RHSA-2017:1431
Vulnerability from csaf_redhat - Published: 2017-06-13 07:16 - Updated: 2025-11-21 18:00Summary
Red Hat Security Advisory: qemu-kvm-rhev security and bug fix update
Severity
Important
Notes
Topic: An update for qemu-kvm-rhev is now available for RHEV 3.X Hypervisor and Agents for RHEL-7 and RHEV 4.X RHEV-H and Agents for RHEL-7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details: KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-rhev packages provide the user-space component for running virtual machines that use KVM in environments managed by Red Hat products.
Security Fix(es):
* An out-of-bounds access issue was found in QEMU's Cirrus CLGD 54xx VGA Emulator support. The vulnerability could occur while copying VGA data using bitblt functions (for example, cirrus_bitblt_rop_fwd_transp_). A privileged user inside a guest could use this flaw to crash the QEMU process, resulting in denial of service. (CVE-2017-7718)
Red Hat would like to thank Jiangxin (PSIRT Huawei Inc.) for reporting
CVE-2017-7718.
Bug Fix(es):
* When using post-copy migration with the virtio Random Number Generator (RNG) device, virtio-rng continued generating data while the migration was already in post-copy mode. Consequently, the migration sometimes failed and the error message "Failed to load virtio-rng:virtio" was displayed. The source code has been improved and the problem no longer occurs in the scenario described. (BZ#1450375)
Terms of Use: This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
An out-of-bounds access issue was found in QEMU's Cirrus CLGD 54xx VGA Emulator support. The vulnerability could occur while copying VGA data using bitblt functions (for example, cirrus_bitblt_rop_fwd_transp_). A privileged user inside a guest could use this flaw to crash the QEMU process, resulting in denial of service.
4.0 (Medium)
Vendor Fix
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.
https://access.redhat.com/errata/RHSA-2017:1431
References
Acknowledgments
PSIRT Huawei Inc.
Jiangxin
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for qemu-kvm-rhev is now available for RHEV 3.X Hypervisor and Agents for RHEL-7 and RHEV 4.X RHEV-H and Agents for RHEL-7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-rhev packages provide the user-space component for running virtual machines that use KVM in environments managed by Red Hat products.\n\nSecurity Fix(es):\n\n* An out-of-bounds access issue was found in QEMU\u0027s Cirrus CLGD 54xx VGA Emulator support. The vulnerability could occur while copying VGA data using bitblt functions (for example, cirrus_bitblt_rop_fwd_transp_). A privileged user inside a guest could use this flaw to crash the QEMU process, resulting in denial of service. (CVE-2017-7718)\n\nRed Hat would like to thank Jiangxin (PSIRT Huawei Inc.) for reporting\nCVE-2017-7718.\n\nBug Fix(es):\n\n* When using post-copy migration with the virtio Random Number Generator (RNG) device, virtio-rng continued generating data while the migration was already in post-copy mode. Consequently, the migration sometimes failed and the error message \"Failed to load virtio-rng:virtio\" was displayed. The source code has been improved and the problem no longer occurs in the scenario described. (BZ#1450375)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2017:1431",
"url": "https://access.redhat.com/errata/RHSA-2017:1431"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1443441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443441"
},
{
"category": "external",
"summary": "1450375",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1450375"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_1431.json"
