First published: Fri Nov 04 2016(Updated: )
The rc4030_write function in hw/dma/rc4030.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via a large interval timer reload value.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU KVM | <=2.8.1.1 | |
QEMU KVM | =2.9.0-rc0 | |
openSUSE | =42.2 | |
Debian Debian Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-8667 is classified as a medium-severity vulnerability because it allows denial of service through a divide-by-zero error resulting in QEMU crash.
To fix CVE-2016-8667, you should update QEMU to version 2.9.0 or later, or apply any patches provided by your operating system vendor.
CVE-2016-8667 affects local guest OS administrators running QEMU versions up to 2.8.1.1 and 2.9.0 release candidate.
Systems impacted by CVE-2016-8667 include QEMU KVM on various platforms, as well as openSUSE and Debian versions mentioned in the vulnerability report.
The attack associated with CVE-2016-8667 can be described as a denial-of-service attack due to the exploitation of a divide-by-zero error.