Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1501290 - (CVE-2017-15289) CVE-2017-15289 Qemu: cirrus: OOB access issue in mode4and5 write functions
CVE-2017-15289 Qemu: cirrus: OOB access issue in mode4and5 write functions
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20171011,repor...
: Security
Depends On: 1501294 1501295 1501296 1501297 1501298 1501299 1501300 1501301 1501302 1501303 1501304 1501305 1502431 1506497 1506498
Blocks: 1491978 1520687
  Show dependency treegraph
 
Reported: 2017-10-12 06:52 EDT by Prasad J Pandit
Modified: 2018-07-18 11:34 EDT (History)
28 users (show)

See Also:
Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Quick emulator (QEMU), compiled with the Cirrus CLGD 54xx VGA Emulator support, is vulnerable to an OOB write access issue. The issue could occur while writing to VGA memory via mode4and5 write functions. A privileged user inside guest could use this flaw to crash the QEMU process resulting in Denial of Serivce (DoS).
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2017:3368 normal SHIPPED_LIVE Moderate: qemu-kvm security update 2017-11-30 20:50:55 EST
Red Hat Product Errata RHSA-2017:3369 normal SHIPPED_LIVE Moderate: qemu-kvm-rhev security and bug fix update 2017-11-30 20:33:08 EST
Red Hat Product Errata RHSA-2017:3466 normal SHIPPED_LIVE Moderate: qemu-kvm-rhev security and bug fix update 2017-12-14 22:11:38 EST
Red Hat Product Errata RHSA-2017:3470 normal SHIPPED_LIVE Moderate: qemu-kvm-rhev security and bug fix update 2017-12-14 22:10:57 EST
Red Hat Product Errata RHSA-2017:3471 normal SHIPPED_LIVE Moderate: qemu-kvm-rhev security and bug fix update 2017-12-14 22:10:12 EST
Red Hat Product Errata RHSA-2017:3472 normal SHIPPED_LIVE Moderate: qemu-kvm-rhev security update 2017-12-14 22:13:26 EST
Red Hat Product Errata RHSA-2017:3473 normal SHIPPED_LIVE Moderate: qemu-kvm-rhev security update 2017-12-14 22:15:13 EST
Red Hat Product Errata RHSA-2017:3474 normal SHIPPED_LIVE Moderate: qemu-kvm-rhev security and bug fix update 2017-12-14 22:12:34 EST
Red Hat Product Errata RHSA-2018:0516 normal SHIPPED_LIVE Moderate: qemu-kvm security update 2018-03-13 18:37:11 EDT

  None (edit)
Description Prasad J Pandit 2017-10-12 06:52:15 EDT
Quick emulator(Qemu) built with the Cirrus CLGD 54xx VGA Emulator support is
vulnerable to an out-of-bounds write access issues. It could occur while writing
to VGA memory via mode4and5 write functions.

A privileged user inside guest could use this flaw to crash the Qemu process
resulting in DoS.

Upstream patch:
---------------
  -> https://lists.gnu.org/archive/html/qemu-devel/2017-10/msg02557.html

Reference:
----------
  -> http://www.openwall.com/lists/oss-security/2017/10/12/16
Comment 1 Prasad J Pandit 2017-10-12 06:52:18 EDT
Acknowledgments:

Name: Guoxiang Niu (Huawei.com)
Comment 5 errata-xmlrpc 2017-11-30 15:34:14 EST
This issue has been addressed in the following products:

  RHEV 4.X RHEV-H and Agents for RHEL-7

Via RHSA-2017:3369 https://access.redhat.com/errata/RHSA-2017:3369
Comment 6 errata-xmlrpc 2017-11-30 15:51:43 EST
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2017:3368 https://access.redhat.com/errata/RHSA-2017:3368
Comment 8 errata-xmlrpc 2017-12-14 17:16:24 EST
This issue has been addressed in the following products:

  Red Hat OpenStack Platform 8.0 (Liberty)

Via RHSA-2017:3471 https://access.redhat.com/errata/RHSA-2017:3471
Comment 9 errata-xmlrpc 2017-12-14 17:18:43 EST
This issue has been addressed in the following products:

  Red Hat OpenStack Platform 9.0 (Mitaka)

Via RHSA-2017:3470 https://access.redhat.com/errata/RHSA-2017:3470
Comment 10 errata-xmlrpc 2017-12-14 17:20:38 EST
This issue has been addressed in the following products:

  Red Hat OpenStack Platform 11.0 (Ocata)

Via RHSA-2017:3466 https://access.redhat.com/errata/RHSA-2017:3466
Comment 11 errata-xmlrpc 2017-12-14 17:22:49 EST
This issue has been addressed in the following products:

  Red Hat OpenStack Platform 10.0 (Newton)

Via RHSA-2017:3474 https://access.redhat.com/errata/RHSA-2017:3474
Comment 12 errata-xmlrpc 2017-12-14 17:24:24 EST
This issue has been addressed in the following products:

  Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7

Via RHSA-2017:3472 https://access.redhat.com/errata/RHSA-2017:3472
Comment 13 errata-xmlrpc 2017-12-14 17:26:21 EST
This issue has been addressed in the following products:

  Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7

Via RHSA-2017:3473 https://access.redhat.com/errata/RHSA-2017:3473
Comment 14 errata-xmlrpc 2018-03-13 14:26:35 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6

Via RHSA-2018:0516 https://access.redhat.com/errata/RHSA-2018:0516

Note You need to log in before you can comment on or make changes to this bug.