First published: Thu Dec 20 2018(Updated: )
hw/rdma/rdma_backend.c in QEMU allows guest OS users to trigger out-of-bounds access via a PvrdmaSqWqe ring element with a large num_sge value.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/qemu | 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u7 1:9.1.2+ds-1 1:9.2.0+ds-2 | |
QEMU KVM | <=3.1.0 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =18.04 | |
Ubuntu Linux | =18.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-20124 has been classified as a high severity vulnerability due to the potential for out-of-bounds access.
To fix CVE-2018-20124, update your QEMU installation to a version higher than 3.1.0 or apply the relevant patches provided by your distribution.
CVE-2018-20124 affects QEMU versions up to 3.1.0 and specific versions of Ubuntu and Debian-based systems.
CVE-2018-20124 is caused by a large num_sge value in a PvrdmaSqWqe ring element leading to out-of-bounds memory access.
While details of specific exploits for CVE-2018-20124 are not public, the vulnerability's nature allows for possible exploitation by malicious guest OS users.