From ${URL}: The vga display update in Qemu 2.8.0 through 2.9.0 mis-calculated the region for the dirty bitmap snapshot in case split screen mode is used causing a denial of service (assertion failure) in the "cpu_physical_memory_snapshot_get_dirty" function. CVE Details: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-13673 Patch: https://lists.gnu.org/archive/html/qemu-devel/2017-08/msg04685.html
This is fixed upstream in qemu-2.10.0
(In reply to Matthias Maier from comment #1) > This is fixed upstream in qemu-2.10.0 Has it been backported to 2.9.x?
(In reply to Aaron Bauman from comment #2) > Has it been backported to 2.9.x? Fixes: CVE-2017-13673 +Fixes: fec5e8c92becad223df9d972770522f64aafdb72 +Cc: P J P <ppandit@redhat.com> +Reported-by: David Buchanan <d@vidbuchanan.co.uk> +Signed-off-by: Gerd Hoffmann <kraxel@redhat.com> +Message-id: 20170828123307.15392-1-kraxel@redhat.com + +Upstream-Status: Backport +[https://git.qemu.org/?p=qemu.git;a=commit;h=e65294157d4b69393b3f819c99f4f647452b48e3] + +CVE: CVE-2017-13673 + +Signed-off-by: Yi Zhao <yi.zhao@windriver.com> "Impact: DoS for privileged guest users. " ------------------------------------------- It appears this was indeed backported to 2.9.x