First published: Mon Oct 24 2016(Updated: )
Quick Emulator(Qemu) built with the RTL8139 ethernet controller emulation support is vulnerable to an infinite loop issue. It could occur while transmitting packets in C+ mode of operation. A privileged user inside guest could use this flaw to consume excessive CPU cycles on the host, resulting in DoS situation. Upstream patch: --------------- -> <a href="https://lists.gnu.org/archive/html/qemu-devel/2016-10/msg05495.html">https://lists.gnu.org/archive/html/qemu-devel/2016-10/msg05495.html</a> Reference: ---------- -> <a href="http://www.openwall.com/lists/oss-security/2016/10/24/5">http://www.openwall.com/lists/oss-security/2016/10/24/5</a>
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1388046 is high due to the potential for a privileged user inside a guest to exploit it and consume excessive CPU cycles on the host.
To fix REDHAT-BUG-1388046, update to the latest version of QEMU that includes the patch for this vulnerability.
The potential impacts of REDHAT-BUG-1388046 include excessive CPU consumption on the host, leading to degraded performance of the virtualized environment.
REDHAT-BUG-1388046 affects users of QEMU Quick Emulator that utilize the RTL8139 ethernet controller emulation.
Exploitation of REDHAT-BUG-1388046 requires a privileged user to be inside the guest, making it dependent on the guest's access level.