First published: Mon Apr 24 2017(Updated: )
Quick Emulator(Qemu) built with the virtio-9p back-end support is vulnerable to a memory leakage issue. It could occur while querying file system extended attributes via 9pfs_list_xattr() routine. A privileged user/process inside guest could use this flaw to leak host memory resulting in Dos. Upstream patch: --------------- -> <a href="http://git.qemu.org/?p=qemu.git;a=commit;h=4ffcdef4277a91af15a3c09f7d16af072c29f3f2">http://git.qemu.org/?p=qemu.git;a=commit;h=4ffcdef4277a91af15a3c09f7d16af072c29f3f2</a> Reference: ---------- -> <a href="http://www.openwall.com/lists/oss-security/2017/04/25/5">http://www.openwall.com/lists/oss-security/2017/04/25/5</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU qemu | <=2.8.1 | |
QEMU qemu | =2.9.0-rc0 | |
QEMU qemu | =2.9.0-rc1 | |
QEMU qemu | =2.9.0-rc2 | |
QEMU qemu | =2.9.0-rc3 | |
Debian Debian Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.