Description
QEMU (aka Quick Emulator) built to use 'address_space_translate' to map an address to a MemoryRegionSection is vulnerable to an OOB r/w access issue. It could occur while doing pci_dma_read/write calls. Affects QEMU versions >= 1.6.0 and <= 2.3.1. A privileged user inside guest could use this flaw to crash the guest instance resulting in DoS.
References (11)
Core 11
Core References
Vendor Advisory vendor-advisory
x_refsource_redhat
http://rhn.redhat.com/errata/RHSA-2016-2671.html
Issue Tracking x_refsource_confirm
https://bugzilla.redhat.com/show_bug.cgi?id=1300771
Patch x_refsource_confirm
http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=23820dbfc79d1c9dce090b4c555994f2bb6a69b3
Vendor Advisory vendor-advisory
x_refsource_redhat
http://rhn.redhat.com/errata/RHSA-2016-2706.html
Mailing List, Patch mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2016/03/01/1
Mailing List, Patch mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2016/03/01/10
Vendor Advisory vendor-advisory
x_refsource_redhat
http://rhn.redhat.com/errata/RHSA-2016-2705.html
Mailing List mailing-list
x_refsource_mlist
https://lists.gnu.org/archive/html/qemu-stable/2016-01/msg00060.html
Vendor Advisory vendor-advisory
x_refsource_redhat
http://rhn.redhat.com/errata/RHSA-2016-2670.html
Vendor Advisory vendor-advisory
x_refsource_redhat
http://rhn.redhat.com/errata/RHSA-2016-2704.html
Patch x_refsource_confirm
http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=c3c1bb99d1c11978d9ce94d1bdcf0705378c1459
Scores
CVSS v3
5.5
EPSS
0.0009
EPSS Percentile
25.0%
Attack Vector
LOCAL
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Details
CWE
CWE-125
CWE-787
Status
published
Products (14)
qemu/qemu
1.6.0 (4 CPE variants)
qemu/qemu
1.6.1
qemu/qemu
1.6.2
qemu/qemu
1.7.1
qemu/qemu
2.0.0 (5 CPE variants)
qemu/qemu
2.0.2
qemu/qemu
2.1.0 (6 CPE variants)
qemu/qemu
2.1.1
qemu/qemu
2.1.2
qemu/qemu
2.1.3
... and 4 more
Published
Dec 29, 2016
Tracked Since
Feb 18, 2026