Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.871766
Categoría:Red Hat Local Security Checks
Título:RedHat Update for qemu-kvm RHSA-2017:0352-01
Resumen:The remote host is missing an update for the 'qemu-kvm'; package(s) announced via the referenced advisory.
Descripción:Summary:
The remote host is missing an update for the 'qemu-kvm'
package(s) announced via the referenced advisory.

Vulnerability Insight:
Kernel-based Virtual Machine (KVM) is a full
virtualization solution for Linux on a variety of architectures. The qemu-kvm
packages provide the user-space component for running virtual machines that use KVM.

Security Fix(es):

* Quick emulator (QEMU) built with the Cirrus CLGD 54xx VGA Emulator
support is vulnerable to an out-of-bounds access issue. The issue could
occur while copying VGA data in cirrus_bitblt_cputovideo. A privileged user
inside guest could use this flaw to crash the QEMU process OR potentially
execute arbitrary code on host with privileges of the QEMU process.
(CVE-2017-2620)

Affected Software/OS:
qemu-kvm on
Red Hat Enterprise Linux Desktop (v. 6),
Red Hat Enterprise Linux Server (v. 6),
Red Hat Enterprise Linux Workstation (v. 6)

Solution:
Please Install the Updated Packages.

CVSS Score:
9.0

CVSS Vector:
AV:N/AC:L/Au:S/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2017-2620
BugTraq ID: 96378
http://www.securityfocus.com/bid/96378
https://security.gentoo.org/glsa/201703-07
https://security.gentoo.org/glsa/201704-01
https://lists.debian.org/debian-lts-announce/2018/02/msg00005.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
http://www.openwall.com/lists/oss-security/2017/02/21/1
https://lists.gnu.org/archive/html/qemu-devel/2017-02/msg04700.html
RedHat Security Advisories: RHSA-2017:0328
http://rhn.redhat.com/errata/RHSA-2017-0328.html
RedHat Security Advisories: RHSA-2017:0329
http://rhn.redhat.com/errata/RHSA-2017-0329.html
RedHat Security Advisories: RHSA-2017:0330
http://rhn.redhat.com/errata/RHSA-2017-0330.html
RedHat Security Advisories: RHSA-2017:0331
http://rhn.redhat.com/errata/RHSA-2017-0331.html
RedHat Security Advisories: RHSA-2017:0332
http://rhn.redhat.com/errata/RHSA-2017-0332.html
RedHat Security Advisories: RHSA-2017:0333
http://rhn.redhat.com/errata/RHSA-2017-0333.html
RedHat Security Advisories: RHSA-2017:0334
http://rhn.redhat.com/errata/RHSA-2017-0334.html
RedHat Security Advisories: RHSA-2017:0350
http://rhn.redhat.com/errata/RHSA-2017-0350.html
RedHat Security Advisories: RHSA-2017:0351
http://rhn.redhat.com/errata/RHSA-2017-0351.html
RedHat Security Advisories: RHSA-2017:0352
http://rhn.redhat.com/errata/RHSA-2017-0352.html
RedHat Security Advisories: RHSA-2017:0396
http://rhn.redhat.com/errata/RHSA-2017-0396.html
RedHat Security Advisories: RHSA-2017:0454
http://rhn.redhat.com/errata/RHSA-2017-0454.html
http://www.securitytracker.com/id/1037870
CopyrightCopyright (C) 2017 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.