Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.871769
Category:Red Hat Local Security Checks
Title:RedHat Update for qemu-kvm RHSA-2017:0396-01
Summary:The remote host is missing an update for the 'qemu-kvm'; package(s) announced via the referenced advisory.
Description:Summary:
The remote host is missing an update for the 'qemu-kvm'
package(s) announced via the referenced advisory.

Vulnerability Insight:
Kernel-based Virtual Machine (KVM) is a
full virtualization solution for Linux on a variety of architectures. The qemu-kvm
packages provide the user-space component for running virtual machines that use KVM.

Security Fix(es):

* Quick emulator (QEMU) built with the Cirrus CLGD 54xx VGA emulator
support is vulnerable to an out-of-bounds access issue. It could occur
while copying VGA data via bitblt copy in backward mode. A privileged user
inside a guest could use this flaw to crash the QEMU process resulting in
DoS or potentially execute arbitrary code on the host with privileges of
QEMU process on the host. (CVE-2017-2615)

* Quick emulator (QEMU) built with the Cirrus CLGD 54xx VGA Emulator
support is vulnerable to an out-of-bounds access issue. The issue could
occur while copying VGA data in cirrus_bitblt_cputovideo. A privileged user
inside guest could use this flaw to crash the QEMU process OR potentially
execute arbitrary code on host with privileges of the QEMU process.
(CVE-2017-2620)

Red Hat would like to thank Wjjzhang (Tencent.com Inc.) and Li Qiang
(360.cn Inc.) for reporting CVE-2017-2615.

Bug Fix(es):

* When using the virtio-blk driver on a guest virtual machine with no space
on the virtual hard drive, the guest terminated unexpectedly with a 'block
I/O error in device' message and the qemu-kvm process exited with a
segmentation fault. This update fixes how the system_reset QEMU signal is
handled in the above scenario. As a result, if a guest crashes due to no
space left on the device, qemu-kvm continues running and the guest can be
reset as expected. (BZ#1420049)

Affected Software/OS:
qemu-kvm on
Red Hat Enterprise Linux Server (v. 7)

Solution:
Please Install the Updated Packages.

CVSS Score:
9.0

CVSS Vector:
AV:N/AC:L/Au:S/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2017-2615
1037804
http://www.securitytracker.com/id/1037804
95990
http://www.securityfocus.com/bid/95990
GLSA-201702-27
https://security.gentoo.org/glsa/201702-27
GLSA-201702-28
https://security.gentoo.org/glsa/201702-28
RHSA-2017:0309
http://rhn.redhat.com/errata/RHSA-2017-0309.html
RHSA-2017:0328
http://rhn.redhat.com/errata/RHSA-2017-0328.html
RHSA-2017:0329
http://rhn.redhat.com/errata/RHSA-2017-0329.html
RHSA-2017:0330
http://rhn.redhat.com/errata/RHSA-2017-0330.html
RHSA-2017:0331
http://rhn.redhat.com/errata/RHSA-2017-0331.html
RHSA-2017:0332
http://rhn.redhat.com/errata/RHSA-2017-0332.html
RHSA-2017:0333
http://rhn.redhat.com/errata/RHSA-2017-0333.html
RHSA-2017:0334
http://rhn.redhat.com/errata/RHSA-2017-0334.html
RHSA-2017:0344
http://rhn.redhat.com/errata/RHSA-2017-0344.html
RHSA-2017:0350
http://rhn.redhat.com/errata/RHSA-2017-0350.html
RHSA-2017:0396
http://rhn.redhat.com/errata/RHSA-2017-0396.html
RHSA-2017:0454
http://rhn.redhat.com/errata/RHSA-2017-0454.html
[debian-lts-announce] 20180906 [SECURITY] [DLA 1497-1] qemu security update
https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
[oss-security] 20170201 CVE-2017-2615 Qemu: display: cirrus: oob access while doing bitblt copy backward mode
http://www.openwall.com/lists/oss-security/2017/02/01/6
[qemu-devel] 20170201 [PATCH v3] cirrus: fix oob access issue (CVE-2017-2615)
https://lists.gnu.org/archive/html/qemu-devel/2017-02/msg00015.html
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2615
https://support.citrix.com/article/CTX220771
Common Vulnerability Exposure (CVE) ID: CVE-2017-2620
BugTraq ID: 96378
http://www.securityfocus.com/bid/96378
https://security.gentoo.org/glsa/201703-07
https://security.gentoo.org/glsa/201704-01
https://lists.debian.org/debian-lts-announce/2018/02/msg00005.html
http://www.openwall.com/lists/oss-security/2017/02/21/1
https://lists.gnu.org/archive/html/qemu-devel/2017-02/msg04700.html
RedHat Security Advisories: RHSA-2017:0328
RedHat Security Advisories: RHSA-2017:0329
RedHat Security Advisories: RHSA-2017:0330
RedHat Security Advisories: RHSA-2017:0331
RedHat Security Advisories: RHSA-2017:0332
RedHat Security Advisories: RHSA-2017:0333
RedHat Security Advisories: RHSA-2017:0334
RedHat Security Advisories: RHSA-2017:0350
RedHat Security Advisories: RHSA-2017:0351
http://rhn.redhat.com/errata/RHSA-2017-0351.html
RedHat Security Advisories: RHSA-2017:0352
http://rhn.redhat.com/errata/RHSA-2017-0352.html
RedHat Security Advisories: RHSA-2017:0396
RedHat Security Advisories: RHSA-2017:0454
http://www.securitytracker.com/id/1037870
CopyrightCopyright (C) 2017 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.