Use-after-free vulnerability in the virtio-pci implementation in Qemu 1.4.0 through 1.6.0 allows local users to cause a denial of service (daemon crash) by "hot-unplugging" a virtio device.
The MITRE CVE dictionary describes this issue as:
Find out more about CVE-2013-4377 from the MITRE CVE dictionary dictionary and NIST NVD.
Not vulnerable. This issue did not affect the version of qemu-kvm as shipped in Red Hat Enterprise Linux 5 and 6.
NOTE: The following CVSS v2 metrics and score provided are preliminary and subject to review.
Base Score | 2.3 |
---|---|
Base Metrics | AV:A/AC:M/Au:S/C:N/I:N/A:P |
Access Vector | Adjacent Network |
Access Complexity | Medium |
Authentication | Single |
Confidentiality Impact | None |
Integrity Impact | None |
Availability Impact | Partial |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Platform | Package | State |
---|---|---|
Red Hat Enterprise Linux 7 | qemu-kvm | Not affected |
Red Hat Enterprise Linux 6 | qemu-kvm | Not affected |
Red Hat Enterprise Linux 5 | qemu-kvm | Not affected |