First published: Fri Oct 14 2016(Updated: )
The serial_update_parameters function in hw/char/serial.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via vectors involving a value of divider greater than baud base.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU KVM | <=2.7.1 | |
openSUSE | =42.2 | |
redhat openstack | =6.0 | |
redhat openstack | =7.0 | |
redhat openstack | =8 | |
redhat openstack | =9 | |
redhat openstack | =10 | |
redhat openstack | =11 | |
Red Hat Enterprise Virtualization | =4.0 | |
Red Hat Enterprise Linux | =7.0 | |
Debian Debian Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-8669 is considered a high severity vulnerability due to its potential for denial of service.
To fix CVE-2016-8669, upgrade QEMU to version 2.7.1 or later.
CVE-2016-8669 affects users of QEMU versions up to 2.7.1, as well as various versions of Red Hat OpenStack and openSUSE.
CVE-2016-8669 allows local guest OS administrators to perform a denial of service attack via a divide-by-zero error.
QEMU versions up to and including 2.7.1, along with certain versions of Red Hat OpenStack and openSUSE are vulnerable to CVE-2016-8669.