CVE-2016-7466

Published on: 12/09/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:07 PM UTC

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H

Certain versions of Leap from Opensuse contain the following vulnerability:

Memory leak in the usb_xhci_exit function in hw/usb/hcd-xhci.c in QEMU (aka Quick Emulator), when the xhci uses msix, allows local guest OS administrators to cause a denial of service (memory consumption and possibly QEMU process crash) by repeatedly unplugging a USB device.

  • CVE-2016-7466 has been assigned by [email protected] to track the vulnerability - currently rated as MEDIUM severity.

CVSS3 Score: 6 - MEDIUM

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
LOCAL LOW HIGH NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
CHANGED NONE NONE HIGH

CVSS2 Score: 1.9 - LOW

Access
Vector
Access
Complexity
Authentication
LOCAL MEDIUM NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
NONE NONE PARTIAL

CVE References

Description Tags Link
QEMU: Multiple vulnerabilities (GLSA 201611-11) — Gentoo Security Third Party Advisory
security.gentoo.org
text/html
URL Logo GENTOO GLSA-201611-11
Red Hat Customer Portal Third Party Advisory
access.redhat.com
text/html
URL Logo REDHAT RHSA-2017:2408
git.qemu.org Git - qemu.git/commit Patch
Vendor Advisory
git.qemu.org
text/xml
URL Logo CONFIRM git.qemu.org/?p=qemu.git;a=commit;h=b53dd4495ced2432a0b652ea895e651d07336f7e
Red Hat Customer Portal Third Party Advisory
access.redhat.com
text/html
URL Logo REDHAT RHSA-2017:2392
openSUSE-SU-2016:3237-1: moderate: Security update for qemu Mailing List
Third Party Advisory
lists.opensuse.org
text/html
URL Logo SUSE openSUSE-SU-2016:3237
oss-security - Re: CVE Request Qemu: usb: xhci memory leakage during device unplug Mailing List
Third Party Advisory
www.openwall.com
text/html
URL Logo MLIST [oss-security] 20160920 Re: CVE Request Qemu: usb: xhci memory leakage during device unplug
oss-security - CVE Request Qemu: usb: xhci memory leakage during device unplug Mailing List
Third Party Advisory
www.openwall.com
text/html
URL Logo MLIST [oss-security] 20160920 CVE Request Qemu: usb: xhci memory leakage during device unplug
QEMU 'hw/usb/hcd-xhci.c' Information Disclosure Vulnerability Third Party Advisory
VDB Entry
cve.report (archive)
text/html
URL Logo BID 93029
[Qemu-devel] [PATCH v2] usb:xhci:fix memory leak in usb_xhci_exit Patch
Third Party Advisory
lists.gnu.org
text/x-diff
MLIST [qemu-devel] 20160913 [PATCH v2] usb:xhci:fix memory leak in usb_xhci_exit

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
Operating
System
OpensuseLeap42.2AllAllAll
Operating
System
OpensuseLeap42.2AllAllAll
ApplicationQemuQemuAllAllAllAll
Operating
System
RedhatEnterprise Linux7.0AllAllAll
Operating
System
RedhatEnterprise Linux7.0AllAllAll
ApplicationRedhatOpenstack10AllAllAll
ApplicationRedhatOpenstack11.0AllAllAll
ApplicationRedhatOpenstack6.0AllAllAll
ApplicationRedhatOpenstack7.0AllAllAll
ApplicationRedhatOpenstack8.0AllAllAll
ApplicationRedhatOpenstack9.0AllAllAll
ApplicationRedhatOpenstack10AllAllAll
ApplicationRedhatOpenstack11.0AllAllAll
ApplicationRedhatOpenstack6.0AllAllAll
ApplicationRedhatOpenstack7.0AllAllAll
ApplicationRedhatOpenstack8.0AllAllAll
ApplicationRedhatOpenstack9.0AllAllAll
ApplicationRedhatVirtualization4.0AllAllAll
ApplicationRedhatVirtualization4.0AllAllAll
  • cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*:
  • cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*:
  • cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*:
  • cpe:2.3:a:redhat:openstack:11.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:redhat:openstack:6.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:redhat:openstack:7.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:redhat:openstack:8.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:redhat:openstack:9.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*:
  • cpe:2.3:a:redhat:openstack:11.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:redhat:openstack:6.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:redhat:openstack:7.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:redhat:openstack:8.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:redhat:openstack:9.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*: