First published: Tue Jun 05 2018(Updated: )
A heap buffer overflow issue was found in the way Slirp networking back-end in QEMU processes fragmented packets. It could occur while reassembling the fragmented datagrams of an incoming packet. A privileged user/process inside guest could use this flaw to crash the QEMU process resulting in DoS OR potentially leverage it to execute arbitrary code on the host with privileges of the QEMU process. Upstream patch: --------------- -> <a href="https://lists.gnu.org/archive/html/qemu-devel/2018-06/msg01012.html">https://lists.gnu.org/archive/html/qemu-devel/2018-06/msg01012.html</a> Reference: ---------- -> <a href="http://www.openwall.com/lists/oss-security/2018/06/07/1">http://www.openwall.com/lists/oss-security/2018/06/07/1</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU qemu | ||
debian/qemu | 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u7 1:9.0.2+ds-2 1:9.1.0+ds-3 | |
QEMU qemu | <=2.12.1 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =18.10 | |
Redhat Openstack | =8 | |
Redhat Openstack | =9 | |
Redhat Openstack | =10 | |
Redhat Openstack | =12 | |
Redhat Openstack | =13 | |
Redhat Enterprise Linux Desktop | =6.0 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Eus | =7.5 | |
Redhat Enterprise Linux Eus | =7.6 | |
Redhat Enterprise Linux Eus | =7.7 | |
Redhat Enterprise Linux Server | =6.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Server Aus | =7.6 | |
Redhat Enterprise Linux Server Aus | =7.7 | |
Redhat Enterprise Linux Server Tus | =7.6 | |
Redhat Enterprise Linux Server Tus | =7.7 | |
Redhat Enterprise Linux Workstation | =6.0 | |
Redhat Enterprise Linux Workstation | =7.0 | |
Redhat Virtualization | =4.0 | |
Red Hat Enterprise Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
All of | ||
Redhat Virtualization | =4.0 | |
Red Hat Enterprise Linux | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-11806 is high (8.2).
An attacker must first obtain the ability to execute code on the guest OS in order to exploit CVE-2018-11806.
Qemu versions 1:2.11+dfsg-1ubuntu7.8, 2.0.0+dfsg-2ubuntu1.44, and 1:2.5+dfsg-5ubuntu10.33 are affected by CVE-2018-11806.
To fix CVE-2018-11806, update Qemu to version 1:3.1+dfsg-8+deb10u8 or later if using Debian, or version 1:2.11+dfsg-1ubuntu7.8 or later if using Ubuntu.
You can find more information about CVE-2018-11806 at the following references: [1](https://lists.gnu.org/archive/html/qemu-devel/2018-06/msg01012.html), [2](http://www.openwall.com/lists/oss-security/2018/06/07/1), [3](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1586249).