Quick emulator (QEMU) before 2.8 built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to an out-of-bounds access issue. The issue could occur while copying VGA data in cirrus_bitblt_cputovideo. A privileged user inside guest could use this flaw to crash the QEMU process OR potentially execute arbitrary code on host with privileges of the QEMU process.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 03:23
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 9.0
v3 : 5.5 |
References | () http://rhn.redhat.com/errata/RHSA-2017-0328.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2017-0329.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2017-0330.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2017-0331.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2017-0332.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2017-0333.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2017-0334.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2017-0350.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2017-0351.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2017-0352.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2017-0396.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2017-0454.html - Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2017/02/21/1 - Mailing List, Third Party Advisory | |
References | () http://www.securityfocus.com/bid/96378 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1037870 - Third Party Advisory, VDB Entry | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2620 - Issue Tracking, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2018/02/msg00005.html - Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html - | |
References | () https://lists.gnu.org/archive/html/qemu-devel/2017-02/msg04700.html - Patch, Third Party Advisory | |
References | () https://security.gentoo.org/glsa/201703-07 - Third Party Advisory | |
References | () https://security.gentoo.org/glsa/201704-01 - Third Party Advisory | |
References | () https://support.citrix.com/article/CTX220771 - Third Party Advisory | |
References | () https://xenbits.xen.org/xsa/advisory-209.html - Third Party Advisory |
Information
Published : 2018-07-27 19:29
Updated : 2024-11-21 03:23
NVD link : CVE-2017-2620
Mitre link : CVE-2017-2620
CVE.ORG link : CVE-2017-2620
JSON object : View
Products Affected
redhat
- enterprise_linux_server_aus
- enterprise_linux_workstation
- enterprise_linux_server_eus
- enterprise_linux_desktop
- openstack
- enterprise_linux_server
xen
- xen
debian
- debian_linux
citrix
- xenserver
qemu
- qemu