First published: Fri Dec 23 2016(Updated: )
Quick Emulator (Qemu) built with the 'chardev' backend support is vulnerable to a use after free issue. It could occur while hotplug and unplugging the device in the guest. A guest user/process could use this flaw to crash a Qemu process on the host resulting in DoS.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU KVM | <=2.7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9923 is classified as a high severity vulnerability due to its potential to cause a denial of service.
To fix CVE-2016-9923, upgrade QEMU to version 2.8.0 or later, which includes the necessary patch.
CVE-2016-9923 is a use after free vulnerability related to the 'chardev' backend in Quick Emulator.
An attacker could exploit CVE-2016-9923 to crash a QEMU process on the host, resulting in a denial of service.
QEMU versions up to and including 2.7.1 are affected by CVE-2016-9923.