vulnerability
Oracle Linux: CVE-2016-5403: ELSA-2016-1585: qemu-kvm security update (MODERATE) (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:L/AC:L/Au:N/C:N/I:N/A:C) | Jul 27, 2016 | Aug 9, 2016 | Dec 3, 2025 |
Severity
5
CVSS
(AV:L/AC:L/Au:N/C:N/I:N/A:C)
Published
Jul 27, 2016
Added
Aug 9, 2016
Modified
Dec 3, 2025
Description
The virtqueue_pop function in hw/virtio/virtio.c in QEMU allows local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by submitting requests without waiting for completion.
Quick Emulator (QEMU) built with the virtio framework is vulnerable to an unbounded memory allocation issue. It was found that a malicious guest user could submit more requests than the virtqueue size permits. Processing a request allocates a VirtQueueElement results in unbounded memory allocation on the host controlled by the guest.
Quick Emulator (QEMU) built with the virtio framework is vulnerable to an unbounded memory allocation issue. It was found that a malicious guest user could submit more requests than the virtqueue size permits. Processing a request allocates a VirtQueueElement results in unbounded memory allocation on the host controlled by the guest.
Solutions
oracle-linux-upgrade-kmod-kvmoracle-linux-upgrade-kmod-kvm-debugoracle-linux-upgrade-kvmoracle-linux-upgrade-kvm-qemu-imgoracle-linux-upgrade-kvm-toolsoracle-linux-upgrade-libcacardoracle-linux-upgrade-libcacard-develoracle-linux-upgrade-libcacard-toolsoracle-linux-upgrade-qemu-guest-agentoracle-linux-upgrade-qemu-imgoracle-linux-upgrade-qemu-kvmoracle-linux-upgrade-qemu-kvm-commonoracle-linux-upgrade-qemu-kvm-tools
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.