
Cloud Vulnerability DB
A community-led vulnerabilities database
QEMU 4.1.0 contains a memory leak vulnerability (CVE-2019-20382) in the zrle_compress_data function within ui/vnc-enc-zrle.c. The vulnerability manifests during VNC disconnect operations due to improper usage of libz, where memory allocated by deflateInit2 is not properly freed by deflateEnd (NVD, Debian Security).
The vulnerability occurs specifically in the VNC display driver's handling of ZRLE (Zlib Run-Length Encoding) compression. When ZRLE and Tight encoding are enabled, the system creates two vncState objects, one of which allocates memory for Zlib's data object. The core issue lies in the improper memory management where the allocated memory is not properly freed during disconnection operations (OSS Security).
This vulnerability can lead to memory leakage on the host system when a VNC client disconnects. The continuous memory leaks could potentially lead to host memory exhaustion, resulting in a denial of service condition (Red Hat Security, Ubuntu Security).
The issue has been fixed in various distributions through security updates. The fix involves properly freeing the allocated memory during VNC disconnect operations. Users should upgrade to patched versions: Ubuntu 19.10 (1:4.0+dfsg-0ubuntu9.6), Ubuntu 18.04 LTS (1:2.11+dfsg-1ubuntu7.26), Ubuntu 16.04 LTS (1:2.5+dfsg-5ubuntu10.44), and Debian 10 (1:3.1+dfsg-8+deb10u5) (Ubuntu USN, Debian Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."