Quick Emulator(Qemu) built with the Virtio crypto device emulation support is vulnerable to an integer overflow issue. It could occur while handling data encryption/decryption requests in 'virtio_crypto_handle_sym_req'. A privileged user inside guest could use this flaw to crash the Qemu process resulting in DoS or potentially execute arbitrary code on the host with privileges of the Qemu process. Upstream patch: --------------- -> https://lists.nongnu.org/archive/html/qemu-devel/2017-01/msg01368.html Reference: ---------- -> http://www.openwall.com/lists/oss-security/2017/02/07/8
Acknowledgments: Name: Li Qiang (360.cn Inc.)