From ${URL} : Quick Emulator(Qemu) built with the virtio-9p back-end support is vulnerable to a memory leakage issue. It could occur while doing a I/O operation via v9fs_create/v9fs_lcreate routine. A privileged user/process inside guest could use this flaw to leak host memory resulting in Dos. Upstream patch: --------------- -> https://lists.gnu.org/archive/html/qemu-devel/2017-03/msg05449.html Reference: ---------- -> http://www.openwall.com/lists/oss-security/2017/04/03/2 @maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Fixed in: 2.8.0-r10, 2.8.1 Vulnerable version left in tree: 2.8.0-r9 Arches, please test and mark stable =app-emulation/qemu-2.8.0-r10 Target-keywords: amd64 x86 commit a583bc5ee0c01d906b5cb29e5aeb428f0a39a1f7 Author: Matthias Maier <tamiko@gentoo.org> Date: Wed Apr 12 00:01:44 2017 -0500 app-emulation/qemu: apply patch for CVE-2017-7377, bug #614744 Package-Manager: Portage-2.3.5, Repoman-2.3.2
amd64 stable
x86 stable. Maintainer(s), please cleanup. Security, please vote.
Arches and Maintainer(s), Thank you for your work. GLSA Vote: Yes New GLSA Request filed.
This issue was resolved and addressed in GLSA 201706-03 at https://security.gentoo.org/glsa/201706-03 by GLSA coordinator Yury German (BlueKnight).