Unrated severityNVD Advisory· Published Jul 2, 2018· Updated Aug 5, 2024
CVE-2017-2615
CVE-2017-2615
Description
Quick emulator (QEMU) built with the Cirrus CLGD 54xx VGA emulator support is vulnerable to an out-of-bounds access issue. It could occur while copying VGA data via bitblt copy in backward mode. A privileged user inside a guest could use this flaw to crash the QEMU process resulting in DoS or potentially execute arbitrary code on the host with privileges of QEMU process on the host.
Affected products
35- osv-coords34 versionspkg:rpm/opensuse/qemu&distro=openSUSE%20Tumbleweedpkg:rpm/opensuse/xen&distro=openSUSE%20Tumbleweedpkg:rpm/suse/kvm&distro=SUSE%20Linux%20Enterprise%20Point%20of%20Sale%2011%20SP3pkg:rpm/suse/kvm&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-LTSSpkg:rpm/suse/kvm&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-TERADATApkg:rpm/suse/kvm&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kvm&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP1pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP2pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Server%20for%20Raspberry%20Pi%2012%20SP2pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP1pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP2pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Point%20of%20Sale%2011%20SP3pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-LTSSpkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2011%20SP4pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP1pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP2pkg:rpm/suse/xen&distro=SUSE%20Manager%202.1pkg:rpm/suse/xen&distro=SUSE%20Manager%20Proxy%202.1pkg:rpm/suse/xen&distro=SUSE%20OpenStack%20Cloud%205
< 6.1.0-32.1+ 33 more
- (no CPE)range: < 6.1.0-32.1
- (no CPE)range: < 4.15.1_01-1.2
- (no CPE)range: < 1.4.2-53.11.1
- (no CPE)range: < 1.4.2-53.11.1
- (no CPE)range: < 1.4.2-53.11.1
- (no CPE)range: < 1.4.2-59.1
- (no CPE)range: < 1.4.2-59.1
- (no CPE)range: < 2.3.1-32.11
- (no CPE)range: < 2.6.2-41.9.1
- (no CPE)range: < 2.3.1-32.11
- (no CPE)range: < 2.6.2-41.9.1
- (no CPE)range: < 2.0.2-48.31.1
- (no CPE)range: < 2.6.2-41.9.1
- (no CPE)range: < 2.0.2-48.31.1
- (no CPE)range: < 2.3.1-32.11
- (no CPE)range: < 2.6.2-41.9.1
- (no CPE)range: < 4.5.5_06-22.11.2
- (no CPE)range: < 4.7.1_06-31.1
- (no CPE)range: < 4.2.5_21-35.1
- (no CPE)range: < 4.2.5_21-35.1
- (no CPE)range: < 4.4.4_14-51.1
- (no CPE)range: < 4.5.5_06-22.11.2
- (no CPE)range: < 4.7.1_06-31.1
- (no CPE)range: < 4.4.4_14-22.33.1
- (no CPE)range: < 4.4.4_14-51.1
- (no CPE)range: < 4.4.4_14-22.33.1
- (no CPE)range: < 4.5.5_06-22.11.2
- (no CPE)range: < 4.7.1_06-31.1
- (no CPE)range: < 4.4.4_14-51.1
- (no CPE)range: < 4.5.5_06-22.11.2
- (no CPE)range: < 4.7.1_06-31.1
- (no CPE)range: < 4.2.5_21-35.1
- (no CPE)range: < 4.2.5_21-35.1
- (no CPE)range: < 4.2.5_21-35.1
- qemu/displayv5Range: n/a
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
21- rhn.redhat.com/errata/RHSA-2017-0309.htmlmitrevendor-advisoryx_refsource_REDHAT
- rhn.redhat.com/errata/RHSA-2017-0328.htmlmitrevendor-advisoryx_refsource_REDHAT
- rhn.redhat.com/errata/RHSA-2017-0329.htmlmitrevendor-advisoryx_refsource_REDHAT
- rhn.redhat.com/errata/RHSA-2017-0330.htmlmitrevendor-advisoryx_refsource_REDHAT
- rhn.redhat.com/errata/RHSA-2017-0331.htmlmitrevendor-advisoryx_refsource_REDHAT
- rhn.redhat.com/errata/RHSA-2017-0332.htmlmitrevendor-advisoryx_refsource_REDHAT
- rhn.redhat.com/errata/RHSA-2017-0333.htmlmitrevendor-advisoryx_refsource_REDHAT
- rhn.redhat.com/errata/RHSA-2017-0334.htmlmitrevendor-advisoryx_refsource_REDHAT
- rhn.redhat.com/errata/RHSA-2017-0344.htmlmitrevendor-advisoryx_refsource_REDHAT
- rhn.redhat.com/errata/RHSA-2017-0350.htmlmitrevendor-advisoryx_refsource_REDHAT
- rhn.redhat.com/errata/RHSA-2017-0396.htmlmitrevendor-advisoryx_refsource_REDHAT
- rhn.redhat.com/errata/RHSA-2017-0454.htmlmitrevendor-advisoryx_refsource_REDHAT
- security.gentoo.org/glsa/201702-27mitrevendor-advisoryx_refsource_GENTOO
- security.gentoo.org/glsa/201702-28mitrevendor-advisoryx_refsource_GENTOO
- www.openwall.com/lists/oss-security/2017/02/01/6mitremailing-listx_refsource_MLIST
- www.securityfocus.com/bid/95990mitrevdb-entryx_refsource_BID
- www.securitytracker.com/id/1037804mitrevdb-entryx_refsource_SECTRACK
- bugzilla.redhat.com/show_bug.cgimitrex_refsource_CONFIRM
- lists.debian.org/debian-lts-announce/2018/09/msg00007.htmlmitremailing-listx_refsource_MLIST
- lists.gnu.org/archive/html/qemu-devel/2017-02/msg00015.htmlmitremailing-listx_refsource_MLIST
- support.citrix.com/article/CTX220771mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.