Bugzilla will be upgraded to version 5.0 on December 2, 2018. The outage period for the upgrade will start at 0:00 UTC and have a duration of 12 hours
Bug 1383285 - (CVE-2016-8577) CVE-2016-8577 Qemu: 9pfs: host memory leakage in v9fs_read
CVE-2016-8577 Qemu: 9pfs: host memory leakage in v9fs_read
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
: Security
Depends On: 1383286 1383287
Blocks: 1382469
  Show dependency treegraph
Reported: 2016-10-10 07:09 EDT by Prasad J Pandit
Modified: 2018-07-18 11:02 EDT (History)
37 users (show)

See Also:
Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

  None (edit)
Description Prasad J Pandit 2016-10-10 07:09:58 EDT
Quick Emulator(Qemu) built with the virtio-9p back-end support is vulnerable
to a memory leakage issue. It could occur while doing a I/O read operation in
v9fs_read() routine.

A privileged user/process inside guest could use this flaw to leak host memory
resulting in Dos.

Upstream patch:
  -> https://lists.gnu.org/archive/html/qemu-devel/2016-09/msg07127.html
Comment 1 Prasad J Pandit 2016-10-10 07:10:35 EDT

Name: Li Qiang (360.cn Inc.)
Comment 2 Prasad J Pandit 2016-10-10 07:12:37 EDT
Created xen tracking bugs for this issue:

Affects: fedora-all [bug 1383287]
Comment 3 Prasad J Pandit 2016-10-10 07:12:59 EDT
Created qemu tracking bugs for this issue:

Affects: fedora-all [bug 1383286]
Comment 4 Cole Robinson 2017-01-16 13:28:36 EST
commit e95c9a493a5a8d6f969e86c9f19f80ffe6587e19
Author: Li Qiang <liqiang6-s@360.cn>
Date:   Mon Oct 17 14:13:58 2016 +0200

    9pfs: fix potential host memory leak in v9fs_read

Note You need to log in before you can comment on or make changes to this bug.