First published: Tue Sep 17 2019(Updated: )
A memory leakage flaw was found in the way the VNC display driver of QEMU handled the connection disconnect when ZRLE and Tight encoding are enabled. Two VncState objects are created, and one allocates memory for the Zlib's data object. This allocated memory is not freed upon disconnection, resulting in a memory leak. An attacker able to connect to the VNC server could use this flaw to leak host memory, leading to a potential denial of service.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/qemu-kvm | <10:1.5.3-175.el7 | 10:1.5.3-175.el7 |
redhat/qemu-kvm-ma | <10:2.12.0-48.el7 | 10:2.12.0-48.el7 |
redhat/qemu-kvm-rhev | <10:2.12.0-48.el7_9.1 | 10:2.12.0-48.el7_9.1 |
redhat/qemu-kvm-rhev | <10:2.12.0-18.el7_6.12 | 10:2.12.0-18.el7_6.12 |
redhat/qemu-kvm-rhev | <10:2.12.0-48.el7 | 10:2.12.0-48.el7 |
redhat/qemu | <4.2.0 | 4.2.0 |
debian/qemu | 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u12 1:9.2.0+ds-2 1:9.2.0+ds-5 | |
QEMU KVM | =4.1.0 | |
openSUSE | =15.1 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =18.04 | |
Ubuntu Linux | =19.10 | |
Ubuntu Linux | =20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2019-20382 is a vulnerability found in QEMU 4.1.0 that leads to a memory leak in the VNC display driver when ZRLE and Tight encoding are enabled.
The severity of CVE-2019-20382 is low, with a CVSS score of 3.5.
To fix CVE-2019-20382, you should update to QEMU version 4.2.0 or later.
You can find more information about CVE-2019-20382 in the references provided: [link1], [link2], [link3].