First published: Tue Sep 20 2016(Updated: )
Memory leak in the usb_xhci_exit function in hw/usb/hcd-xhci.c in QEMU (aka Quick Emulator), when the xhci uses msix, allows local guest OS administrators to cause a denial of service (memory consumption and possibly QEMU process crash) by repeatedly unplugging a USB device.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU KVM | <=2.7.1 | |
openSUSE | =42.2 | |
redhat openstack | =6.0 | |
redhat openstack | =7.0 | |
redhat openstack | =8 | |
redhat openstack | =9 | |
redhat openstack | =10 | |
redhat openstack | =11 | |
Red Hat Enterprise Virtualization | =4.0 | |
Red Hat Enterprise Linux | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-7466 is considered a high severity vulnerability that can cause denial of service due to memory leak.
To fix CVE-2016-7466, upgrade to a version of QEMU later than 2.7.1 that addresses this memory leak issue.
CVE-2016-7466 affects QEMU versions up to 2.7.1, as well as various versions of Red Hat OpenStack and openSUSE Leap 42.2.
An attacker can exploit CVE-2016-7466 by repeatedly unplugging a USB device, leading to memory consumption and potential crash of the QEMU process.
CVE-2016-7466 requires local access by guest OS administrators, making it a local privilege escalation vulnerability.