}
],
"title": "Red Hat Security Advisory: qemu-kvm-rhev security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T18:00:50+00:00",
"generator": {
"date": "2025-11-21T18:00:50+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2017:1431",
"initial_release_date": "2017-06-13T07:16:36+00:00",
"revision_history": [
{
"date": "2017-06-13T07:16:36+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2017-06-13T07:16:36+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:00:50+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHEV-H and VDSM for 7 Hosts",
"product": {
"name": "RHEV-H and VDSM for 7 Hosts",
"product_id": "7Server-RHEV-Agents-7",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
}
}
},
{
"category": "product_name",
"name": "Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product": {
"name": "Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-common-rhev-10:2.6.0-28.el7_3.10.x86_64",
"product": {
"name": "qemu-kvm-common-rhev-10:2.6.0-28.el7_3.10.x86_64",
"product_id": "qemu-kvm-common-rhev-10:2.6.0-28.el7_3.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-common-rhev@2.6.0-28.el7_3.10?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-rhev-debuginfo-10:2.6.0-28.el7_3.10.x86_64",
"product": {
"name": "qemu-kvm-rhev-debuginfo-10:2.6.0-28.el7_3.10.x86_64",
"product_id": "qemu-kvm-rhev-debuginfo-10:2.6.0-28.el7_3.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-rhev-debuginfo@2.6.0-28.el7_3.10?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-rhev-10:2.6.0-28.el7_3.10.x86_64",
"product": {
"name": "qemu-kvm-rhev-10:2.6.0-28.el7_3.10.x86_64",
"product_id": "qemu-kvm-rhev-10:2.6.0-28.el7_3.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-rhev@2.6.0-28.el7_3.10?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-img-rhev-10:2.6.0-28.el7_3.10.x86_64",
"product": {
"name": "qemu-img-rhev-10:2.6.0-28.el7_3.10.x86_64",
"product_id": "qemu-img-rhev-10:2.6.0-28.el7_3.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-img-rhev@2.6.0-28.el7_3.10?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-tools-rhev-10:2.6.0-28.el7_3.10.x86_64",
"product": {
"name": "qemu-kvm-tools-rhev-10:2.6.0-28.el7_3.10.x86_64",
"product_id": "qemu-kvm-tools-rhev-10:2.6.0-28.el7_3.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-tools-rhev@2.6.0-28.el7_3.10?arch=x86_64\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-rhev-10:2.6.0-28.el7_3.10.src",
"product": {
"name": "qemu-kvm-rhev-10:2.6.0-28.el7_3.10.src",
"product_id": "qemu-kvm-rhev-10:2.6.0-28.el7_3.10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-rhev@2.6.0-28.el7_3.10?arch=src\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-common-rhev-10:2.6.0-28.el7_3.10.ppc64le",
"product": {
"name": "qemu-kvm-common-rhev-10:2.6.0-28.el7_3.10.ppc64le",
"product_id": "qemu-kvm-common-rhev-10:2.6.0-28.el7_3.10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-common-rhev@2.6.0-28.el7_3.10?arch=ppc64le\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-rhev-debuginfo-10:2.6.0-28.el7_3.10.ppc64le",
"product": {
"name": "qemu-kvm-rhev-debuginfo-10:2.6.0-28.el7_3.10.ppc64le",
"product_id": "qemu-kvm-rhev-debuginfo-10:2.6.0-28.el7_3.10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-rhev-debuginfo@2.6.0-28.el7_3.10?arch=ppc64le\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-rhev-10:2.6.0-28.el7_3.10.ppc64le",
"product": {
"name": "qemu-kvm-rhev-10:2.6.0-28.el7_3.10.ppc64le",
"product_id": "qemu-kvm-rhev-10:2.6.0-28.el7_3.10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-rhev@2.6.0-28.el7_3.10?arch=ppc64le\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-img-rhev-10:2.6.0-28.el7_3.10.ppc64le",
