CVE-2016-1922

Published on: 12/29/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:05 PM UTC

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Certain versions of Debian Linux from Debian contain the following vulnerability:

QEMU (aka Quick Emulator) built with the TPR optimization for 32-bit Windows guests support is vulnerable to a null pointer dereference flaw. It occurs while doing I/O port write operations via hmp interface. In that, 'current_cpu' remains null, which leads to the null pointer dereference. A user or process could use this flaw to crash the QEMU instance, resulting in DoS issue.

  • CVE-2016-1922 has been assigned by [email protected] to track the vulnerability - currently rated as MEDIUM severity.

CVSS3 Score: 5.5 - MEDIUM

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
LOCAL LOW LOW NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED NONE NONE HIGH

CVSS2 Score: 2.1 - LOW

Access
Vector
Access
Complexity
Authentication
LOCAL LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
NONE NONE PARTIAL

CVE References

Description Tags Link
Debian -- Security Information -- DSA-3471-1 qemu Third Party Advisory
www.debian.org
Depreciated Link
text/html
URL Logo DEBIAN DSA-3471
Debian -- Security Information -- DSA-3469-1 qemu Third Party Advisory
www.debian.org
Depreciated Link
text/html
URL Logo DEBIAN DSA-3469
oss-security - CVE request Qemu: i386: null pointer dereference in vapic_write Mailing List
Third Party Advisory
www.openwall.com
text/html
URL Logo MLIST [oss-security] 20160116 CVE request Qemu: i386: null pointer dereference in vapic_write
QEMU 'i386/kvmvapic.c' NULL Pointer Dereference Denial of Service Vulnerability Third Party Advisory
VDB Entry
cve.report (archive)
text/html
URL Logo BID 81058
Debian -- Security Information -- DSA-3470-1 qemu-kvm Third Party Advisory
www.debian.org
Depreciated Link
text/html
URL Logo DEBIAN DSA-3470
oss-security - Re: CVE request Qemu: i386: null pointer dereference in vapic_write Mailing List
Third Party Advisory
www.openwall.com
text/html
URL Logo MLIST [oss-security] 20160116 Re: CVE request Qemu: i386: null pointer dereference in vapic_write
[Qemu-devel] [PULL] i386: avoid null pointer dereference Patch
Vendor Advisory
lists.gnu.org
text/x-diff
MLIST [qemu-devel] 20160115 [PULL] i386: avoid null pointer dereference
Bug 1283934 – CVE-2016-1922 Qemu: i386: null pointer dereference in vapic_write() Issue Tracking
Third Party Advisory
bugzilla.redhat.com
text/html
URL Logo CONFIRM bugzilla.redhat.com/show_bug.cgi?id=1283934
QEMU: Multiple vulnerabilities (GLSA 201604-01) — Gentoo Security Third Party Advisory
security.gentoo.org
text/html
URL Logo GENTOO GLSA-201604-01

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
Operating
System
DebianDebian Linux7.0AllAllAll
Operating
System
DebianDebian Linux8.0AllAllAll
Operating
System
DebianDebian Linux7.0AllAllAll
Operating
System
DebianDebian Linux8.0AllAllAll
ApplicationQemuQemuAllAllAllAll
  • cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*: