CVE-2018-10839

Related Vulnerabilities: CVE-2018-10839  

An integer overflow issue was found in the NE200 NIC emulation. It could occur while receiving packets from the network, if the size value was greater than INT_MAX. Such overflow would lead to stack buffer overflow issue. A user inside guest could use this flaw to crash the QEMU process, resulting in DoS scenario.

An integer overflow issue was found in the NE200 NIC emulation. It could occur while receiving packets from the network, if the size value was greater than INT_MAX. Such overflow would lead to stack buffer overflow issue. A user inside guest could use this flaw to crash the QEMU process, resulting in DoS scenario.

Find out more about CVE-2018-10839 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v3 metrics

NOTE: The following CVSS v3 metrics and score provided are preliminary and subject to review.

CVSS3 Base Score 6.5
CVSS3 Base Metrics CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
Attack Vector Network
Attack Complexity High
Privileges Required None
User Interaction None
Scope Unchanged
Confidentiality None
Integrity Impact Low
Availability Impact High

Affected Packages State

Platform Package State
Red Hat OpenStack Platform 9.0 qemu-kvm-rhev Affected
Red Hat OpenStack Platform 8.0 (Liberty) qemu-kvm-rhev Affected
Red Hat OpenStack Platform 14 qemu-kvm-rhev Affected
Red Hat OpenStack Platform 13.0 (Queens) qemu-kvm-rhev Affected
Red Hat OpenStack Platform 12.0 qemu-kvm-rhev Affected
Red Hat OpenStack Platform 10 qemu-kvm-rhev Affected
Red Hat Enterprise Linux 7 qemu-kvm Affected
Red Hat Enterprise Linux 7 qemu-kvm-rhev Affected
Red Hat Enterprise Linux 7 qemu-kvm-ma Not affected
Red Hat Enterprise Linux 6 qemu-kvm Affected
Red Hat Enterprise Linux 5 kvm Not affected
Red Hat Enterprise Linux 5 xen Not affected

Acknowledgements

Red Hat would like to thank Daniel Shapira (Twistlock) and Arash Tohidi for reporting this issue.