First published: Fri Sep 16 2016(Updated: )
Quick emulator(Qemu) built with the virtio framework is vulnerable to a null pointer dereference flaw. It could occur if the guest was to set the I/O descriptor buffer length to a large value. A privileged user inside guest could use this flaw to crash the Qemu instance on the host resulting in DoS. Upstream fix: ------------- -> <a href="https://lists.gnu.org/archive/html/qemu-devel/2016-09/msg03546.html">https://lists.gnu.org/archive/html/qemu-devel/2016-09/msg03546.html</a> Reference: ---------- -> <a href="http://www.openwall.com/lists/oss-security/2016/09/16/4">http://www.openwall.com/lists/oss-security/2016/09/16/4</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU qemu | <=2.7.1 | |
openSUSE Leap | =42.2 | |
Redhat Openstack | =6.0 | |
Redhat Openstack | =7.0 | |
Redhat Openstack | =8 | |
Redhat Openstack | =9 | |
Redhat Openstack | =10 | |
Redhat Openstack | =11 | |
Redhat Virtualization | =4.0 | |
Redhat Enterprise Linux | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.