Bug 1501290 (CVE-2017-15289)
Summary: | CVE-2017-15289 Qemu: cirrus: OOB access issue in mode4and5 write functions | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Prasad Pandit <ppandit> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | ailan, apevec, areis, chrisw, drjones, imammedo, jen, jjoyce, jschluet, kbasil, knoel, lhh, lpeer, markmc, mburns, mkenneth, mrezanin, mst, pbonzini, rbryant, rkrcmar, sclewis, slinaber, srevivo, tdecacqu, virt-maint, vkuznets, xen-maint |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
Quick emulator (QEMU), compiled with the Cirrus CLGD 54xx VGA Emulator support, is vulnerable to an OOB write access issue. The issue could occur while writing to VGA memory via mode4and5 write functions. A privileged user inside guest could use this flaw to crash the QEMU process resulting in Denial of Serivce (DoS).
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2019-06-08 03:29:22 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1501294, 1501295, 1501296, 1501297, 1501298, 1501299, 1501300, 1501301, 1501302, 1501303, 1501304, 1501305, 1502431, 1506497, 1506498 | ||
Bug Blocks: | 1491978, 1520687 |
Description
Prasad Pandit
2017-10-12 10:52:15 UTC
Acknowledgments: Name: Guoxiang Niu (Huawei.com) This issue has been addressed in the following products: RHEV 4.X RHEV-H and Agents for RHEL-7 Via RHSA-2017:3369 https://access.redhat.com/errata/RHSA-2017:3369 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2017:3368 https://access.redhat.com/errata/RHSA-2017:3368 This issue has been addressed in the following products: Red Hat OpenStack Platform 8.0 (Liberty) Via RHSA-2017:3471 https://access.redhat.com/errata/RHSA-2017:3471 This issue has been addressed in the following products: Red Hat OpenStack Platform 9.0 (Mitaka) Via RHSA-2017:3470 https://access.redhat.com/errata/RHSA-2017:3470 This issue has been addressed in the following products: Red Hat OpenStack Platform 11.0 (Ocata) Via RHSA-2017:3466 https://access.redhat.com/errata/RHSA-2017:3466 This issue has been addressed in the following products: Red Hat OpenStack Platform 10.0 (Newton) Via RHSA-2017:3474 https://access.redhat.com/errata/RHSA-2017:3474 This issue has been addressed in the following products: Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7 Via RHSA-2017:3472 https://access.redhat.com/errata/RHSA-2017:3472 This issue has been addressed in the following products: Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7 Via RHSA-2017:3473 https://access.redhat.com/errata/RHSA-2017:3473 This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2018:0516 https://access.redhat.com/errata/RHSA-2018:0516 |