CVE-2018-16847
Published: 2 November 2018
An OOB heap buffer r/w access issue was found in the NVM Express Controller emulation in QEMU. It could occur in nvme_cmb_ops routines in nvme device. A guest user/process could use this flaw to crash the QEMU process resulting in DoS or potentially run arbitrary code with privileges of the QEMU process.
Priority
CVSS 3 base score: 7.8
Status
Package | Release | Status |
---|---|---|
qemu Launchpad, Ubuntu, Debian |
bionic |
Released
(1:2.11+dfsg-1ubuntu7.8)
|
cosmic |
Released
(1:2.12+dfsg-3ubuntu8.1)
|
|
precise |
Does not exist
|
|
trusty |
Not vulnerable
(code not present)
|
|
upstream |
Needs triage
|
|
xenial |
Not vulnerable
(code not present)
|
|
qemu-kvm Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
cosmic |
Does not exist
|
|
precise |
Not vulnerable
(code not present)
|
|
trusty |
Does not exist
|
|
upstream |
Not vulnerable
(debian: support for Controller Memory Buffers added later)
|
|
xenial |
Does not exist
|
Notes
Author | Note |
---|---|
mdeslaur | looks like it was introduced by: https://git.qemu.org/?p=qemu.git;a=commit;h=a896f7f26a1a0417322463439825073c1a917e41 |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16847
- https://www.openwall.com/lists/oss-security/2018/11/02/1
- https://ubuntu.com/security/notices/USN-3826-1
- NVD
- Launchpad
- Debian