First published: Thu Jun 21 2018(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/qemu | 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u7 1:9.0.2+ds-2 1:9.1.0+ds-3 | |
QEMU KVM | <=2.12.50 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =18.10 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-12617 is a vulnerability in QEMU Guest Agent (qemu-ga) in QEMU 2.12.50 that allows an integer overflow, leading to a segmentation fault upon attempting to allocate a large memory chunk.
The severity of CVE-2018-12617 is high with a CVSS score of 7.5.
CVE-2018-12617 affects QEMU 2.12.50, causing a segmentation fault due to an integer overflow when trying to allocate a large memory chunk.
CVE-2018-12617 can be exploited by sending a crafted payload to QEMU Guest Agent, triggering the integer overflow and causing a segmentation fault.
Yes, there are remedies available for CVE-2018-12617. Please refer to the provided references for more information.