First published: Mon Oct 24 2016(Updated: )
Quick Emulator(Qemu) built with the Intel HDA controller emulation support is vulnerable to an infinite loop issue. It could occur while processing the DMA buffer stream while doing data transfer in 'intel_hda_xfer'. A privileged user inside guest could use this flaw to consume excessive CPU cycles on the host, resulting in DoS. Upstream patch -------------- -> <a href="https://lists.gnu.org/archive/html/qemu-devel/2016-10/msg04717.html">https://lists.gnu.org/archive/html/qemu-devel/2016-10/msg04717.html</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU qemu | <=2.7.1 | |
Debian Debian Linux | =8.0 | |
openSUSE Leap | =42.2 | |
Redhat Openstack | =6.0 | |
Redhat Openstack | =7.0 | |
Redhat Openstack | =8 | |
Redhat Openstack | =9 | |
Redhat Openstack | =10 | |
Redhat Openstack | =11 | |
Redhat Virtualization | =4.0 | |
Redhat Enterprise Linux | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.