8.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
6.9 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:C/I:C/A:C
qemu-kvm-rhev is vulnerable to denial of service (DoS) attacks. The vulnerability exists as a use-after-free vulnerability in hw/ide/ahci.c in QEMU, when built with IDE AHCI Emulation support, allows guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via an invalid AHCI Native Command Queuing (NCQ) AIO command.
git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=4ab0359a8ae182a7ac5c99609667273167703fab
git.qemu.org/?p=qemu.git;a=commit;h=4ab0359a8ae182a7ac5c99609667273167703fab
rhn.redhat.com/errata/RHSA-2016-0084.html
rhn.redhat.com/errata/RHSA-2016-0086.html
rhn.redhat.com/errata/RHSA-2016-0087.html
rhn.redhat.com/errata/RHSA-2016-0088.html
www.debian.org/security/2016/dsa-3469
www.debian.org/security/2016/dsa-3470
www.debian.org/security/2016/dsa-3471
www.openwall.com/lists/oss-security/2016/01/09/1
www.openwall.com/lists/oss-security/2016/01/09/2
www.securityfocus.com/bid/80191
www.securitytracker.com/id/1034859
access.redhat.com/errata/RHSA-2016:0084
access.redhat.com/errata/RHSA-2016:0086
access.redhat.com/errata/RHSA-2016:0087
access.redhat.com/errata/RHSA-2016:0088
access.redhat.com/security/cve/CVE-2016-1568
access.redhat.com/security/updates/classification/#important
bugzilla.redhat.com/show_bug.cgi?id=1288096
bugzilla.redhat.com/show_bug.cgi?id=1288532
bugzilla.redhat.com/show_bug.cgi?id=1299345
rhn.redhat.com/errata/RHSA-2016-0084.html
security.gentoo.org/glsa/201602-01
8.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
6.9 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:C/I:C/A:C