CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:S/C:C/I:C/A:C
CVSS3
Attack Vector
ADJACENT
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
59.1%
Package : qemu-kvm
Version : 1.1.2+dfsg-6+deb7u22
CVE ID : CVE-2016-9602 CVE-2017-7377 CVE-2017-7471 CVE-2017-7493
CVE-2017-8086
Several vulnerabilities were discovered in qemu-kvm, a full
virtualization solution for Linux hosts on x86 hardware with x86 guests
based on the Quick Emulator(Qemu).
CVE-2016-9602
Quick Emulator(Qemu) built with the VirtFS, host directory sharing via
Plan 9 File System(9pfs) support, is vulnerable to an improper link
following issue. It could occur while accessing symbolic link files
on a shared host directory.
A privileged user inside guest could use this flaw to access host file
system beyond the shared folder and potentially escalating their
privileges on a host.
CVE-2017-7377
Quick Emulator(Qemu) built with the virtio-9p back-end support is
vulnerable to a memory leakage issue. It could occur while doing a I/O
operation via v9fs_create/v9fs_lcreate routine.
A privileged user/process inside guest could use this flaw to leak
host memory resulting in Dos.
CVE-2017-7471
Quick Emulator(Qemu) built with the VirtFS, host directory sharing via
Plan 9 File System(9pfs) support, is vulnerable to an improper access
control issue. It could occur while accessing files on a shared host
directory.
A privileged user inside guest could use this flaw to access host file
system beyond the shared folder and potentially escalating their
privileges on a host.
CVE-2017-7493
Quick Emulator(Qemu) built with the VirtFS, host directory sharing via
Plan 9 File System(9pfs) support, is vulnerable to an improper access
control issue. It could occur while accessing virtfs metadata files
in mapped-file security mode.
A guest user could use this flaw to escalate their privileges inside
guest.
CVE-2017-8086
Quick Emulator(Qemu) built with the virtio-9p back-end support is
vulnerable to a memory leakage issue. It could occur while querying
file system extended attributes via 9pfs_list_xattr() routine.
A privileged user/process inside guest could use this flaw to leak
host memory resulting in Dos.
For Debian 7 "Wheezy", these problems have been fixed in version
1.1.2+dfsg-6+deb7u22.
We recommend that you upgrade your qemu-kvm packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
Attachment:
signature.asc
Description: PGP signature
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 8 | armel | qemu-user | < 1:2.1+dfsg-12+deb8u7 | qemu-user_1:2.1+dfsg-12+deb8u7_armel.deb |
Debian | 8 | i386 | qemu-user | < 1:2.1+dfsg-12+deb8u7 | qemu-user_1:2.1+dfsg-12+deb8u7_i386.deb |
Debian | 7 | amd64 | qemu-kvm | < 1.1.2+dfsg-6+deb7u22 | qemu-kvm_1.1.2+dfsg-6+deb7u22_amd64.deb |
Debian | 8 | amd64 | qemu-user | < 1:2.1+dfsg-12+deb8u7 | qemu-user_1:2.1+dfsg-12+deb8u7_amd64.deb |
Debian | 8 | amd64 | qemu-system-sparc | < 1:2.1+dfsg-12+deb8u7 | qemu-system-sparc_1:2.1+dfsg-12+deb8u7_amd64.deb |
Debian | 7 | armel | qemu-system | < 1.1.2+dfsg-6+deb7u22 | qemu-system_1.1.2+dfsg-6+deb7u22_armel.deb |
Debian | 7 | amd64 | qemu-system | < 1.1.2+dfsg-6+deb7u22 | qemu-system_1.1.2+dfsg-6+deb7u22_amd64.deb |
Debian | 8 | i386 | qemu-user-static | < 1:2.1+dfsg-12+deb8u7 | qemu-user-static_1:2.1+dfsg-12+deb8u7_i386.deb |
Debian | 8 | amd64 | qemu-system | < 1:2.1+dfsg-12+deb8u7 | qemu-system_1:2.1+dfsg-12+deb8u7_amd64.deb |
Debian | 7 | armel | qemu-utils | < 1.1.2+dfsg-6+deb7u22 | qemu-utils_1.1.2+dfsg-6+deb7u22_armel.deb |
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:S/C:C/I:C/A:C
CVSS3
Attack Vector
ADJACENT
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
59.1%