"product": {
"name": "qemu-img-rhev-10:2.6.0-28.el7_3.10.ppc64le",
"product_id": "qemu-img-rhev-10:2.6.0-28.el7_3.10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-img-rhev@2.6.0-28.el7_3.10?arch=ppc64le\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-tools-rhev-10:2.6.0-28.el7_3.10.ppc64le",
"product": {
"name": "qemu-kvm-tools-rhev-10:2.6.0-28.el7_3.10.ppc64le",
"product_id": "qemu-kvm-tools-rhev-10:2.6.0-28.el7_3.10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-tools-rhev@2.6.0-28.el7_3.10?arch=ppc64le\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-rhev-10:2.6.0-28.el7_3.10.ppc64le as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:qemu-img-rhev-10:2.6.0-28.el7_3.10.ppc64le"
},
"product_reference": "qemu-img-rhev-10:2.6.0-28.el7_3.10.ppc64le",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-rhev-10:2.6.0-28.el7_3.10.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:qemu-img-rhev-10:2.6.0-28.el7_3.10.x86_64"
},
"product_reference": "qemu-img-rhev-10:2.6.0-28.el7_3.10.x86_64",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-rhev-10:2.6.0-28.el7_3.10.ppc64le as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:qemu-kvm-common-rhev-10:2.6.0-28.el7_3.10.ppc64le"
},
"product_reference": "qemu-kvm-common-rhev-10:2.6.0-28.el7_3.10.ppc64le",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-rhev-10:2.6.0-28.el7_3.10.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:qemu-kvm-common-rhev-10:2.6.0-28.el7_3.10.x86_64"
},
"product_reference": "qemu-kvm-common-rhev-10:2.6.0-28.el7_3.10.x86_64",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-rhev-10:2.6.0-28.el7_3.10.ppc64le as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:qemu-kvm-rhev-10:2.6.0-28.el7_3.10.ppc64le"
},
"product_reference": "qemu-kvm-rhev-10:2.6.0-28.el7_3.10.ppc64le",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-rhev-10:2.6.0-28.el7_3.10.src as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:qemu-kvm-rhev-10:2.6.0-28.el7_3.10.src"
},
"product_reference": "qemu-kvm-rhev-10:2.6.0-28.el7_3.10.src",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-rhev-10:2.6.0-28.el7_3.10.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:qemu-kvm-rhev-10:2.6.0-28.el7_3.10.x86_64"
},
"product_reference": "qemu-kvm-rhev-10:2.6.0-28.el7_3.10.x86_64",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-rhev-debuginfo-10:2.6.0-28.el7_3.10.ppc64le as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:qemu-kvm-rhev-debuginfo-10:2.6.0-28.el7_3.10.ppc64le"
},
"product_reference": "qemu-kvm-rhev-debuginfo-10:2.6.0-28.el7_3.10.ppc64le",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-rhev-debuginfo-10:2.6.0-28.el7_3.10.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:qemu-kvm-rhev-debuginfo-10:2.6.0-28.el7_3.10.x86_64"
},
"product_reference": "qemu-kvm-rhev-debuginfo-10:2.6.0-28.el7_3.10.x86_64",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-rhev-10:2.6.0-28.el7_3.10.ppc64le as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:qemu-kvm-tools-rhev-10:2.6.0-28.el7_3.10.ppc64le"
},
"product_reference": "qemu-kvm-tools-rhev-10:2.6.0-28.el7_3.10.ppc64le",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-rhev-10:2.6.0-28.el7_3.10.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:qemu-kvm-tools-rhev-10:2.6.0-28.el7_3.10.x86_64"
},
"product_reference": "qemu-kvm-tools-rhev-10:2.6.0-28.el7_3.10.x86_64",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-rhev-10:2.6.0-28.el7_3.10.ppc64le as a component of RHEV-H and VDSM for 7 Hosts",
"product_id": "7Server-RHEV-Agents-7:qemu-img-rhev-10:2.6.0-28.el7_3.10.ppc64le"
