First published: Wed Sep 26 2018(Updated: )
An integer overflow issue was found in the AMD PC-Net II NIC emulation in QEMU. It could occur while receiving packets, if the size value was greater than INT_MAX. Such overflow would lead to stack buffer overflow issue. A user inside guest could use this flaw to crash the QEMU process resulting in DoS.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/qemu-kvm | <2:0.12.1.2-2.506.el6_10.5 | 2:0.12.1.2-2.506.el6_10.5 |
debian/qemu | <=1:2.8+dfsg-6<=1:2.12+dfsg-3 | 1:2.8+dfsg-6+deb9u5 1:3.1+dfsg-1 |
QEMU qemu | =2.1.0 | |
QEMU qemu | =2.8.0 | |
QEMU qemu | =2.12.0 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =18.10 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Oracle Linux | =7-0 | |
Redhat Linux | =6.0 | |
SUSE Linux Enterprise Server | =11-sp3 | |
SUSE Linux Enterprise Server | =11-sp4 | |
SUSE Linux Enterprise Server | =12 | |
SUSE Linux Enterprise Server | =15 | |
debian/qemu | 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u7 1:9.0.2+ds-2 1:9.1.0+ds-3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2018-17962.
The severity of CVE-2018-17962 is high with a CVSS score of 7.5.
The software affected by CVE-2018-17962 includes QEMU versions 2.0.0 to 2.12.0, qemu-kvm version 2:0.12.1.2-2.506.el6_10.5, and various versions of QEMU in Debian and Ubuntu distributions.
To fix the vulnerability in QEMU, you should update to version 2.12.1 or later.
Yes, you can find references for CVE-2018-17962 at the following links: [Link 1](https://lists.gnu.org/archive/html/qemu-devel/2018-09/msg03268.html), [Link 2](https://www.openwall.com/lists/oss-security/2018/10/08/1), [Link 3](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1636775).