First published: Mon Jul 02 2018(Updated: )
Quick emulator (QEMU) built with the Cirrus CLGD 54xx VGA emulator support is vulnerable to an out-of-bounds access issue. It could occur while copying VGA data via bitblt copy in backward mode. A privileged user inside a guest could use this flaw to crash the QEMU process resulting in DoS or potentially execute arbitrary code on the host with privileges of QEMU process on the host.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU | <=2.8.0 | |
XenServer | =6.0.2 | |
XenServer | =6.2.0-sp1 | |
XenServer | =6.5-sp1 | |
XenServer | =7.0 | |
XenServer | =7.1 | |
Red Hat OpenStack for IBM Power | =5.0 | |
Red Hat OpenStack for IBM Power | =6.0 | |
Red Hat OpenStack for IBM Power | =7.0 | |
Red Hat OpenStack for IBM Power | =8 | |
Red Hat OpenStack for IBM Power | =9 | |
Red Hat OpenStack for IBM Power | =10 | |
Debian Linux | =7.0 | |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Server | =7.3 | |
Red Hat Enterprise Linux Server | =7.4 | |
Red Hat Enterprise Linux Server | =7.3 | |
Red Hat Enterprise Linux Server | =7.4 | |
Red Hat Enterprise Linux Server | =7.5 | |
Red Hat Enterprise Linux Workstation | =6.0 | |
Red Hat Enterprise Linux Workstation | =7.0 | |
Xen XAPI | <=4.7.1 | |
Xen XAPI | =4.7.1-r1 | |
Xen XAPI | =4.7.1-r2 | |
Xen XAPI | =4.7.1-r3 | |
Xen XAPI | =4.7.1-r4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-2615 is a vulnerability found in the Quick emulator (QEMU) that is built with the Cirrus CLGD 54xx VGA emulator support.
The severity of CVE-2017-2615 is critical with a CVSS score of 9.1.
QEMU versions up to and including 2.8.0, Citrix XenServer versions 6.0.2, 6.2.0-sp1, 6.5-sp1, 7.0, and 7.1, Redhat Openstack versions 5.0, 6.0, 7.0, 8, 9, and 10, Debian Debian Linux version 7.0, Redhat Enterprise Linux Desktop versions 6.0 and 7.0, Redhat Enterprise Linux Server versions 6.0, 7.0, 7.3, 7.4, 7.5, and Redhat Enterprise Linux Workstation versions 6.0 and 7.0 are affected by CVE-2017-2615.
To fix CVE-2017-2615, users should update to the latest version of QEMU, Citrix XenServer, Redhat Openstack, Debian Debian Linux, Redhat Enterprise Linux Desktop, Redhat Enterprise Linux Workstation, or Redhat Enterprise Linux Server, as appropriate for their software.
More information about CVE-2017-2615 can be found in the following links: [Link 1](http://rhn.redhat.com/errata/RHSA-2017-0309.html), [Link 2](http://rhn.redhat.com/errata/RHSA-2017-0328.html), [Link 3](http://rhn.redhat.com/errata/RHSA-2017-0329.html).