Bug 1501290 (CVE-2017-15289)

Summary: CVE-2017-15289 Qemu: cirrus: OOB access issue in mode4and5 write functions
Product: [Other] Security Response Reporter: Prasad Pandit <ppandit>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: ailan, apevec, areis, chrisw, drjones, imammedo, jen, jjoyce, jschluet, kbasil, knoel, lhh, lpeer, markmc, mburns, mkenneth, mrezanin, mst, pbonzini, rbryant, rkrcmar, sclewis, slinaber, srevivo, tdecacqu, virt-maint, vkuznets, xen-maint
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Quick emulator (QEMU), compiled with the Cirrus CLGD 54xx VGA Emulator support, is vulnerable to an OOB write access issue. The issue could occur while writing to VGA memory via mode4and5 write functions. A privileged user inside guest could use this flaw to crash the QEMU process resulting in Denial of Serivce (DoS).
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-06-08 03:29:22 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1501294, 1501295, 1501296, 1501297, 1501298, 1501299, 1501300, 1501301, 1501302, 1501303, 1501304, 1501305, 1502431, 1506497, 1506498    
Bug Blocks: 1491978, 1520687    

Description Prasad Pandit 2017-10-12 10:52:15 UTC
Quick emulator(Qemu) built with the Cirrus CLGD 54xx VGA Emulator support is
vulnerable to an out-of-bounds write access issues. It could occur while writing
to VGA memory via mode4and5 write functions.

A privileged user inside guest could use this flaw to crash the Qemu process
resulting in DoS.

Upstream patch:
---------------
  -> https://lists.gnu.org/archive/html/qemu-devel/2017-10/msg02557.html

Reference:
----------
  -> http://www.openwall.com/lists/oss-security/2017/10/12/16

Comment 1 Prasad Pandit 2017-10-12 10:52:18 UTC
Acknowledgments:

Name: Guoxiang Niu (Huawei.com)

Comment 5 errata-xmlrpc 2017-11-30 20:34:14 UTC
This issue has been addressed in the following products:

  RHEV 4.X RHEV-H and Agents for RHEL-7

Via RHSA-2017:3369 https://access.redhat.com/errata/RHSA-2017:3369

Comment 6 errata-xmlrpc 2017-11-30 20:51:43 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2017:3368 https://access.redhat.com/errata/RHSA-2017:3368

Comment 8 errata-xmlrpc 2017-12-14 22:16:24 UTC
This issue has been addressed in the following products:

  Red Hat OpenStack Platform 8.0 (Liberty)

Via RHSA-2017:3471 https://access.redhat.com/errata/RHSA-2017:3471

Comment 9 errata-xmlrpc 2017-12-14 22:18:43 UTC
This issue has been addressed in the following products:

  Red Hat OpenStack Platform 9.0 (Mitaka)

Via RHSA-2017:3470 https://access.redhat.com/errata/RHSA-2017:3470

Comment 10 errata-xmlrpc 2017-12-14 22:20:38 UTC
This issue has been addressed in the following products:

  Red Hat OpenStack Platform 11.0 (Ocata)

Via RHSA-2017:3466 https://access.redhat.com/errata/RHSA-2017:3466

Comment 11 errata-xmlrpc 2017-12-14 22:22:49 UTC
This issue has been addressed in the following products:

  Red Hat OpenStack Platform 10.0 (Newton)

Via RHSA-2017:3474 https://access.redhat.com/errata/RHSA-2017:3474

Comment 12 errata-xmlrpc 2017-12-14 22:24:24 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7

Via RHSA-2017:3472 https://access.redhat.com/errata/RHSA-2017:3472

Comment 13 errata-xmlrpc 2017-12-14 22:26:21 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7

Via RHSA-2017:3473 https://access.redhat.com/errata/RHSA-2017:3473

Comment 14 errata-xmlrpc 2018-03-13 18:26:35 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6

Via RHSA-2018:0516 https://access.redhat.com/errata/RHSA-2018:0516