7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
4.6 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:P/A:P
QEMU is vulnerable to denial of service. Quick Emulator(Qemu) built with the Block driver for iSCSI images support (virtio-blk) is vulnerable to a heap buffer overflow issue. It could occur while processing iSCSI asynchronous I/O ioctl(2) calls. A user inside guest could use this flaw to crash the Qemu process resulting in DoS or potentially leverage it to execute arbitrary code with privileges of the Qemu process on the host.
git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=a6b3167fa0e825aebb5a7cd8b437b6d41584a196
git.qemu.org/?p=qemu.git;a=commit;h=a6b3167fa0e825aebb5a7cd8b437b6d41584a196
rhn.redhat.com/errata/RHSA-2016-1606.html
rhn.redhat.com/errata/RHSA-2016-1607.html
rhn.redhat.com/errata/RHSA-2016-1653.html
rhn.redhat.com/errata/RHSA-2016-1654.html
rhn.redhat.com/errata/RHSA-2016-1655.html
rhn.redhat.com/errata/RHSA-2016-1756.html
rhn.redhat.com/errata/RHSA-2016-1763.html
www.openwall.com/lists/oss-security/2016/05/30/6
www.openwall.com/lists/oss-security/2016/05/30/7
www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
www.securityfocus.com/bid/90948
www.ubuntu.com/usn/USN-3047-1
www.ubuntu.com/usn/USN-3047-2
access.redhat.com/errata/RHSA-2016:1606
access.redhat.com/errata/RHSA-2016:1607
access.redhat.com/errata/RHSA-2016:1653
access.redhat.com/errata/RHSA-2016:1654
access.redhat.com/errata/RHSA-2016:1655
access.redhat.com/errata/RHSA-2016:1756
access.redhat.com/errata/RHSA-2016:1763
access.redhat.com/security/cve/CVE-2016-5126
access.redhat.com/security/updates/classification/#moderate
bugzilla.redhat.com/show_bug.cgi?id=1340924
lists.debian.org/debian-lts-announce/2019/09/msg00021.html
lists.gnu.org/archive/html/qemu-block/2016-05/msg00779.html
rhn.redhat.com/errata/RHSA-2016-1654.html
security.gentoo.org/glsa/201609-01
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
4.6 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:P/A:P