CVE-2018-20124

MEDIUM

QEMU - Memory Corruption

Title source: llm
STIX 2.1

Description

hw/rdma/rdma_backend.c in QEMU allows guest OS users to trigger out-of-bounds access via a PvrdmaSqWqe ring element with a large num_sge value.

References (4)

Core 4
Core References
Patch, Third Party Advisory mailing-list x_refsource_mlist
https://lists.gnu.org/archive/html/qemu-devel/2018-12/msg02822.html
Mailing List, Patch, Third Party Advisory mailing-list x_refsource_mlist
http://www.openwall.com/lists/oss-security/2018/12/18/2
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/106290
Third Party Advisory vendor-advisory x_refsource_ubuntu
https://usn.ubuntu.com/3923-1/

Scores

CVSS v3 5.5
EPSS 0.0015
EPSS Percentile 35.3%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Details

CWE
CWE-125
Status published
Products (5)
canonical/ubuntu_linux 14.04
canonical/ubuntu_linux 16.04
canonical/ubuntu_linux 18.04
canonical/ubuntu_linux 18.10
qemu/qemu < 3.1.0
Published Dec 20, 2018
Tracked Since Feb 18, 2026