CVE-2016-7466
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
10/12/2016
Last modified:
12/04/2025
Description
Memory leak in the usb_xhci_exit function in hw/usb/hcd-xhci.c in QEMU (aka Quick Emulator), when the xhci uses msix, allows local guest OS administrators to cause a denial of service (memory consumption and possibly QEMU process crash) by repeatedly unplugging a USB device.
Impact
Base Score 3.x
6.00
Severity 3.x
MEDIUM
Base Score 2.0
1.90
Severity 2.0
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:* | 2.7.1 (including) | |
| cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:redhat:openstack:6.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:redhat:openstack:7.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:redhat:openstack:8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:redhat:openstack:9:*:*:*:*:*:*:* | ||
| cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:* | ||
| cpe:2.3:a:redhat:openstack:11:*:*:*:*:*:*:* | ||
| cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://git.qemu.org/?p=qemu.git%3Ba%3Dcommit%3Bh%3Db53dd4495ced2432a0b652ea895e651d07336f7e
- http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html
- http://www.openwall.com/lists/oss-security/2016/09/19/8
- http://www.openwall.com/lists/oss-security/2016/09/20/3
- http://www.securityfocus.com/bid/93029
- https://access.redhat.com/errata/RHSA-2017:2392
- https://access.redhat.com/errata/RHSA-2017:2408
- https://lists.gnu.org/archive/html/qemu-devel/2016-09/msg02773.html
- https://security.gentoo.org/glsa/201611-11
- http://git.qemu.org/?p=qemu.git%3Ba%3Dcommit%3Bh%3Db53dd4495ced2432a0b652ea895e651d07336f7e
- http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html
- http://www.openwall.com/lists/oss-security/2016/09/19/8
- http://www.openwall.com/lists/oss-security/2016/09/20/3
- http://www.securityfocus.com/bid/93029
- https://access.redhat.com/errata/RHSA-2017:2392
- https://access.redhat.com/errata/RHSA-2017:2408
- https://lists.gnu.org/archive/html/qemu-devel/2016-09/msg02773.html
- https://security.gentoo.org/glsa/201611-11



