CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:S/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
51.0%
Package : qemu-kvm
Version : 1.1.2+dfsg-6+deb7u20
CVE ID : CVE-2017-2615 CVE-2017-2620 CVE-2017-5898 CVE-2017-5973
Several vulnerabilities were discovered in qemu-kvm, a full
virtualization solution for Linux hosts on x86 hardware with x86 guests.
CVE-2017-2615
The Cirrus CLGD 54xx VGA Emulator in qemu-kvm is vulnerable to an
out-of-bounds access issue. It could occur while copying VGA data
via bitblt copy in backward mode.
A privileged user inside guest could use this flaw to crash the
Qemu process resulting in DoS OR potentially execute arbitrary
code on the host with privileges of qemu-kvm process on the host.
CVE-2017-2620
The Cirrus CLGD 54xx VGA Emulator in qemu-kvm is vulnerable to an
out-of-bounds access issue. It could occur while copying VGA data
in cirrus_bitblt_cputovideo.
A privileged user inside guest could use this flaw to crash the
Qemu process resulting in DoS OR potentially execute arbitrary
code on the host with privileges of qemu-kvm process on the host.
CVE-2017-5898
The CCID Card device emulator support is vulnerable to an integer
overflow flaw. It could occur while passing message via
command/responses packets to and from the host.
A privileged user inside guest could use this flaw to crash the
qemu-kvm process on the host resulting in a DoS.
This issue does not affect the qemu-kvm binaries in Debian but we
apply the patch to the sources to stay in sync with the qemu
package.
CVE-2017-5973
The USB xHCI controller emulator support in qemu-kvm is vulnerable
to an infinite loop issue. It could occur while processing control
transfer descriptors' sequence in xhci_kick_epctx.
A privileged user inside guest could use this flaw to crash the
qemu-kvm process resulting in a DoS.
This update also updates the fix CVE-2016-9921 since it was too strict
and broke certain guests.
For Debian 7 "Wheezy", these problems have been fixed in version
1.1.2+dfsg-6+deb7u20.
We recommend that you upgrade your qemu-kvm packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
Attachment:
signature.asc
Description: PGP signature
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 7 | all | qemu | < 1.1.2+dfsg-6+deb7u20 | qemu_1.1.2+dfsg-6+deb7u20_all.deb |
Debian | 8 | armel | qemu-user | < 1:2.1+dfsg-12+deb8u7 | qemu-user_1:2.1+dfsg-12+deb8u7_armel.deb |
Debian | 8 | i386 | qemu-user | < 1:2.1+dfsg-12+deb8u7 | qemu-user_1:2.1+dfsg-12+deb8u7_i386.deb |
Debian | 8 | amd64 | qemu-user | < 1:2.1+dfsg-12+deb8u7 | qemu-user_1:2.1+dfsg-12+deb8u7_amd64.deb |
Debian | 8 | amd64 | qemu-system-sparc | < 1:2.1+dfsg-12+deb8u7 | qemu-system-sparc_1:2.1+dfsg-12+deb8u7_amd64.deb |
Debian | 7 | armel | qemu-system | < 1.1.2+dfsg-6+deb7u20 | qemu-system_1.1.2+dfsg-6+deb7u20_armel.deb |
Debian | 7 | armhf | qemu-user | < 1.1.2+dfsg-6+deb7u20 | qemu-user_1.1.2+dfsg-6+deb7u20_armhf.deb |
Debian | 7 | i386 | qemu-kvm-dbg | < 1.1.2+dfsg-6+deb7u20 | qemu-kvm-dbg_1.1.2+dfsg-6+deb7u20_i386.deb |
Debian | 7 | i386 | qemu-kvm | < 1.1.2+dfsg-6+deb7u20 | qemu-kvm_1.1.2+dfsg-6+deb7u20_i386.deb |
Debian | 8 | i386 | qemu-user-static | < 1:2.1+dfsg-12+deb8u7 | qemu-user-static_1:2.1+dfsg-12+deb8u7_i386.deb |
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:S/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
51.0%