CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:S/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
EPSS
Percentile
51.0%
CentOS Errata and Security Advisory CESA-2017:0454
KVM (for Kernel-based Virtual Machine) is a full virtualization solution for
Linux on x86 hardware. Using KVM, one can run multiple virtual machines running
unmodified Linux or Windows images. Each virtual machine has private virtualized
hardware: a network card, disk, graphics adapter, etc.
Security Fix(es):
Quick emulator (QEMU) built with the Cirrus CLGD 54xx VGA emulator support is
vulnerable to an out-of-bounds access issue. It could occur while copying VGA
data via bitblt copy in backward mode. A privileged user inside a guest could
use this flaw to crash the QEMU process resulting in DoS or potentially execute
arbitrary code on the host with privileges of QEMU process on the host.
(CVE-2017-2615)
Quick emulator (QEMU) built with the Cirrus CLGD 54xx VGA Emulator support is
vulnerable to an out-of-bounds access issue. The issue could occur while copying
VGA data in cirrus_bitblt_cputovideo. A privileged user inside guest could use
this flaw to crash the QEMU process OR potentially execute arbitrary code on
host with privileges of the QEMU process. (CVE-2017-2620)
Red Hat would like to thank Wjjzhang (Tencent.com Inc.) and Li Qiang (360.cn
Inc.) for reporting CVE-2017-2615.
Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2017-March/084487.html
Affected packages:
kmod-kvm
kmod-kvm-debug
kvm
kvm-qemu-img
kvm-tools
Upstream details at:
https://access.redhat.com/errata/RHSA-2017:0454
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
CentOS | 5 | x86_64 | kmod-kvm | < 83-277.el5.centos | kmod-kvm-83-277.el5.centos.x86_64.rpm |
CentOS | 5 | x86_64 | kmod-kvm-debug | < 83-277.el5.centos | kmod-kvm-debug-83-277.el5.centos.x86_64.rpm |
CentOS | 5 | x86_64 | kvm | < 83-277.el5.centos | kvm-83-277.el5.centos.x86_64.rpm |
CentOS | 5 | x86_64 | kvm-qemu-img | < 83-277.el5.centos | kvm-qemu-img-83-277.el5.centos.x86_64.rpm |
CentOS | 5 | x86_64 | kvm-tools | < 83-277.el5.centos | kvm-tools-83-277.el5.centos.x86_64.rpm |
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:S/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
EPSS
Percentile
51.0%