SB2018041054 - Red Hat update for qemu-kvm
Published: April 10, 2018
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Out-of-bounds read (CVE-ID: CVE-2017-13672)
The vulnerability allows an adjacent unauthenticated attacker to cause DoS condition on the target system.The weakness exists due to out-of-bounds read. An adjacent attacker can trigger memory corruption and cause the service to crash.
2) Use-after-free error (CVE-ID: CVE-2017-13711)
The vulnerability allows an adjacent attacker to cause DoS condition on the target system.
The weakness exists in the Slirp networking implementation due to use-after-free error when a Socket referenced from multiple packets is freed while responding to a message. An adjacent attacker can cause the service to crash.
3) Memory allocation (CVE-ID: CVE-2017-15124)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists due to uncontrolled memory allocation when not throttling the framebuffer updates sent to the client. A remote attacker can cause the service to crash.
4) Memory leak (CVE-ID: CVE-2017-15268)
The vulnerability allows a remote attacker to cause DoІ condition on the target system.
The weakness exists in io/channel-websock.c due to memory leak in slow data-channel read operations. A remote attacker can trigger memory corruption and cause the service to crash.
5) Out-of-bounds read (CVE-ID: CVE-2018-5683)
The vulnerability allows an adjacent low-privileged attacker to cause DoS condition on the target system.The weakness exists in the vga_draw_text function due to out-of-bounds read. A remote attacker can leverage improper memory address validation, trigger memory error and cause QEMU process to crash.
Remediation
Install update from vendor's website.