Jump to content
Compatible Support Forums
Sign in to follow this  
news

[SECURITY] [DLA 939-1] qemu-kvm security update

Recommended Posts

Package : qemu-kvm

Version : 1.1.2+dfsg-6+deb7u21

CVE ID : CVE-2016-9603 CVE-2017-7718 CVE-2017-7980

 

Multiple vulnerabilities have been discovered in qemu-kvm, a full

virtualization solution on x86 hardware based on Quick

Emulator(Qemu). The Common Vulnerabilities and Exposures project

identifies the following problems:

 

CVE-2016-9603

 

qemu-kvm built with the Cirrus CLGD 54xx VGA Emulator and the VNC

display driver support is vulnerable to a heap buffer overflow

issue. It could occur when Vnc client attempts to update its

display after a vga operation is performed by a guest.

 

A privileged user/process inside guest could use this flaw to crash

the Qemu process resulting in DoS OR potentially leverage it to

execute arbitrary code on the host with privileges of the Qemu

process.

 

CVE-2017-7718

 

qemu-kvm built with the Cirrus CLGD 54xx VGA Emulator support is

vulnerable to an out-of-bounds access issue. It could occur while

copying VGA data via bitblt functions cirrus_bitblt_rop_fwd_transp_

and/or cirrus_bitblt_rop_fwd_.

 

A privileged user inside guest could use this flaw to crash the

Qemu process resulting in DoS.

 

CVE-2017-7980

 

qemu-kvm built with the Cirrus CLGD 54xx VGA Emulator support is

vulnerable to an out-of-bounds r/w access issues. It could occur

while copying VGA data via various bitblt functions.

 

A privileged user inside guest could use this flaw to crash the

Qemu process resulting in DoS OR potentially execute arbitrary code

on a host with privileges of Qemu process on the host.

 

For Debian 7 "Wheezy", these problems have been fixed in version

1.1.2+dfsg-6+deb7u21.

 

We recommend that you upgrade your qemu-kvm packages.

 

Further information about Debian LTS security advisories, how to apply

these updates to your system and frequently asked questions can be

found at: https://wiki.debian.org/LTS

 

 

Share this post


Link to post

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
Sign in to follow this  

×