First published: Fri Dec 09 2016(Updated: )
Multiple integer overflows in the (1) v9fs_xattr_read and (2) v9fs_xattr_write functions in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allow local guest OS administrators to cause a denial of service (QEMU process crash) via a crafted offset, which triggers an out-of-bounds access.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU KVM | <=2.7.1 | |
Debian GNU/Linux | =8.0 | |
openSUSE | =42.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9104 has a medium severity level as it allows local guest OS administrators to cause a denial of service.
To fix CVE-2016-9104, update QEMU to a version newer than 2.7.1 where the vulnerability is addressed.
CVE-2016-9104 affects QEMU versions up to 2.7.1, Debian 8.0, and openSUSE Leap 42.2.
CVE-2016-9104 enables a denial of service attack by allowing a process crash through integer overflow.
CVE-2016-9104 can be exploited by local guest OS administrators with the ability to craft specific offsets.