Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.882678
Category:CentOS Local Security Checks
Title:CentOS Update for kmod-kvm CESA-2017:0454 centos5
Summary:Check the version of kmod-kvm
Description:Summary:
Check the version of kmod-kvm

Vulnerability Insight:
KVM (for Kernel-based Virtual Machine) is
a full virtualization solution for Linux on x86 hardware. Using KVM, one can
run multiple virtual machines running unmodified Linux or Windows images.
Each virtual machine has private virtualized hardware: a network card, disk,
graphics adapter, etc.

Security Fix(es):

* Quick emulator (QEMU) built with the Cirrus CLGD 54xx VGA emulator
support is vulnerable to an out-of-bounds access issue. It could occur
while copying VGA data via bitblt copy in backward mode. A privileged user
inside a guest could use this flaw to crash the QEMU process resulting in
DoS or potentially execute arbitrary code on the host with privileges of
QEMU process on the host. (CVE-2017-2615)

* Quick emulator (QEMU) built with the Cirrus CLGD 54xx VGA Emulator
support is vulnerable to an out-of-bounds access issue. The issue could
occur while copying VGA data in cirrus_bitblt_cputovideo. A privileged user
inside guest could use this flaw to crash the QEMU process OR potentially
execute arbitrary code on host with privileges of the QEMU process.
(CVE-2017-2620)

Red Hat would like to thank Wjjzhang (Tencent.com Inc.) and Li Qiang
(360.cn Inc.) for reporting CVE-2017-2615.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to the linked article.

Affected Software/OS:
kmod-kvm on CentOS 5

Solution:
Please Install the Updated Packages.

CVSS Score:
9.0

CVSS Vector:
AV:N/AC:L/Au:S/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2017-2615
1037804
http://www.securitytracker.com/id/1037804
95990
http://www.securityfocus.com/bid/95990
GLSA-201702-27
https://security.gentoo.org/glsa/201702-27
GLSA-201702-28
https://security.gentoo.org/glsa/201702-28
RHSA-2017:0309
http://rhn.redhat.com/errata/RHSA-2017-0309.html
RHSA-2017:0328
http://rhn.redhat.com/errata/RHSA-2017-0328.html
RHSA-2017:0329
http://rhn.redhat.com/errata/RHSA-2017-0329.html
RHSA-2017:0330
http://rhn.redhat.com/errata/RHSA-2017-0330.html
RHSA-2017:0331
http://rhn.redhat.com/errata/RHSA-2017-0331.html
RHSA-2017:0332
http://rhn.redhat.com/errata/RHSA-2017-0332.html
RHSA-2017:0333
http://rhn.redhat.com/errata/RHSA-2017-0333.html
RHSA-2017:0334
http://rhn.redhat.com/errata/RHSA-2017-0334.html
RHSA-2017:0344
http://rhn.redhat.com/errata/RHSA-2017-0344.html
RHSA-2017:0350
http://rhn.redhat.com/errata/RHSA-2017-0350.html
RHSA-2017:0396
http://rhn.redhat.com/errata/RHSA-2017-0396.html
RHSA-2017:0454
http://rhn.redhat.com/errata/RHSA-2017-0454.html
[debian-lts-announce] 20180906 [SECURITY] [DLA 1497-1] qemu security update
https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
[oss-security] 20170201 CVE-2017-2615 Qemu: display: cirrus: oob access while doing bitblt copy backward mode
http://www.openwall.com/lists/oss-security/2017/02/01/6
[qemu-devel] 20170201 [PATCH v3] cirrus: fix oob access issue (CVE-2017-2615)
https://lists.gnu.org/archive/html/qemu-devel/2017-02/msg00015.html
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2615
https://support.citrix.com/article/CTX220771
Common Vulnerability Exposure (CVE) ID: CVE-2017-2620
BugTraq ID: 96378
http://www.securityfocus.com/bid/96378
https://security.gentoo.org/glsa/201703-07
https://security.gentoo.org/glsa/201704-01
https://lists.debian.org/debian-lts-announce/2018/02/msg00005.html
http://www.openwall.com/lists/oss-security/2017/02/21/1
https://lists.gnu.org/archive/html/qemu-devel/2017-02/msg04700.html
RedHat Security Advisories: RHSA-2017:0328
RedHat Security Advisories: RHSA-2017:0329
RedHat Security Advisories: RHSA-2017:0330
RedHat Security Advisories: RHSA-2017:0331
RedHat Security Advisories: RHSA-2017:0332
RedHat Security Advisories: RHSA-2017:0333
RedHat Security Advisories: RHSA-2017:0334
RedHat Security Advisories: RHSA-2017:0350
RedHat Security Advisories: RHSA-2017:0351
http://rhn.redhat.com/errata/RHSA-2017-0351.html
RedHat Security Advisories: RHSA-2017:0352
http://rhn.redhat.com/errata/RHSA-2017-0352.html
RedHat Security Advisories: RHSA-2017:0396
RedHat Security Advisories: RHSA-2017:0454
http://www.securitytracker.com/id/1037870
CopyrightCopyright (C) 2017 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.