First published: Thu May 05 2016(Updated: )
Quick Emulator(Qemu) built with the USB xHCI controller emulation support is vulnerable to an infinite loop issue. It could occur while processing USB command ring in 'xhci_ring_fetch'. A privileged user/process inside guest could use this issue to crash the Qemu process on the host leading to DoS. Upstream patch -------------- -> <a href="https://lists.gnu.org/archive/html/qemu-devel/2016-10/msg01265.html">https://lists.gnu.org/archive/html/qemu-devel/2016-10/msg01265.html</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU | <=2.7.1 | |
SUSE Linux | =42.2 | |
Red Hat OpenStack for IBM Power | =6.0 | |
Red Hat OpenStack for IBM Power | =7.0 | |
Red Hat OpenStack for IBM Power | =8 | |
Red Hat OpenStack for IBM Power | =9 | |
Red Hat OpenStack for IBM Power | =10 | |
Red Hat OpenStack for IBM Power | =11 | |
Red Hat Enterprise Virtualization | =4.0 | |
Red Hat Enterprise Linux | =7.0 | |
Debian | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-8576 is classified as a high severity vulnerability due to its potential to cause a denial of service.
To fix CVE-2016-8576, upgrading QEMU to version 2.8.0 or higher is recommended.
CVE-2016-8576 affects QEMU versions up to 2.7.1 and specific versions of Red Hat OpenStack, openSUSE, and Debian.
CVE-2016-8576 allows a privileged user within a guest to crash the QEMU process on the host, leading to a denial of service.
CVE-2016-8576 requires local access to the guest environment for exploitation, making it less likely to be a remote attack.