{"id":"CVE-2016-8909","details":"The intel_hda_xfer function in hw/audio/intel-hda.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via an entry with the same value for buffer length and pointer position.","modified":"2026-05-15T12:03:06.781389771Z","published":"2016-11-04T21:59:09.693Z","related":["SUSE-SU-2016:2879-1","SUSE-SU-2016:2902-1","SUSE-SU-2016:2936-1","SUSE-SU-2016:2988-1","SUSE-SU-2016:3083-1","SUSE-SU-2016:3156-1","SUSE-SU-2016:3174-1","SUSE-SU-2016:3273-1","openSUSE-SU-2024:11287-1"],"database_specific":{"unresolved_ranges":[{"vendor_product":"debian:debian_linux","source":"CPE_FIELD","extracted_events":[{"last_affected":"8.0"}],"cpes":["cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"]},{"vendor_product":"opensuse:leap","source":"CPE_FIELD","extracted_events":[{"last_affected":"42.2"}],"cpes":["cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*"]},{"cpes":["cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*","cpe:2.3:a:redhat:openstack:11:*:*:*:*:*:*:*","cpe:2.3:a:redhat:openstack:6.0:*:*:*:*:*:*:*","cpe:2.3:a:redhat:openstack:7.0:*:*:*:*:*:*:*","cpe:2.3:a:redhat:openstack:8:*:*:*:*:*:*:*","cpe:2.3:a:redhat:openstack:9:*:*:*:*:*:*:*"],"source":"CPE_FIELD","extracted_events":[{"last_affected":"6.0"},{"last_affected":"7.0"},{"last_affected":"8"},{"last_affected":"9"},{"last_affected":"10"},{"last_affected":"11"}],"vendor_product":"redhat:openstack"},{"vendor_product":"redhat:virtualization","source":"CPE_FIELD","extracted_events":[{"last_affected":"4.0"}],"cpes":["cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*"]}]},"references":[{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2016/10/24/4"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/93842"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:2392"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:2408"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201611-11"},{"type":"FIX","url":"http://www.openwall.com/lists/oss-security/2016/10/24/1"},{"type":"FIX","url":"https://lists.gnu.org/archive/html/qemu-devel/2016-10/msg04682.html"}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"}]}