CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:N/I:N/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
28.2%
The virtqueue_pop function in hw/virtio/virtio.c in QEMU allows local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by submitting requests without waiting for completion.
Vendor | Product | Version | CPE |
---|---|---|---|
canonical | ubuntu_linux | 12.04 | cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:* |
canonical | ubuntu_linux | 14.04 | cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:* |
canonical | ubuntu_linux | 16.04 | cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:* |
oracle | linux | 5 | cpe:2.3:o:oracle:linux:5:-:*:*:*:*:*:* |
oracle | linux | 6 | cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:* |
oracle | linux | 7 | cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:* |
oracle | vm_server | 3.4 | cpe:2.3:o:oracle:vm_server:3.4:*:*:*:*:*:x86:* |
qemu | qemu | * | cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:* |
qemu | qemu | 2.7.0 | cpe:2.3:a:qemu:qemu:2.7.0:rc0:*:*:*:*:*:* |
debian | debian_linux | 8.0 | cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* |
rhn.redhat.com/errata/RHSA-2016-1585.html
rhn.redhat.com/errata/RHSA-2016-1586.html
rhn.redhat.com/errata/RHSA-2016-1606.html
rhn.redhat.com/errata/RHSA-2016-1607.html
rhn.redhat.com/errata/RHSA-2016-1652.html
rhn.redhat.com/errata/RHSA-2016-1653.html
rhn.redhat.com/errata/RHSA-2016-1654.html
rhn.redhat.com/errata/RHSA-2016-1655.html
rhn.redhat.com/errata/RHSA-2016-1756.html
rhn.redhat.com/errata/RHSA-2016-1763.html
rhn.redhat.com/errata/RHSA-2016-1943.html
www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
www.securityfocus.com/bid/92148
www.securitytracker.com/id/1036476
www.ubuntu.com/usn/USN-3047-1
www.ubuntu.com/usn/USN-3047-2
xenbits.xen.org/xsa/advisory-184.html
bugzilla.redhat.com/show_bug.cgi?id=1358359
lists.debian.org/debian-lts-announce/2019/09/msg00021.html
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:N/I:N/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
28.2%