First published: Mon Oct 24 2016(Updated: )
Quick Emulator(Qemu) built with the Intel HDA controller emulation support is vulnerable to an infinite loop issue. It could occur while processing the DMA buffer stream while doing data transfer in 'intel_hda_xfer'. A privileged user inside guest could use this flaw to consume excessive CPU cycles on the host, resulting in DoS. Upstream patch -------------- -> <a href="https://lists.gnu.org/archive/html/qemu-devel/2016-10/msg04717.html">https://lists.gnu.org/archive/html/qemu-devel/2016-10/msg04717.html</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU KVM | <=2.7.1 | |
Debian GNU/Linux | =8.0 | |
openSUSE | =42.2 | |
redhat openstack | =6.0 | |
redhat openstack | =7.0 | |
redhat openstack | =8 | |
redhat openstack | =9 | |
redhat openstack | =10 | |
redhat openstack | =11 | |
Red Hat Enterprise Virtualization | =4.0 | |
Red Hat Enterprise Linux | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-8909 is classified as a medium severity vulnerability.
To fix CVE-2016-8909, upgrade QEMU to version 2.8 or later, which includes the necessary patches.
CVE-2016-8909 affects users of QEMU versions up to 2.7.1 that utilize the Intel HDA controller emulation.
CVE-2016-8909 can lead to excessive CPU usage by allowing a malicious privileged user in the guest system to trigger an infinite loop.
CVE-2016-8909 is not remotely exploitable as it requires a privileged user to exploit the vulnerability within the guest.