Your submission was sent successfully! Close

CVE-2019-12068

Published: 24 September 2019

In QEMU 1:4.1-1, 1:2.1+dfsg-12+deb8u6, 1:2.8+dfsg-6+deb9u8, 1:3.1+dfsg-8~deb10u1, 1:3.1+dfsg-8+deb10u2, and 1:2.1+dfsg-12+deb8u12 (fixed), when executing script in lsi_execute_script(), the LSI scsi adapter emulator advances 's->dsp' index to read next opcode. This can lead to an infinite loop if the next opcode is empty. Move the existing loop exit after 10k iterations so that it covers no-op opcodes as well.

From the Ubuntu security team

It was discovered that the LSI SCSI adapter emulator implementation in QEMU did not properly validate executed scripts. A local attacker could use this to cause a denial of service.

Priority

Low

CVSS 3 base score: 3.8

Status

Package Release Status
qemu
Launchpad, Ubuntu, Debian
bionic
Released (1:2.11+dfsg-1ubuntu7.20)
disco
Released (1:3.1+dfsg-2ubuntu3.6)
eoan
Released (1:4.0+dfsg-0ubuntu9.1)
focal
Released (1:4.2-1ubuntu1)
groovy
Released (1:4.2-1ubuntu1)
hirsute
Released (1:4.2-1ubuntu1)
precise Does not exist

trusty
Released (2.0.0+dfsg-2ubuntu1.47)
upstream
Released (1:4.1-2)
xenial
Released (1:2.5+dfsg-5ubuntu10.42)
Patches:
upstream: https://git.qemu.org/?p=qemu.git;a=commit;h=de594e47659029316bbf9391efb79da0a1a08e08
qemu-kvm
Launchpad, Ubuntu, Debian
bionic Does not exist

disco Does not exist

eoan Does not exist

focal Does not exist

groovy Does not exist

hirsute Does not exist

precise Ignored
(end of ESM support, was needed)
trusty Does not exist

upstream Needs triage

xenial Does not exist