Bug 1178400 - (CVE-2020-27616) VUL-1: CVE-2020-27616: qemu,kvm: ati-vga: potential crash via invalid x y parameter values
(CVE-2020-27616)
VUL-1: CVE-2020-27616: qemu,kvm: ati-vga: potential crash via invalid x y par...
Status: NEW
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P4 - Low : Minor
: ---
Assigned To: Security Team bot
Security Team bot
https://smash.suse.de/issue/270758/
CVSSv3.1:SUSE:CVE-2020-27616:2.8:(AV:...
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2020-11-03 15:05 UTC by Robert Frohl
Modified: 2021-04-23 16:25 UTC (History)
2 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Robert Frohl 2020-11-03 15:05:58 UTC
rh#1894036

An out-of-bounds access issue was found in the ati-vga emulator of the QEMU. It could occur when the source and destination x,y display parameters in ati_2d_blt() have invalid values. A guest user/process may use this flaw to crash the QEMU process resulting in DoS scenario.

Upstream patch:
---------------
  -> https://lists.nongnu.org/archive/html/qemu-devel/2020-10/msg06080.html

References:
https://bugzilla.redhat.com/show_bug.cgi?id=1894036
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27616
http://seclists.org/oss-sec/2020/q4/89
https://lists.nongnu.org/archive/html/qemu-devel/2020-10/msg06080.html
Comment 1 Robert Frohl 2020-11-03 15:07:30 UTC
only affects version 4.0.0 and newer, therefor tracking this codestream as affected:

- SUSE:SLE-15-SP2:Update/qemu
Comment 2 Bruce Rogers 2021-03-21 01:58:10 UTC
This fix is commit ca1f9cbfdce4d63b10d57de80fef89a89d92a540, contained in v5.2.0.
Comment 4 Bruce Rogers 2021-04-07 01:58:55 UTC
Fix is included in maintenance request for all affected releases. Returning to security team.
Comment 5 Swamp Workflow Management 2021-04-16 16:16:17 UTC
SUSE-SU-2021:1243-1: An update that solves 15 vulnerabilities and has two fixes is now available.

Category: security (important)
Bug References: 1172385,1173612,1176673,1176682,1176684,1178174,1178400,1178934,1179466,1179467,1179468,1179686,1181108,1182425,1182577,1182968,1184064
CVE References: CVE-2020-12829,CVE-2020-15469,CVE-2020-25084,CVE-2020-25624,CVE-2020-25625,CVE-2020-25723,CVE-2020-27616,CVE-2020-27617,CVE-2020-27821,CVE-2020-28916,CVE-2020-29129,CVE-2020-29130,CVE-2020-29443,CVE-2021-20257,CVE-2021-3416
JIRA References: 
Sources used:
SUSE MicroOS 5.0 (src):    qemu-4.2.1-11.16.3
SUSE Linux Enterprise Module for Server Applications 15-SP2 (src):    qemu-4.2.1-11.16.3
SUSE Linux Enterprise Module for Basesystem 15-SP2 (src):    qemu-4.2.1-11.16.3

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 6 Swamp Workflow Management 2021-04-23 16:25:32 UTC
openSUSE-SU-2021:0600-1: An update that solves 15 vulnerabilities and has two fixes is now available.

Category: security (important)
Bug References: 1172385,1173612,1176673,1176682,1176684,1178174,1178400,1178934,1179466,1179467,1179468,1179686,1181108,1182425,1182577,1182968,1184064
CVE References: CVE-2020-12829,CVE-2020-15469,CVE-2020-25084,CVE-2020-25624,CVE-2020-25625,CVE-2020-25723,CVE-2020-27616,CVE-2020-27617,CVE-2020-27821,CVE-2020-28916,CVE-2020-29129,CVE-2020-29130,CVE-2020-29443,CVE-2021-20257,CVE-2021-3416
JIRA References: 
Sources used:
openSUSE Leap 15.2 (src):    qemu-4.2.1-lp152.9.12.1, qemu-linux-user-4.2.1-lp152.9.12.1, qemu-testsuite-4.2.1-lp152.9.12.1