Bug 1073489 - (CVE-2017-15124) VUL-0: CVE-2017-15124 kvm,qemu: Memory exhaustion through framebuffer update request message in VNC server
(CVE-2017-15124)
VUL-0: CVE-2017-15124 kvm,qemu: Memory exhaustion through framebuffer update ...
Status: RESOLVED FIXED
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P3 - Medium : Normal
: ---
Assigned To: Liang Yan
Security Team bot
https://smash.suse.de/issue/196850/
CVSSv3:RedHat:CVE-2017-15124:3.5:(AV:...
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2017-12-19 10:49 UTC by Alexander Bergmann
Modified: 2019-04-26 21:26 UTC (History)
2 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Alexander Bergmann 2017-12-19 10:49:23 UTC
rh#1525195

A flaw was found in QEMU VNC server. A remote client can trigger an unbounded memory usage through the framebuffer update request message leading to denial of service.

Upstream patch set:
-------------------
  -> https://lists.gnu.org/archive/html/qemu-devel/2017-12/msg03715.html
  -> https://lists.gnu.org/archive/html/qemu-devel/2017-12/msg03713.html
  -> https://lists.gnu.org/archive/html/qemu-devel/2017-12/msg03711.html

Thread:
  -> https://lists.gnu.org/archive/html/qemu-devel/2017-12/msg03705.html

References:
https://bugzilla.redhat.com/show_bug.cgi?id=1525195
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15124
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124
Comment 1 Liang Yan 2018-01-24 22:10:08 UTC
Patch is pulled into upstream

commit 7398166ddf7c6dbbc9cae6ac69bb2feda14b40ac
Merge: a3380cf658 30b80fd526
Author: Peter Maydell <peter.maydell@linaro.org>
Date:   Fri Jan 12 16:01:30 2018 +0000

    Merge remote-tracking branch 'remotes/kraxel/tags/vnc-20180112-pull-request'
 into staging
Comment 2 Swamp Workflow Management 2018-03-21 20:08:14 UTC
SUSE-SU-2018:0762-1: An update that solves 8 vulnerabilities and has four fixes is now available.

Category: security (important)
Bug References: 1040202,1068032,1068613,1070144,1071228,1073489,1074572,1076114,1076775,1076813,1082276,1083291
CVE References: CVE-2017-15119,CVE-2017-15124,CVE-2017-16845,CVE-2017-17381,CVE-2017-18043,CVE-2017-5715,CVE-2018-5683,CVE-2018-7550
Sources used:
SUSE Linux Enterprise Server 12-SP3 (src):    qemu-2.9.1-6.12.1
SUSE Linux Enterprise Desktop 12-SP3 (src):    qemu-2.9.1-6.12.1
SUSE CaaS Platform ALL (src):    qemu-2.9.1-6.12.1
Comment 3 Swamp Workflow Management 2018-03-22 23:08:02 UTC
openSUSE-SU-2018:0780-1: An update that solves 8 vulnerabilities and has four fixes is now available.

Category: security (important)
Bug References: 1040202,1068032,1068613,1070144,1071228,1073489,1074572,1076114,1076775,1076813,1082276,1083291
CVE References: CVE-2017-15119,CVE-2017-15124,CVE-2017-16845,CVE-2017-17381,CVE-2017-18043,CVE-2017-5715,CVE-2018-5683,CVE-2018-7550
Sources used:
openSUSE Leap 42.3 (src):    qemu-2.9.1-41.1, qemu-linux-user-2.9.1-41.1, qemu-testsuite-2.9.1-41.1
Comment 4 Swamp Workflow Management 2018-03-27 19:09:36 UTC
SUSE-SU-2018:0831-1: An update that solves 9 vulnerabilities and has four fixes is now available.

Category: security (important)
Bug References: 1040202,1068032,1068613,1070144,1071228,1073489,1076114,1076179,1076775,1076814,1082276,1083291,1085598
CVE References: CVE-2017-15119,CVE-2017-15124,CVE-2017-16845,CVE-2017-17381,CVE-2017-18030,CVE-2017-18043,CVE-2017-5715,CVE-2018-5683,CVE-2018-7550
Sources used:
SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (src):    qemu-2.6.2-41.37.1
SUSE Linux Enterprise Server 12-SP2 (src):    qemu-2.6.2-41.37.1
SUSE Linux Enterprise Desktop 12-SP2 (src):    qemu-2.6.2-41.37.1
Comment 5 Liang Yan 2019-04-26 21:26:43 UTC
Personal bug clean up. Free free to reopen it if you have further questions.