vulnerability
CentOS Linux: CVE-2016-9603: Important: qemu-kvm security update (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
9 | (AV:N/AC:L/Au:S/C:C/I:C/A:C) | Mar 14, 2017 | Apr 20, 2017 | May 25, 2023 |
Severity
9
CVSS
(AV:N/AC:L/Au:S/C:C/I:C/A:C)
Published
Mar 14, 2017
Added
Apr 20, 2017
Modified
May 25, 2023
Description
A heap buffer overflow flaw was found in QEMU's Cirrus CLGD 54xx VGA emulator's VNC display driver support before 2.9; the issue could occur when a VNC client attempted to update its display after a VGA operation is performed by a guest. A privileged user/process inside a guest could use this flaw to crash the QEMU process or, potentially, execute arbitrary code on the host with privileges of the QEMU process.
Solution(s)
centos-upgrade-qemu-guest-agentcentos-upgrade-qemu-imgcentos-upgrade-qemu-kvmcentos-upgrade-qemu-kvm-commoncentos-upgrade-qemu-kvm-debuginfocentos-upgrade-qemu-kvm-tools
References
- BID-96893
- DEBIAN-DLA-939-1
- NVD-CVE-2016-9603
- REDHAT-RHSA-2017:0980
- REDHAT-RHSA-2017:0981
- REDHAT-RHSA-2017:0982
- REDHAT-RHSA-2017:0983
- REDHAT-RHSA-2017:0984
- REDHAT-RHSA-2017:0985
- REDHAT-RHSA-2017:0987
- REDHAT-RHSA-2017:0988
- REDHAT-RHSA-2017:1205
- REDHAT-RHSA-2017:1206
- REDHAT-RHSA-2017:1441
- UBUNTU-USN-3261-1
- UBUNTU-USN-3268-1

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.