Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1486588 - (CVE-2017-13673) CVE-2017-13673 QEMU: VGA: reachable assert failure during display update
CVE-2017-13673 QEMU: VGA: reachable assert failure during display update
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
impact=low,public=20170824,reported=2...
: Security
Depends On: 1486589 1486591 1486645 1486646 1486647 1486648 1493359 1493360 1493361 1493362 1493363 1493364 1493365
Blocks: 1478328 1520691
  Show dependency treegraph
 
Reported: 2017-08-30 04:19 EDT by Prasad J Pandit
Modified: 2018-07-18 11:30 EDT (History)
53 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
An assert failure issue was found in the VGA display emulator built into the Quick emulator (QEMU). It could occur while updating graphics display, due to miscalculating region for dirty bitmap snapshot in split screen mode. A privileged user/process inside guest could use this flaw to crash the QEMU process on the host resulting in denial of service.
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2018:1104 None None None 2018-04-10 14:57 EDT
Red Hat Product Errata RHSA-2018:1113 None None None 2018-04-11 14:03 EDT

  None (edit)
Description Prasad J Pandit 2017-08-30 04:19:26 EDT
Quick emulator(Qemu) built with the VGA display emulator support is vulnerable
to an assert failure issue. It could occur while updating graphics display,
due to miscalculating region for dirty bitmap snapshot in split screen mode.

A privileged user/process inside guest could use this flaw to crash the Qemu
process on the host resulting in DoS.

Upstream patch:
---------------
  -> https://lists.gnu.org/archive/html/qemu-devel/2017-08/msg05333.html

Reference:
----------
  -> http://www.openwall.com/lists/oss-security/2017/08/30/4
Comment 1 Prasad J Pandit 2017-08-30 04:20:07 EDT
Acknowledgments:

Name: David Buchanan
Comment 2 Prasad J Pandit 2017-08-30 04:21:36 EDT
Created xen tracking bugs for this issue:

Affects: fedora-all [bug 1486591]
Comment 3 Prasad J Pandit 2017-08-30 04:22:01 EDT
Created qemu tracking bugs for this issue:

Affects: fedora-all [bug 1486589]
Comment 11 Joshua Padman 2017-12-04 23:48:19 EST
Removing tracker and marking OSP6 as wontfix. RHEL 7.5 is released after OSP6 is EOL.
Comment 19 Doran Moppert 2018-04-03 23:30:24 EDT
removed erroneous rhev-hypervisor tracker that was opened in error and confusing sfm2.
Comment 20 errata-xmlrpc 2018-04-10 14:56:43 EDT
This issue has been addressed in the following products:

  Red Hat Virtualization 4 for RHEL-7

Via RHSA-2018:1104 https://access.redhat.com/errata/RHSA-2018:1104
Comment 21 errata-xmlrpc 2018-04-11 14:03:32 EDT
This issue has been addressed in the following products:

  Red Hat OpenStack Platform 10.0 (Newton)
  Red Hat OpenStack Platform 11.0 (Ocata)
  Red Hat OpenStack Platform 8.0 (Liberty)
  Red Hat OpenStack Platform 9.0 (Mitaka)
  Red Hat OpenStack Platform 12.0 (Pike)

Via RHSA-2018:1113 https://access.redhat.com/errata/RHSA-2018:1113

Note You need to log in before you can comment on or make changes to this bug.