First published: Tue Dec 05 2017(Updated: )
Virtio Vring implementation in Quick Emulator(QEMU) is vulnerable to an arithmetic exception issue. It could occur if a guest was to unset vring alignment while updating Virtio rings. A guest user/process could use this flaw to crash Qemu process resulting in DoS. Upstream patch: --------------- -> <a href="https://lists.gnu.org/archive/html/qemu-devel/2017-12/msg00166.html">https://lists.gnu.org/archive/html/qemu-devel/2017-12/msg00166.html</a>
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1520782 is classified as a Denial of Service (DoS) vulnerability.
To fix REDHAT-BUG-1520782, apply the relevant upstream patches provided by QEMU.
REDHAT-BUG-1520782 is caused by an arithmetic exception issue in the Virtio Vring implementation of QEMU when vring alignment is unset.
QEMU users, particularly those utilizing Virtio, are affected by REDHAT-BUG-1520782.
Exploiting REDHAT-BUG-1520782 can lead to crashing the QEMU process, resulting in a Denial of Service condition.