9.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
9 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:S/C:C/I:C/A:C
0.002 Low
EPSS
Percentile
50.8%
CentOS Errata and Security Advisory CESA-2017:0309
Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM.
Security Fix(es):
Quick emulator (Qemu) built with the Cirrus CLGD 54xx VGA emulator support is vulnerable to an out-of-bounds access issue. It could occur while copying VGA data via bitblt copy in backward mode. A privileged user inside a guest could use this flaw to crash the Qemu process resulting in DoS or potentially execute arbitrary code on the host with privileges of Qemu process on the host. (CVE-2017-2615)
An out-of-bounds read-access flaw was found in the QEMU emulator built with IP checksum routines. The flaw could occur when computing a TCP/UDP packet’s checksum, because a QEMU function used the packet’s payload length without checking against the data buffer’s size. A user inside a guest could use this flaw to crash the QEMU process (denial of service). (CVE-2016-2857)
Red Hat would like to thank Wjjzhang (Tencent.com Inc.) Li Qiang (360.cn Inc.) for reporting CVE-2017-2615 and Ling Liu (Qihoo 360 Inc.) for reporting CVE-2016-2857.
This update also fixes the following bug:
All qemu-kvm users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.
Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2017-February/084449.html
Affected packages:
qemu-guest-agent
qemu-img
qemu-kvm
qemu-kvm-tools
Upstream details at:
https://access.redhat.com/errata/RHSA-2017:0309
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
CentOS | 6 | i686 | qemu-guest-agent | < 0.12.1.2-2.491.el6_8.6 | qemu-guest-agent-0.12.1.2-2.491.el6_8.6.i686.rpm |
CentOS | 6 | x86_64 | qemu-guest-agent | < 0.12.1.2-2.491.el6_8.6 | qemu-guest-agent-0.12.1.2-2.491.el6_8.6.x86_64.rpm |
CentOS | 6 | x86_64 | qemu-img | < 0.12.1.2-2.491.el6_8.6 | qemu-img-0.12.1.2-2.491.el6_8.6.x86_64.rpm |
CentOS | 6 | x86_64 | qemu-kvm | < 0.12.1.2-2.491.el6_8.6 | qemu-kvm-0.12.1.2-2.491.el6_8.6.x86_64.rpm |
CentOS | 6 | x86_64 | qemu-kvm-tools | < 0.12.1.2-2.491.el6_8.6 | qemu-kvm-tools-0.12.1.2-2.491.el6_8.6.x86_64.rpm |
9.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
9 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:S/C:C/I:C/A:C
0.002 Low
EPSS
Percentile
50.8%