A memory leakage flaw was found in the way VNC display driver of QEMU handled connection disconnect, when ZRLE, Tight encoding is enabled. It creates two vncState objects, one of which allocates memory for Zlib's data object. This allocated memory is not free'd upon disconnection resulting in the said memory leakage issue. A user able to connect to the VNC server could use this flaw to leak host memory leading to a potential DoS scenario. Upstream patch: --------------- -> https://git.qemu.org/?p=qemu.git;a=commitdiff;h=6bf21f3d83e95bcc4ba35a7a07cc6655e8b010b0
Created qemu tracking bugs for this issue: Affects: fedora-all [bug 1810391]
Statement: This flaw did not affect the versions of `qemu-kvm` as shipped with Red Hat Enterprise Linux 6 as they did not include the vulnerable code.
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2020:2774 https://access.redhat.com/errata/RHSA-2020:2774
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2019-20382
This issue has been addressed in the following products: Red Hat Virtualization 4 for Red Hat Enterprise Linux 7 Red Hat Virtualization Engine 4.3 Via RHSA-2020:3267 https://access.redhat.com/errata/RHSA-2020:3267
External References: https://www.openwall.com/lists/oss-security/2020/03/05/1
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2020:3906 https://access.redhat.com/errata/RHSA-2020:3906
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2020:3907 https://access.redhat.com/errata/RHSA-2020:3907
This issue has been addressed in the following products: Red Hat OpenStack Platform 13.0 (Queens) Red Hat OpenStack Platform 13.0 (Queens) for RHEL 7.6 EUS Via RHSA-2020:4167 https://access.redhat.com/errata/RHSA-2020:4167