First published: Fri Nov 02 2018(Updated: )
An OOB heap buffer r/w access issue was found in the NVM Express Controller emulation in QEMU. It could occur in nvme_cmb_ops routines in nvme device. A guest user/process could use this flaw to crash the QEMU process resulting in DoS or potentially run arbitrary code with privileges of the QEMU process.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/qemu | 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u7 1:9.0.2+ds-2 1:9.1.0+ds-3 | |
QEMU KVM | <=3.0.0 | |
QEMU KVM | =3.1.0-rc0 | |
QEMU KVM | =3.1.0-rc1 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =18.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-16847 is an OOB heap buffer r/w access vulnerability in the NVM Express Controller emulation in QEMU, which could result in denial of service (DoS) or arbitrary code execution.
The severity of CVE-2018-16847 is high with a CVSS score of 7.8.
CVE-2018-16847 affects the NVM Express Controller emulation in QEMU, allowing a guest user/process to crash QEMU or potentially execute arbitrary code with the privileges of the QEMU process.
QEMU versions up to 3.0.0, 3.1.0-rc0, and 3.1.0-rc1 are affected, as well as specific versions of QEMU on Ubuntu 14.04, 16.04, 18.04, and 18.10, and certain versions of QEMU on Debian systems.
To fix CVE-2018-16847, update QEMU to version 1:2.11+dfsg-1ubuntu7.8 on Ubuntu, 1:2.12+dfsg-3ubuntu8.1 on Ubuntu 18.04 (cosmic), or the appropriate fixed versions on other affected systems.