},
"product_reference": "qemu-img-rhev-10:2.6.0-28.el7_3.10.ppc64le",
"relates_to_product_reference": "7Server-RHEV-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-rhev-10:2.6.0-28.el7_3.10.x86_64 as a component of RHEV-H and VDSM for 7 Hosts",
"product_id": "7Server-RHEV-Agents-7:qemu-img-rhev-10:2.6.0-28.el7_3.10.x86_64"
},
"product_reference": "qemu-img-rhev-10:2.6.0-28.el7_3.10.x86_64",
"relates_to_product_reference": "7Server-RHEV-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-rhev-10:2.6.0-28.el7_3.10.ppc64le as a component of RHEV-H and VDSM for 7 Hosts",
"product_id": "7Server-RHEV-Agents-7:qemu-kvm-common-rhev-10:2.6.0-28.el7_3.10.ppc64le"
},
"product_reference": "qemu-kvm-common-rhev-10:2.6.0-28.el7_3.10.ppc64le",
"relates_to_product_reference": "7Server-RHEV-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-rhev-10:2.6.0-28.el7_3.10.x86_64 as a component of RHEV-H and VDSM for 7 Hosts",
"product_id": "7Server-RHEV-Agents-7:qemu-kvm-common-rhev-10:2.6.0-28.el7_3.10.x86_64"
},
"product_reference": "qemu-kvm-common-rhev-10:2.6.0-28.el7_3.10.x86_64",
"relates_to_product_reference": "7Server-RHEV-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-rhev-10:2.6.0-28.el7_3.10.ppc64le as a component of RHEV-H and VDSM for 7 Hosts",
"product_id": "7Server-RHEV-Agents-7:qemu-kvm-rhev-10:2.6.0-28.el7_3.10.ppc64le"
},
"product_reference": "qemu-kvm-rhev-10:2.6.0-28.el7_3.10.ppc64le",
"relates_to_product_reference": "7Server-RHEV-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-rhev-10:2.6.0-28.el7_3.10.src as a component of RHEV-H and VDSM for 7 Hosts",
"product_id": "7Server-RHEV-Agents-7:qemu-kvm-rhev-10:2.6.0-28.el7_3.10.src"
},
"product_reference": "qemu-kvm-rhev-10:2.6.0-28.el7_3.10.src",
"relates_to_product_reference": "7Server-RHEV-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-rhev-10:2.6.0-28.el7_3.10.x86_64 as a component of RHEV-H and VDSM for 7 Hosts",
"product_id": "7Server-RHEV-Agents-7:qemu-kvm-rhev-10:2.6.0-28.el7_3.10.x86_64"
},
"product_reference": "qemu-kvm-rhev-10:2.6.0-28.el7_3.10.x86_64",
"relates_to_product_reference": "7Server-RHEV-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-rhev-debuginfo-10:2.6.0-28.el7_3.10.ppc64le as a component of RHEV-H and VDSM for 7 Hosts",
"product_id": "7Server-RHEV-Agents-7:qemu-kvm-rhev-debuginfo-10:2.6.0-28.el7_3.10.ppc64le"
},
"product_reference": "qemu-kvm-rhev-debuginfo-10:2.6.0-28.el7_3.10.ppc64le",
"relates_to_product_reference": "7Server-RHEV-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-rhev-debuginfo-10:2.6.0-28.el7_3.10.x86_64 as a component of RHEV-H and VDSM for 7 Hosts",
"product_id": "7Server-RHEV-Agents-7:qemu-kvm-rhev-debuginfo-10:2.6.0-28.el7_3.10.x86_64"
},
"product_reference": "qemu-kvm-rhev-debuginfo-10:2.6.0-28.el7_3.10.x86_64",
"relates_to_product_reference": "7Server-RHEV-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-rhev-10:2.6.0-28.el7_3.10.ppc64le as a component of RHEV-H and VDSM for 7 Hosts",
"product_id": "7Server-RHEV-Agents-7:qemu-kvm-tools-rhev-10:2.6.0-28.el7_3.10.ppc64le"
},
"product_reference": "qemu-kvm-tools-rhev-10:2.6.0-28.el7_3.10.ppc64le",
"relates_to_product_reference": "7Server-RHEV-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-rhev-10:2.6.0-28.el7_3.10.x86_64 as a component of RHEV-H and VDSM for 7 Hosts",
"product_id": "7Server-RHEV-Agents-7:qemu-kvm-tools-rhev-10:2.6.0-28.el7_3.10.x86_64"
},
"product_reference": "qemu-kvm-tools-rhev-10:2.6.0-28.el7_3.10.x86_64",
"relates_to_product_reference": "7Server-RHEV-Agents-7"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jiangxin"
],
"organization": "PSIRT Huawei Inc."
