Vulnerability Description
The xhci_kick_epctx function in hw/usb/hcd-xhci.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (infinite loop and QEMU process crash) via vectors related to control transfer descriptor sequence.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Qemu | Qemu | <= 2.8.1.1 |
| Debian | Debian Linux | 8.0 |
| Redhat | Openstack | 6.0 |
| Redhat | Virtualization | 4.0 |
| Redhat | Enterprise Linux | 7.0 |
Related Weaknesses (CWE)
References
- http://git.qemu-project.org/?p=qemu.git%3Ba=commit%3Bh=f89b60f6e5fee3923bedf80e8
- http://www.openwall.com/lists/oss-security/2017/02/13/11Mailing ListPatchThird Party Advisory
- http://www.securityfocus.com/bid/96220Third Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHSA-2017:2392Third Party Advisory
- https://access.redhat.com/errata/RHSA-2017:2408Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=1421626Issue TrackingPatchThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.htmlThird Party Advisory
- https://lists.gnu.org/archive/html/qemu-devel/2017-02/msg01101.htmlPatchThird Party Advisory
- https://security.gentoo.org/glsa/201704-01Third Party Advisory
- http://git.qemu-project.org/?p=qemu.git%3Ba=commit%3Bh=f89b60f6e5fee3923bedf80e8
- http://www.openwall.com/lists/oss-security/2017/02/13/11Mailing ListPatchThird Party Advisory
- http://www.securityfocus.com/bid/96220Third Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHSA-2017:2392Third Party Advisory
- https://access.redhat.com/errata/RHSA-2017:2408Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=1421626Issue TrackingPatchThird Party Advisory
FAQ
What is CVE-2017-5973?
CVE-2017-5973 is a vulnerability with a CVSS score of 5.5 (MEDIUM). The xhci_kick_epctx function in hw/usb/hcd-xhci.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (infinite loop and QEMU process crash) via vectors re...
How severe is CVE-2017-5973?
CVE-2017-5973 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-5973?
Check the references section above for vendor advisories and patch information. Affected products include: Qemu Qemu, Debian Debian Linux, Redhat Openstack, Redhat Virtualization, Redhat Enterprise Linux.