Bug 1516925 (CVE-2017-15119)

Summary: CVE-2017-15119 qemu: DoS via large option request
Product: [Other] Security Response Reporter: Adam Mariš <amaris>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: ailan, amit, apevec, areis, berrange, bleanhar, bmcclain, ccoleman, cfergeau, chrisw, dblechte, dedgar, dmcphers, drjones, dwmw2, eedri, gmollett, imammedo, itamar, jen, jgoulding, jjoyce, jkeck, jschluet, kbasil, knoel, lhh, lkundrak, lpeer, markmc, mburns, mgoldboi, michal.skrivanek, mkenneth, mknowles, mrezanin, mst, pbonzini, ppandit, rbryant, rjones, rkrcmar, sclewis, security-response-team, sherold, slinaber, srevivo, tdecacqu, virt-maint, virt-maint, vkuznets, xen-maint, ykaul
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: qemu 2.11 Doc Type: Bug Fix
Doc Text:
The Network Block Device (NBD) server in Quick Emulator (QEMU), is vulnerable to a denial of service issue. It could occur if a client sent large option requests, making the server waste CPU time on reading up to 4GB per request. A client could use this flaw to keep the NBD server from serving other requests, resulting in DoS.
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-06-08 03:31:55 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1518239, 1518238, 1518529, 1518530, 1518531, 1518532, 1518533, 1518534, 1518535, 1518536, 1518551, 1520242    
Bug Blocks: 1516927, 1520691    
Attachments:
Description Flags
Proposed patch none

Description Adam Mariš 2017-11-23 15:16:27 UTC
Quick Emulator(Qemu) built with the Network Block Device(NBD) server support is vulnerable to a denial-of-service issue. It could occur if a client sent large option requests, making server waste CPU time on reading up to 4G bytes.

A client could use this flaw to keep the NBD server from serving other requests, resulting in DoS.

Upstream patch:
---------------
  -> https://lists.gnu.org/archive/html/qemu-devel/2017-11/msg05044.html

Reference:
----------
  -> http://www.openwall.com/lists/oss-security/2017/11/28/9

Comment 1 Adam Mariš 2017-11-23 15:16:44 UTC
Acknowledgments:

Name: Eric Blake (Red Hat)

Comment 2 Adam Mariš 2017-11-23 15:25:54 UTC
Created attachment 1358263 [details]
Proposed patch

Comment 3 Prasad Pandit 2017-11-28 13:28:33 UTC
Created qemu tracking bugs for this issue:

Affects: epel-7 [bug 1518239]
Affects: fedora-all [bug 1518238]

Comment 8 Mark Knowles 2017-12-04 06:20:37 UTC
Created qemu-kvm tracking bugs for this issue:

Affects: openshift-1 [bug 1520241]

Comment 19 errata-xmlrpc 2018-04-10 18:58:51 UTC
This issue has been addressed in the following products:

  Red Hat Virtualization 4 for RHEL-7

Via RHSA-2018:1104 https://access.redhat.com/errata/RHSA-2018:1104

Comment 20 errata-xmlrpc 2018-04-11 18:04:18 UTC
This issue has been addressed in the following products:

  Red Hat OpenStack Platform 10.0 (Newton)
  Red Hat OpenStack Platform 11.0 (Ocata)
  Red Hat OpenStack Platform 8.0 (Liberty)
  Red Hat OpenStack Platform 9.0 (Mitaka)
  Red Hat OpenStack Platform 12.0 (Pike)

Via RHSA-2018:1113 https://access.redhat.com/errata/RHSA-2018:1113