Division by zero in QEMU - CVE-2016-9921
Published: December 24, 2016 / Updated: August 9, 2020
QEMU
Detailed vulnerability description
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to divide by zero error when cirrus graphics mode was set to be VGA. A privileged user inside guest could use this flaw to crash the Qemu process instance on the host, resulting in DoS. A remote attacker can pass specially crafted file to the application and crash it.
How to mitigate CVE-2016-9921
Sources
- http://www.openwall.com/lists/oss-security/2016/12/09/1
- http://www.securityfocus.com/bid/94803
- https://access.redhat.com/errata/RHSA-2017:2392
- https://access.redhat.com/errata/RHSA-2017:2408
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
- https://security.gentoo.org/glsa/201701-49