An out-of-bounds heap buffer r/w access issue was found in the NVM Express Controller emulation in QEMU. It could occur in nvme_cmb_ops routines in a nvme device. A guest user/process could use this flaw to crash the QEMU process resulting in denial of service or, potentially, run arbitrary code with privileges of the QEMU process.
Find out more about CVE-2018-16847 from the MITRE CVE dictionary dictionary and NIST NVD.
NOTE: The following CVSS v3 metrics and score provided are preliminary and subject to review.
CVSS3 Base Score | 7 |
---|---|
CVSS3 Base Metrics | CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H |
Attack Vector | Local |
Attack Complexity | High |
Privileges Required | Low |
User Interaction | None |
Scope | Changed |
Confidentiality | Low |
Integrity Impact | Low |
Availability Impact | High |
Platform | Package | State |
---|---|---|
Red Hat OpenStack Platform 9.0 | qemu-kvm-rhev | Not affected |
Red Hat OpenStack Platform 8.0 (Liberty) | qemu-kvm-rhev | Not affected |
Red Hat OpenStack Platform 14 | qemu-kvm-rhev | Not affected |
Red Hat OpenStack Platform 13.0 (Queens) | qemu-kvm-rhev | Not affected |
Red Hat OpenStack Platform 12.0 | qemu-kvm-rhev | Not affected |
Red Hat OpenStack Platform 10 | qemu-kvm-rhev | Not affected |
Red Hat Enterprise Linux 7 | qemu-kvm | Not affected |
Red Hat Enterprise Linux 7 | qemu-kvm-rhev | Not affected |
Red Hat Enterprise Linux 7 | qemu-kvm-ma | Not affected |
Red Hat Enterprise Linux 6 | qemu-kvm | Not affected |
Red Hat Enterprise Linux 5 | kvm | Not affected |