Out-of-bounds Read The advisory has been revoked - it doesn't affect any version of package qemu  (opens in a new tab)


Threat Intelligence

EPSS
0.06% (28th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN9-QEMU-605809
  • published19 Dec 2018
  • disclosed20 Dec 2018

Introduced: 19 Dec 2018

CVE-2018-20124  (opens in a new tab)
CWE-125  (opens in a new tab)

Amendment

The Debian security team deemed this advisory irrelevant for Debian:9.

NVD Description

Note: Versions mentioned in the description apply only to the upstream qemu package and not the qemu package as distributed by Debian.

hw/rdma/rdma_backend.c in QEMU allows guest OS users to trigger out-of-bounds access via a PvrdmaSqWqe ring element with a large num_sge value.