Bugzilla – Bug 1212850
VUL-0: CVE-2023-3354: qemu,kvm: improper I/O watch removal in VNC TLS handshake can lead to remote unauthenticated denial of service
Last modified: 2024-07-09 11:12:32 UTC
CVE-2023-3354 When a client connects to the VNC server, QEMU will check whether the current number of connections is greater than the limitation. If so, it will clean up the previous connection. If that connection happens to be in the handshake phase and fails, QEMU will clean up the connection again, which will result in a NULL pointer dereference issue. A remote unauthenticated user could use this flaw to cause a denial of service. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3354 https://bugzilla.redhat.com/show_bug.cgi?id=2216478
No details that I could find yet
Latest version of the patch, still not merged: https://lists.nongnu.org/archive/html/qemu-devel/2023-07/msg02668.html
(In reply to Carlos López from comment #2) > Latest version of the patch, still not merged: > https://lists.nongnu.org/archive/html/qemu-devel/2023-07/msg02668.html Committed as: 10be627d2b5ec2d6b3dce045144aa739eef678b4 To which branches do we backport?
(In reply to Dario Faggioli from comment #3) > (In reply to Carlos López from comment #2) > > Latest version of the patch, still not merged: > > https://lists.nongnu.org/archive/html/qemu-devel/2023-07/msg02668.html > > Committed as: 10be627d2b5ec2d6b3dce045144aa739eef678b4 > > To which branches do we backport? The VNC code was introduced very early, so I'd say all of them: - SUSE:SLE-12-SP2:Update/qemu - SUSE:SLE-12-SP3:Update/qemu - SUSE:SLE-12-SP4:Update/qemu - SUSE:SLE-12-SP5:Update/qemu - SUSE:SLE-15-SP1:Update/qemu - SUSE:SLE-15-SP2:Update/qemu - SUSE:SLE-15-SP3:Update/qemu - SUSE:SLE-15-SP4:Update/qemu - SUSE:SLE-15-SP5:Update/qemu - SUSE:ALP:Source:Standard:1.0/qemu In older versions qio_channel_add_watch() is used instead of qio_channel_add_watch_full(), but I think the same logic applies.
This is an autogenerated message for OBS integration: This bug (1212850) was mentioned in https://build.opensuse.org/request/show/1103082 Factory / qemu
SUSE-SU-2023:3444-1: An update that solves six vulnerabilities can now be installed. Category: security (important) Bug References: 1188609, 1190011, 1207205, 1212850, 1213414, 1213925 CVE References: CVE-2021-3638, CVE-2021-3750, CVE-2023-0330, CVE-2023-3180, CVE-2023-3301, CVE-2023-3354 Sources used: SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): qemu-5.2.0-150300.127.3 SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): qemu-5.2.0-150300.127.3 SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): qemu-5.2.0-150300.127.3 SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): qemu-5.2.0-150300.127.3 SUSE Manager Proxy 4.2 (src): qemu-5.2.0-150300.127.3 SUSE Manager Retail Branch Server 4.2 (src): qemu-5.2.0-150300.127.3 SUSE Manager Server 4.2 (src): qemu-5.2.0-150300.127.3 SUSE Enterprise Storage 7.1 (src): qemu-5.2.0-150300.127.3 SUSE Linux Enterprise Micro 5.1 (src): qemu-5.2.0-150300.127.3 SUSE Linux Enterprise Micro 5.2 (src): qemu-5.2.0-150300.127.3 SUSE Linux Enterprise Micro for Rancher 5.2 (src): qemu-5.2.0-150300.127.3 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
This is an autogenerated message for OBS integration: This bug (1212850) was mentioned in https://build.opensuse.org/request/show/1110620 Factory / qemu
