Bug 1660372 (CVE-2018-20124) - CVE-2018-20124 QEMU: rdma: OOB access when building scatter-gather array
Summary: CVE-2018-20124 QEMU: rdma: OOB access when building scatter-gather array
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2018-20124
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1660373
Blocks: 1649132
TreeView+ depends on / blocked
 
Reported: 2018-12-18 08:46 UTC by Prasad Pandit
Modified: 2021-02-16 22:39 UTC (History)
0 users

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2018-12-20 05:18:18 UTC
Embargoed:


Attachments (Terms of Use)

Description Prasad Pandit 2018-12-18 08:46:08 UTC
An out-of-bound stack buffer r/w access issue was found in QEMU's generic
RDMA back-end implementation. It could occur when a driver tries to build
scatter/gather element's array in build_host_sge_array() routine.

A guest user/process could use this flaw to crash the QEMU process
resulting in DoS.

Upstream patch:
---------------
  -> https://lists.gnu.org/archive/html/qemu-devel/2018-12/msg02822.html

Reference:
----------
  -> https://www.openwall.com/lists/oss-security/2018/12/18/2

Comment 1 Prasad Pandit 2018-12-18 08:46:12 UTC
Acknowledgments:

Name: Saar Amar

Comment 2 Prasad Pandit 2018-12-18 08:46:24 UTC
Created qemu tracking bugs for this issue:

Affects: fedora-all [bug 1660373]


Note You need to log in before you can comment on or make changes to this bug.