First published: Sun Mar 17 2019(Updated: )
In Qemu 3.0.0, lsi_do_msgin in hw/scsi/lsi53c895a.c allows out-of-bounds access by triggering an invalid msg_len value.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU qemu | =3.0.0 | |
openSUSE Leap | =15.0 | |
openSUSE Leap | =42.3 | |
Fedoraproject Fedora | =29 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =18.10 | |
debian/qemu | 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u7 1:9.0.2+ds-2 1:9.1.0+ds-3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2018-18849.
CVE-2018-18849 has a severity level of medium (5.5).
CVE-2018-18849 allows out-of-bounds access by triggering an invalid msg_len value in lsi_do_msgin in hw/scsi/lsi53c895a.c.
CVE-2018-18849 affects Qemu 3.0.0.
Yes, there are specific package versions that provide remedies for CVE-2018-18849.