Vulnerability Description
Use-after-free vulnerability in hw/ide/ahci.c in QEMU, when built with IDE AHCI Emulation support, allows guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via an invalid AHCI Native Command Queuing (NCQ) AIO command.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Qemu | Qemu | <= 2.5.1.1 |
| Redhat | Openstack | 6.0 |
| Redhat | Virtualization | 3.0 |
| Redhat | Enterprise Linux | 7.0 |
| Debian | Debian Linux | 7.0 |
Related Weaknesses (CWE)
References
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=4ab0359a8ae182a7ac5c9960966727316
- http://rhn.redhat.com/errata/RHSA-2016-0084.htmlThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2016-0086.htmlThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2016-0087.htmlThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2016-0088.htmlThird Party Advisory
- http://www.debian.org/security/2016/dsa-3469Third Party Advisory
- http://www.debian.org/security/2016/dsa-3470Third Party Advisory
- http://www.debian.org/security/2016/dsa-3471Third Party Advisory
- http://www.openwall.com/lists/oss-security/2016/01/09/1Mailing ListThird Party Advisory
- http://www.openwall.com/lists/oss-security/2016/01/09/2Mailing ListThird Party Advisory
- http://www.securityfocus.com/bid/80191Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1034859Third Party AdvisoryVDB Entry
- https://security.gentoo.org/glsa/201602-01Third Party Advisory
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=4ab0359a8ae182a7ac5c9960966727316
- http://rhn.redhat.com/errata/RHSA-2016-0084.htmlThird Party Advisory
FAQ
What is CVE-2016-1568?
CVE-2016-1568 is a vulnerability with a CVSS score of 8.8 (HIGH). Use-after-free vulnerability in hw/ide/ahci.c in QEMU, when built with IDE AHCI Emulation support, allows guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary cod...
How severe is CVE-2016-1568?
CVE-2016-1568 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-1568?
Check the references section above for vendor advisories and patch information. Affected products include: Qemu Qemu, Redhat Openstack, Redhat Virtualization, Redhat Enterprise Linux, Debian Debian Linux.