First published: Fri Sep 16 2016(Updated: )
Quick emulator(Qemu) built with the virtio framework is vulnerable to a null pointer dereference flaw. It could occur if the guest was to set the I/O descriptor buffer length to a large value. A privileged user inside guest could use this flaw to crash the Qemu instance on the host resulting in DoS. Upstream fix: ------------- -> <a href="https://lists.gnu.org/archive/html/qemu-devel/2016-09/msg03546.html">https://lists.gnu.org/archive/html/qemu-devel/2016-09/msg03546.html</a> Reference: ---------- -> <a href="http://www.openwall.com/lists/oss-security/2016/09/16/4">http://www.openwall.com/lists/oss-security/2016/09/16/4</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU KVM | <=2.7.1 | |
openSUSE | =42.2 | |
redhat openstack | =6.0 | |
redhat openstack | =7.0 | |
redhat openstack | =8 | |
redhat openstack | =9 | |
redhat openstack | =10 | |
redhat openstack | =11 | |
Red Hat Enterprise Virtualization | =4.0 | |
Red Hat Enterprise Linux | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-7422 is classified as a denial of service (DoS) vulnerability due to a null pointer dereference flaw.
To fix CVE-2016-7422, update QEMU to a version higher than 2.7.1 that includes the relevant patches.
CVE-2016-7422 affects QEMU versions up to 2.7.1 and specific versions of Red Hat OpenStack and openSUSE.
A privileged user inside the guest environment can exploit CVE-2016-7422 to crash the QEMU instance on the host.
The impact of CVE-2016-7422 is a potential denial of service, as it can cause the QEMU instance to crash.