}
],
"cve": "CVE-2017-7718",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2017-03-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1443441"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds access issue was found in QEMU\u0027s Cirrus CLGD 54xx VGA Emulator support. The vulnerability could occur while copying VGA data using bitblt functions (for example, cirrus_bitblt_rop_fwd_transp_). A privileged user inside a guest could use this flaw to crash the QEMU process, resulting in denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Qemu: display: cirrus: OOB read access issue",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Agents-7:qemu-img-rhev-10:2.6.0-28.el7_3.10.ppc64le",
"7Server-RHEV-4-Agents-7:qemu-img-rhev-10:2.6.0-28.el7_3.10.x86_64",
"7Server-RHEV-4-Agents-7:qemu-kvm-common-rhev-10:2.6.0-28.el7_3.10.ppc64le",
"7Server-RHEV-4-Agents-7:qemu-kvm-common-rhev-10:2.6.0-28.el7_3.10.x86_64",
"7Server-RHEV-4-Agents-7:qemu-kvm-rhev-10:2.6.0-28.el7_3.10.ppc64le",
"7Server-RHEV-4-Agents-7:qemu-kvm-rhev-10:2.6.0-28.el7_3.10.src",
"7Server-RHEV-4-Agents-7:qemu-kvm-rhev-10:2.6.0-28.el7_3.10.x86_64",
"7Server-RHEV-4-Agents-7:qemu-kvm-rhev-debuginfo-10:2.6.0-28.el7_3.10.ppc64le",
"7Server-RHEV-4-Agents-7:qemu-kvm-rhev-debuginfo-10:2.6.0-28.el7_3.10.x86_64",
"7Server-RHEV-4-Agents-7:qemu-kvm-tools-rhev-10:2.6.0-28.el7_3.10.ppc64le",
"7Server-RHEV-4-Agents-7:qemu-kvm-tools-rhev-10:2.6.0-28.el7_3.10.x86_64",
"7Server-RHEV-Agents-7:qemu-img-rhev-10:2.6.0-28.el7_3.10.ppc64le",
"7Server-RHEV-Agents-7:qemu-img-rhev-10:2.6.0-28.el7_3.10.x86_64",
"7Server-RHEV-Agents-7:qemu-kvm-common-rhev-10:2.6.0-28.el7_3.10.ppc64le",
"7Server-RHEV-Agents-7:qemu-kvm-common-rhev-10:2.6.0-28.el7_3.10.x86_64",
"7Server-RHEV-Agents-7:qemu-kvm-rhev-10:2.6.0-28.el7_3.10.ppc64le",
"7Server-RHEV-Agents-7:qemu-kvm-rhev-10:2.6.0-28.el7_3.10.src",
"7Server-RHEV-Agents-7:qemu-kvm-rhev-10:2.6.0-28.el7_3.10.x86_64",
"7Server-RHEV-Agents-7:qemu-kvm-rhev-debuginfo-10:2.6.0-28.el7_3.10.ppc64le",
"7Server-RHEV-Agents-7:qemu-kvm-rhev-debuginfo-10:2.6.0-28.el7_3.10.x86_64",
"7Server-RHEV-Agents-7:qemu-kvm-tools-rhev-10:2.6.0-28.el7_3.10.ppc64le",
"7Server-RHEV-Agents-7:qemu-kvm-tools-rhev-10:2.6.0-28.el7_3.10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-7718"
},
{
"category": "external",
"summary": "RHBZ#1443441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443441"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-7718",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7718"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7718",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7718"
}
],
"release_date": "2017-03-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-06-13T07:16:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.",
"product_ids": [
"7Server-RHEV-4-Agents-7:qemu-img-rhev-10:2.6.0-28.el7_3.10.ppc64le",
"7Server-RHEV-4-Agents-7:qemu-img-rhev-10:2.6.0-28.el7_3.10.x86_64",
"7Server-RHEV-4-Agents-7:qemu-kvm-common-rhev-10:2.6.0-28.el7_3.10.ppc64le",
"7Server-RHEV-4-Agents-7:qemu-kvm-common-rhev-10:2.6.0-28.el7_3.10.x86_64",
"7Server-RHEV-4-Agents-7:qemu-kvm-rhev-10:2.6.0-28.el7_3.10.ppc64le",
"7Server-RHEV-4-Agents-7:qemu-kvm-rhev-10:2.6.0-28.el7_3.10.src",
