First published: Fri Oct 19 2018(Updated: )
Qemu has integer overflows because IOReadHandler and its associated functions use a signed integer data type for a size value.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/qemu | 1:3.1+dfsg-8+deb10u8 1:3.1+dfsg-8+deb10u11 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u3 1:8.1.2+ds-1 1:8.2.0+ds-1 | |
QEMU KVM | ||
Red Hat Enterprise Linux | =6.0 | |
Red Hat Enterprise Linux | =7.0 | |
Red Hat OpenStack for IBM Power | =8 | |
Red Hat OpenStack for IBM Power | =9 | |
Red Hat OpenStack for IBM Power | =10 | |
Red Hat OpenStack for IBM Power | =12 | |
Red Hat OpenStack for IBM Power | =13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-18438 has a moderate severity rating due to potential integer overflow vulnerabilities in QEMU.
To fix CVE-2018-18438, upgrade to a patched version of QEMU as specified by your operating system vendor.
CVE-2018-18438 affects multiple versions of QEMU and various Red Hat and OpenStack products.
The potential impacts of CVE-2018-18438 include application crashes and possible remote code execution due to the integer overflow.
Currently, the most effective workaround for CVE-2018-18438 is to disable the affected features of QEMU until a fix can be applied.