A heap buffer overflow flaw was found in QEMU's Cirrus CLGD 54xx VGA emulator's VNC display driver support before 2.9; the issue could occur when a VNC client attempted to update its display after a VGA operation is performed by a guest. A privileged user/process inside a guest could use this flaw to crash the QEMU process or, potentially, execute arbitrary code on the host with privileges of the QEMU process.
{
"unresolved_ranges": [
{
"cpes": [
"cpe:2.3:a:citrix:xenserver:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:citrix:xenserver:6.2.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:citrix:xenserver:6.5:sp1:*:*:*:*:*:*",
"cpe:2.3:a:citrix:xenserver:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:citrix:xenserver:7.1:*:*:*:*:*:*:*"
],
"source": "CPE_FIELD",
"vendor_product": "citrix:xenserver",
"extracted_events": [
{
"last_affected": "6.0.2"
},
{
"last_affected": "6.2.0-sp1"
},
{
"last_affected": "6.5-sp1"
},
{
"last_affected": "7.0"
},
{
"last_affected": "7.1"
}
]
},
{
"cpes": [
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
],
"source": "CPE_FIELD",
"vendor_product": "debian:debian_linux",
"extracted_events": [
{
"last_affected": "7.0"
}
]
},
{
"cpes": [
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
],
"vendor_product": "redhat:enterprise_linux_desktop",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "6.0"
},
{
"last_affected": "7.0"
}
]
},
{
"cpes": [
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
],
"source": "CPE_FIELD",
"vendor_product": "redhat:enterprise_linux_server",
"extracted_events": [
{
"last_affected": "6.0"
},
{
"last_affected": "7.0"
}
]
},
{
"cpes": [
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*"
],
"source": "CPE_FIELD",
"vendor_product": "redhat:enterprise_linux_server_aus",
"extracted_events": [
{
"last_affected": "7.3"
},
{
"last_affected": "7.4"
}
]
},
{
"cpes": [
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*"
],
"source": "CPE_FIELD",
"vendor_product": "redhat:enterprise_linux_server_eus",
"extracted_events": [
{
"last_affected": "7.3"
},
{
"last_affected": "7.4"
},
{
"last_affected": "7.5"
}
]
},
{
"cpes": [
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
],
"source": "CPE_FIELD",
"vendor_product": "redhat:enterprise_linux_workstation",
"extracted_events": [
{
"last_affected": "6.0"
},
{
"last_affected": "7.0"
}
]
},
{
"cpes": [
"cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openstack:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openstack:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openstack:8:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openstack:9:*:*:*:*:*:*:*"
],
"source": "CPE_FIELD",
"vendor_product": "redhat:openstack",
"extracted_events": [
{
"last_affected": "5.0"
},
{
"last_affected": "6.0"
},
{
"last_affected": "7.0"
},
{
"last_affected": "8"
},
{
"last_affected": "9"
},
{
"last_affected": "10"
}
]
}
]
}