"7Server-RHEV-4-Agents-7:qemu-kvm-rhev-10:2.6.0-28.el7_3.10.x86_64",
"7Server-RHEV-4-Agents-7:qemu-kvm-rhev-debuginfo-10:2.6.0-28.el7_3.10.ppc64le",
"7Server-RHEV-4-Agents-7:qemu-kvm-rhev-debuginfo-10:2.6.0-28.el7_3.10.x86_64",
"7Server-RHEV-4-Agents-7:qemu-kvm-tools-rhev-10:2.6.0-28.el7_3.10.ppc64le",
"7Server-RHEV-4-Agents-7:qemu-kvm-tools-rhev-10:2.6.0-28.el7_3.10.x86_64",
"7Server-RHEV-Agents-7:qemu-img-rhev-10:2.6.0-28.el7_3.10.ppc64le",
"7Server-RHEV-Agents-7:qemu-img-rhev-10:2.6.0-28.el7_3.10.x86_64",
"7Server-RHEV-Agents-7:qemu-kvm-common-rhev-10:2.6.0-28.el7_3.10.ppc64le",
"7Server-RHEV-Agents-7:qemu-kvm-common-rhev-10:2.6.0-28.el7_3.10.x86_64",
"7Server-RHEV-Agents-7:qemu-kvm-rhev-10:2.6.0-28.el7_3.10.ppc64le",
"7Server-RHEV-Agents-7:qemu-kvm-rhev-10:2.6.0-28.el7_3.10.src",
"7Server-RHEV-Agents-7:qemu-kvm-rhev-10:2.6.0-28.el7_3.10.x86_64",
"7Server-RHEV-Agents-7:qemu-kvm-rhev-debuginfo-10:2.6.0-28.el7_3.10.ppc64le",
"7Server-RHEV-Agents-7:qemu-kvm-rhev-debuginfo-10:2.6.0-28.el7_3.10.x86_64",
"7Server-RHEV-Agents-7:qemu-kvm-tools-rhev-10:2.6.0-28.el7_3.10.ppc64le",
"7Server-RHEV-Agents-7:qemu-kvm-tools-rhev-10:2.6.0-28.el7_3.10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:1431"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "ADJACENT_NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.9,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:H/Au:S/C:P/I:N/A:P",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-RHEV-4-Agents-7:qemu-img-rhev-10:2.6.0-28.el7_3.10.ppc64le",
"7Server-RHEV-4-Agents-7:qemu-img-rhev-10:2.6.0-28.el7_3.10.x86_64",
"7Server-RHEV-4-Agents-7:qemu-kvm-common-rhev-10:2.6.0-28.el7_3.10.ppc64le",
"7Server-RHEV-4-Agents-7:qemu-kvm-common-rhev-10:2.6.0-28.el7_3.10.x86_64",
"7Server-RHEV-4-Agents-7:qemu-kvm-rhev-10:2.6.0-28.el7_3.10.ppc64le",
"7Server-RHEV-4-Agents-7:qemu-kvm-rhev-10:2.6.0-28.el7_3.10.src",
"7Server-RHEV-4-Agents-7:qemu-kvm-rhev-10:2.6.0-28.el7_3.10.x86_64",
"7Server-RHEV-4-Agents-7:qemu-kvm-rhev-debuginfo-10:2.6.0-28.el7_3.10.ppc64le",
"7Server-RHEV-4-Agents-7:qemu-kvm-rhev-debuginfo-10:2.6.0-28.el7_3.10.x86_64",
"7Server-RHEV-4-Agents-7:qemu-kvm-tools-rhev-10:2.6.0-28.el7_3.10.ppc64le",
"7Server-RHEV-4-Agents-7:qemu-kvm-tools-rhev-10:2.6.0-28.el7_3.10.x86_64",
"7Server-RHEV-Agents-7:qemu-img-rhev-10:2.6.0-28.el7_3.10.ppc64le",
"7Server-RHEV-Agents-7:qemu-img-rhev-10:2.6.0-28.el7_3.10.x86_64",
"7Server-RHEV-Agents-7:qemu-kvm-common-rhev-10:2.6.0-28.el7_3.10.ppc64le",
"7Server-RHEV-Agents-7:qemu-kvm-common-rhev-10:2.6.0-28.el7_3.10.x86_64",
"7Server-RHEV-Agents-7:qemu-kvm-rhev-10:2.6.0-28.el7_3.10.ppc64le",
"7Server-RHEV-Agents-7:qemu-kvm-rhev-10:2.6.0-28.el7_3.10.src",
"7Server-RHEV-Agents-7:qemu-kvm-rhev-10:2.6.0-28.el7_3.10.x86_64",
"7Server-RHEV-Agents-7:qemu-kvm-rhev-debuginfo-10:2.6.0-28.el7_3.10.ppc64le",
"7Server-RHEV-Agents-7:qemu-kvm-rhev-debuginfo-10:2.6.0-28.el7_3.10.x86_64",
"7Server-RHEV-Agents-7:qemu-kvm-tools-rhev-10:2.6.0-28.el7_3.10.ppc64le",
"7Server-RHEV-Agents-7:qemu-kvm-tools-rhev-10:2.6.0-28.el7_3.10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Qemu: display: cirrus: OOB read access issue"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…