CVE-2018-16847

Related Vulnerabilities: CVE-2018-16847  

An out-of-bounds heap buffer r/w access issue was found in the NVM Express Controller emulation in QEMU. It could occur in nvme_cmb_ops routines in a nvme device. A guest user/process could use this flaw to crash the QEMU process resulting in denial of service or, potentially, run arbitrary code with privileges of the QEMU process.

An out-of-bounds heap buffer r/w access issue was found in the NVM Express Controller emulation in QEMU. It could occur in nvme_cmb_ops routines in a nvme device. A guest user/process could use this flaw to crash the QEMU process resulting in denial of service or, potentially, run arbitrary code with privileges of the QEMU process.

Find out more about CVE-2018-16847 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v3 metrics

NOTE: The following CVSS v3 metrics and score provided are preliminary and subject to review.

CVSS3 Base Score 7
CVSS3 Base Metrics CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H
Attack Vector Local
Attack Complexity High
Privileges Required Low
User Interaction None
Scope Changed
Confidentiality Low
Integrity Impact Low
Availability Impact High

Affected Packages State

Platform Package State
Red Hat OpenStack Platform 9.0 qemu-kvm-rhev Not affected
Red Hat OpenStack Platform 8.0 (Liberty) qemu-kvm-rhev Not affected
Red Hat OpenStack Platform 14 qemu-kvm-rhev Not affected
Red Hat OpenStack Platform 13.0 (Queens) qemu-kvm-rhev Not affected
Red Hat OpenStack Platform 12.0 qemu-kvm-rhev Not affected
Red Hat OpenStack Platform 10 qemu-kvm-rhev Not affected
Red Hat Enterprise Linux 7 qemu-kvm Not affected
Red Hat Enterprise Linux 7 qemu-kvm-rhev Not affected
Red Hat Enterprise Linux 7 qemu-kvm-ma Not affected
Red Hat Enterprise Linux 6 qemu-kvm Not affected
Red Hat Enterprise Linux 5 kvm Not affected

Acknowledgements

Red Hat would like to thank Li Qiang for reporting this issue.

External References