First published: Fri Mar 31 2017(Updated: )
Quick Emulator(Qemu) built with the virtio-9p back-end support is vulnerable to a memory leakage issue. It could occur while doing a I/O operation via v9fs_create/v9fs_lcreate routine. A privileged user/process inside guest could use this flaw to leak host memory resulting in Dos. Upstream patch: --------------- -> <a href="https://lists.gnu.org/archive/html/qemu-devel/2017-03/msg05449.html">https://lists.gnu.org/archive/html/qemu-devel/2017-03/msg05449.html</a> Reference: ---------- -> <a href="http://www.openwall.com/lists/oss-security/2017/04/03/2">http://www.openwall.com/lists/oss-security/2017/04/03/2</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU KVM | <=2.8.1 | |
QEMU KVM | =2.9.0-rc0 | |
QEMU KVM | =2.9.0-rc1 | |
Debian Debian Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-7377 has a high severity due to its potential to cause denial of service by leaking host memory.
To fix CVE-2017-7377, upgrade QEMU to a version later than 2.8.1 that includes the upstream patch.
CVE-2017-7377 affects QEMU installations with virtio-9p back-end support that are running specific vulnerable versions.
CVE-2017-7377 is a memory leakage vulnerability occurring during I/O operations in QEMU.
No, CVE-2017-7377 can only be exploited by a privileged user or process within the guest environment.