First published: Mon Mar 27 2017(Updated: )
The cirrus_do_copy function in hw/display/cirrus_vga.c in QEMU (aka Quick Emulator), when cirrus graphics mode is VGA, allows local guest OS privileged users to cause a denial of service (divide-by-zero error and QEMU process crash) via vectors involving blit pitch values.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU KVM | <=2.7.1 | |
QEMU KVM | =2.8.0-rc0 | |
QEMU KVM | =2.8.0-rc1 | |
QEMU KVM | =2.8.0-rc2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9922 has a high severity level as it allows local guest OS privileged users to crash the QEMU process.
To fix CVE-2016-9922, you should update QEMU to version 2.8.0 or later, which addresses this vulnerability.
CVE-2016-9922 is caused by a divide-by-zero error in the cirrus_do_copy function when using cirrus graphics mode in QEMU.
Local guest OS privileged users running vulnerable versions of QEMU are affected by CVE-2016-9922.
Yes, CVE-2016-9922 affects QEMU versions up to and including 2.7.1 and specific release candidates of version 2.8.0.