEMU.