First published: Mon Jan 30 2017(Updated: )
Quick emulator(Qemu) built with the SDHCI device emulation support is vulnerable to an OOB heap access issue. It could occur while doing a multi block SDMA transfer via sdhci_sdma_transfer_multi_blocks routine. A privileged user inside guest could use this flaw to crash the Qemu process resulting in DoS or potentially execute arbitrary code with privileges of the Qemu process on the host. Upstream patch: --------------- -> <a href="https://lists.gnu.org/archive/html/qemu-devel/2017-01/msg06191.html">https://lists.gnu.org/archive/html/qemu-devel/2017-01/msg06191.html</a> Reference: ---------- -> <a href="http://www.openwall.com/lists/oss-security/2017/01/30/2">http://www.openwall.com/lists/oss-security/2017/01/30/2</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU KVM | <=2.8.1.1 | |
Debian Debian Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-5667 has been assigned a medium severity rating due to its potential to cause a denial of service.
To fix CVE-2017-5667, upgrade to QEMU version 2.8.1.2 or later.
CVE-2017-5667 affects QEMU versions up to 2.8.1.1 and Debian Linux version 8.0.
A privileged user inside the guest environment can exploit CVE-2017-5667 to crash the QEMU process.
CVE-2017-5667 is classified as an out-of-bounds heap access vulnerability.