SUSE-SU-2023:3721-1: An update that solves 10 vulnerabilities and has one security fix can now be installed. Category: security (important) Bug References: 1172382, 1188609, 1190011, 1193880, 1197653, 1198712, 1207205, 1212850, 1212968, 1213925, 1215311 CVE References: CVE-2020-13754, CVE-2021-3638, CVE-2021-3750, CVE-2021-3929, CVE-2022-1050, CVE-2022-26354, CVE-2023-0330, CVE-2023-2861, CVE-2023-3180, CVE-2023-3354 Sources used: openSUSE Leap 15.4 (src): qemu-4.2.1-150200.79.1 SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): qemu-4.2.1-150200.79.1 SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): qemu-4.2.1-150200.79.1 SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): qemu-4.2.1-150200.79.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:3800-1: An update that solves nine vulnerabilities and has one security fix can now be installed. Category: security (important) Bug References: 1172382, 1190011, 1193880, 1197653, 1198712, 1207205, 1212850, 1212968, 1213925, 1215311 CVE References: CVE-2019-13754, CVE-2021-3750, CVE-2021-3929, CVE-2022-1050, CVE-2022-26354, CVE-2023-0330, CVE-2023-2861, CVE-2023-3180, CVE-2023-3354 Sources used: SUSE CaaS Platform 4.0 (src): qemu-3.1.1.1-150100.80.51.5 SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (src): qemu-3.1.1.1-150100.80.51.5 SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (src): qemu-3.1.1.1-150100.80.51.5 SUSE Linux Enterprise Server for SAP Applications 15 SP1 (src): qemu-3.1.1.1-150100.80.51.5 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:4056-1: An update that solves five vulnerabilities and has four security fixes can now be installed. Category: security (important) Bug References: 1179993, 1181740, 1188609, 1190011, 1207205, 1212850, 1213663, 1213925, 1215311 CVE References: CVE-2021-3638, CVE-2021-3750, CVE-2023-0330, CVE-2023-3180, CVE-2023-3354 Sources used: openSUSE Leap 15.4 (src): qemu-linux-user-6.2.0-150400.37.23.1, qemu-6.2.0-150400.37.23.1 SUSE Linux Enterprise Micro for Rancher 5.3 (src): qemu-6.2.0-150400.37.23.1 SUSE Linux Enterprise Micro 5.3 (src): qemu-6.2.0-150400.37.23.1 SUSE Linux Enterprise Micro for Rancher 5.4 (src): qemu-6.2.0-150400.37.23.1 SUSE Linux Enterprise Micro 5.4 (src): qemu-6.2.0-150400.37.23.1 Basesystem Module 15-SP4 (src): qemu-6.2.0-150400.37.23.1 Server Applications Module 15-SP4 (src): qemu-6.2.0-150400.37.23.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:4662-1: An update that solves three vulnerabilities and has two security fixes can now be installed. Category: security (important) Bug References: 1188609, 1212850, 1213210, 1213925, 1215311 CVE References: CVE-2021-3638, CVE-2023-3180, CVE-2023-3354 Sources used: openSUSE Leap 15.5 (src): qemu-linux-user-7.1.0-150500.49.9.1, qemu-7.1.0-150500.49.9.2 SUSE Linux Enterprise Micro 5.5 (src): qemu-7.1.0-150500.49.9.2 Basesystem Module 15-SP5 (src): qemu-7.1.0-150500.49.9.2 Server Applications Module 15-SP5 (src): qemu-7.1.0-150500.49.9.2 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2024:0589-1: An update that solves three vulnerabilities and has two security fixes can now be installed. Category: security (important) Bug References: 1188609, 1212850, 1213210, 1213925, 1215311 CVE References: CVE-2021-3638, CVE-2023-3180, CVE-2023-3354 Sources used: SUSE Package Hub 15 15-SP5 (src): qemu-7.1.0-150500.49.9.2 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2024:1395-1: An update that solves five vulnerabilities can now be installed. Category: security (important) Bug References: 1190011, 1198038, 1207205, 1212850, 1213925 CVE References: CVE-2021-3750, CVE-2022-0216, CVE-2023-0330, CVE-2023-3180, CVE-2023-3354 Maintenance Incident: [SUSE:Maintenance:33441](https://smelt.suse.de/incident/33441/) Sources used: SUSE Linux Enterprise High Performance Computing 12 SP5 (src): qemu-3.1.1.1-72.1 SUSE Linux Enterprise Server 12 SP5 (src): qemu-3.1.1.1-72.1 SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): qemu-3.1.1.1-72.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.