Bug 1333425 (CVE-2016-8576)
Summary: | CVE-2016-8576 Qemu: usb: xHCI: infinite loop vulnerability in xhci_ring_fetch | ||||||
---|---|---|---|---|---|---|---|
Product: | [Other] Security Response | Reporter: | Adam Mariš <amaris> | ||||
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> | ||||
Status: | CLOSED WONTFIX | QA Contact: | |||||
Severity: | low | Docs Contact: | |||||
Priority: | low | ||||||
Version: | unspecified | CC: | abaron, ailan, alonbl, aortega, apevec, areis, bmcclain, chrisw, crobinso, dblechte, drjones, eedri, gmollett, imammedo, jen, jschluet, knoel, lhh, lpeer, markmc, mgoldboi, michal.skrivanek, mkenneth, mrezanin, mst, pbonzini, ppandit, rbalakri, rbryant, rkrcmar, sclewis, security-response-team, srevivo, tdecacqu, vkuznets, ykaul, ylavi | ||||
Target Milestone: | --- | Keywords: | Security | ||||
Target Release: | --- | ||||||
Hardware: | All | ||||||
OS: | Linux | ||||||
Whiteboard: | |||||||
Fixed In Version: | Doc Type: | Bug Fix | |||||
Doc Text: | Story Points: | --- | |||||
Clone Of: | Environment: | ||||||
Last Closed: | 2018-01-16 10:24:57 UTC | Type: | --- | ||||
Regression: | --- | Mount Type: | --- | ||||
Documentation: | --- | CRM: | |||||
Verified Versions: | Category: | --- | |||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
Cloudforms Team: | --- | Target Upstream Version: | |||||
Embargoed: | |||||||
Bug Depends On: | 1382322, 1382323, 1476049, 1476068, 1476069, 1476072, 1476074, 1476077 | ||||||
Bug Blocks: | 1326713 | ||||||
Attachments: |
|
Description
Adam Mariš
2016-05-05 13:18:27 UTC
Acknowledgments: Name: Li Qiang (Qihoo 360) Created attachment 1154206 [details]
Backtrace report
Created xen tracking bugs for this issue: Affects: fedora-all [bug 1382323] Created qemu tracking bugs for this issue: Affects: fedora-all [bug 1382322] I think this ended up as: commit 05f43d44e4bc26611ce25fd7d726e483f73363ce Author: Gerd Hoffmann <kraxel> Date: Mon Oct 10 12:46:22 2016 +0200 xhci: limit the number of link trbs we are willing to process This issue has been addressed in the following products: Red Hat OpenStack Platform 10.0 (Newton) Red Hat OpenStack Platform 11.0 (Ocata) Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7 Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7 Red Hat OpenStack Platform 8.0 (Liberty) Red Hat OpenStack Platform 9.0 (Mitaka) Via RHSA-2017:2408 https://access.redhat.com/errata/RHSA-2017:2408 This issue has been addressed in the following products: RHEV 4.X RHEV-H and Agents for RHEL-7 Via RHSA-2017:2392 https://access.redhat.com/errata/RHSA-2017:2392 |