Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1530356 - (CVE-2018-5683) CVE-2018-5683 Qemu: Out-of-bounds read in vga_draw_text routine
CVE-2018-5683 Qemu: Out-of-bounds read in vga_draw_text routine
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
impact=low,public=20171225,reported=2...
: Security
Depends On: 1534671 1534672 1534680 1534681 1534682 1534683 1534684 1534685 1534686 1534687 1534688 1534689 1534690 1534691 1534692 1534693
Blocks: 1530362 1534927
  Show dependency treegraph
 
Reported: 2018-01-02 13:06 EST by Pedro Sampaio
Modified: 2018-07-18 11:43 EDT (History)
42 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
An out-of-bounds read access issue was found in the VGA emulator of QEMU. It could occur in vga_draw_text routine, while updating display area for a vnc client. A privileged user inside a guest could use this flaw to crash the QEMU process resulting in DoS.
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2018:0816 None None None 2018-04-10 04:25 EDT
Red Hat Product Errata RHSA-2018:1104 None None None 2018-04-10 15:00 EDT
Red Hat Product Errata RHSA-2018:2162 None None None 2018-07-10 13:52 EDT

  None (edit)
Description Pedro Sampaio 2018-01-02 13:06:43 EST
Quick Emulator(QEMU) built with the VGA emulator support is vulnerable to an out-of-bounds access issue in vga_draw_text. It could occur while updating vga display area.

A privileged user inside guest could use this flaw to crash the Qemu process
resulting in DoS.

Upstream patch:
---------------
  -> https://lists.gnu.org/archive/html/qemu-devel/2018-01/msg02131.html

Reference:
----------
  -> http://www.openwall.com/lists/oss-security/2018/01/15/2
Comment 1 Pedro Sampaio 2018-01-02 13:06:57 EST
Acknowledgments:

Name: Jiang Xin, Lin ZheCheng
Comment 3 Prasad J Pandit 2018-01-15 12:33:56 EST
Created qemu tracking bugs for this issue:

Affects: fedora-all [bug 1534672]


Created xen tracking bugs for this issue:

Affects: fedora-all [bug 1534671]
Comment 8 Gerd Hoffmann 2018-01-26 01:47:56 EST
upstream commit 191f59dc17396bb5a8da50f8c59b6e0a430711a4
Comment 9 Joshua Padman 2018-02-06 16:00:58 EST
Red Hat OpenStack 6 will be End of Life on the 17th of February. Marking flaws as wontfix.
Comment 10 Joshua Padman 2018-04-03 19:00:26 EDT
Red Hat OpenStack 7 will not be supported on RHEL 7.5, where the fix is being release. Marking OpenStack 7 as wontfix.
Comment 11 errata-xmlrpc 2018-04-10 04:25:05 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2018:0816 https://access.redhat.com/errata/RHSA-2018:0816
Comment 12 errata-xmlrpc 2018-04-10 15:00:15 EDT
This issue has been addressed in the following products:

  Red Hat Virtualization 4 for RHEL-7

Via RHSA-2018:1104 https://access.redhat.com/errata/RHSA-2018:1104
Comment 13 Joshua Padman 2018-04-25 19:07:28 EDT
This issue has been addressed in the following products:

  Red Hat OpenStack Platform 8
  Red Hat OpenStack Platform 9
  Red Hat OpenStack Platform 10
  Red Hat OpenStack Platform 11
  Red Hat OpenStack Platform 12

https://access.redhat.com/errata/RHSA-2018:1113
Comment 14 errata-xmlrpc 2018-07-10 13:52:18 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6

Via RHSA-2018:2162 https://access.redhat.com/errata/RHSA-2018:2162

Note You need to log in before you can comment on or make changes to this bug.