First published: Wed Oct 05 2016(Updated: )
The imx_fec_do_tx function in hw/net/imx_fec.c in QEMU (aka Quick Emulator) does not properly limit the buffer descriptor count when transmitting packets, which allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via vectors involving a buffer descriptor with a length of 0 and crafted values in bd.flags.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU KVM | <=2.8.1.1 | |
QEMU KVM | =2.9.0-rc0 | |
QEMU KVM | =2.9.0-rc1 | |
QEMU KVM | =2.9.0-rc2 | |
QEMU KVM | =2.9.0-rc3 | |
QEMU KVM | =2.9.0-rc4 | |
QEMU KVM | =2.9.0-rc5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-7907 is classified as a high-severity vulnerability due to its potential to cause denial of service.
To fix CVE-2016-7907, you should update QEMU to a version higher than 2.8.1.1 or apply available patches that address this vulnerability.
CVE-2016-7907 affects QEMU versions up to and including 2.8.1.1, as well as various release candidates of version 2.9.0.
CVE-2016-7907 allows local guest OS administrators to create an infinite loop that can lead to a QEMU process crash.
The exploitation of CVE-2016-7907 may require local access and expertise in managing guest OS environments, hence it is not considered trivial.