First published: Fri Apr 21 2017(Updated: )
Heap-based buffer overflow in Cirrus CLGD 54xx VGA Emulator in Quick Emulator (Qemu) 2.8 and earlier allows local guest OS users to execute arbitrary code or cause a denial of service (crash) via vectors related to a VNC client updating its display after a VGA operation.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU KVM | <=2.8 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =16.10 | |
Ubuntu Linux | =17.04 | |
Debian Debian Linux | =8.0 | |
redhat openstack | =6.0 | |
redhat openstack | =7.0 | |
redhat openstack | =8 | |
redhat openstack | =9 | |
redhat openstack | =10 | |
redhat openstack | =5.0 | |
Red Hat Enterprise Linux | =7.0 | |
Red Hat Enterprise Virtualization | =3.0 | |
Red Hat Enterprise Linux | =6.0 | |
redhat enterprise Linux desktop | =6.0 | |
redhat enterprise Linux desktop | =7.0 | |
redhat enterprise Linux server | =6.0 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux server aus | =7.3 | |
redhat enterprise Linux server aus | =7.4 | |
redhat enterprise Linux server aus | =7.6 | |
redhat enterprise Linux server eus | =7.3 | |
redhat enterprise Linux server eus | =7.4 | |
redhat enterprise Linux server eus | =7.5 | |
redhat enterprise Linux server eus | =7.6 | |
redhat enterprise Linux server tus | =7.3 | |
redhat enterprise Linux server tus | =7.6 | |
redhat enterprise Linux workstation | =6.0 | |
redhat enterprise Linux workstation | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-7980 is considered critical due to its potential to allow local users to execute arbitrary code or cause a denial of service.
To fix CVE-2017-7980, update QEMU to version 2.9 or later or apply vendor-specific patches if available.
CVE-2017-7980 affects QEMU 2.8 and earlier, as well as various Ubuntu and Red Hat distributions running those versions.
CVE-2017-7980 enables a heap-based buffer overflow attack that can lead to arbitrary code execution.
CVE-2017-7980 requires local access to the guest OS, so exploitation is not possible remotely.