First published: Thu Dec 20 2018(Updated: )
hw/rdma/vmw/pvrdma_main.c in QEMU does not implement a read operation (such as uar_read by analogy to uar_write), which allows attackers to cause a denial of service (NULL pointer dereference).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/qemu | 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u7 1:9.1.2+ds-1 1:9.2.0+ds-2 | |
QEMU KVM | <=3.1.0 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =18.10 | |
Fedora | =29 | |
Fedora | =30 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-20191 is categorized as a denial of service vulnerability due to a NULL pointer dereference.
To resolve CVE-2018-20191, update QEMU to a version that addresses this vulnerability, such as those specified in the remedy list.
CVE-2018-20191 affects QEMU versions up to 3.1.0, including specific Debian and Ubuntu releases listed in the vulnerability details.
CVE-2018-20191 can be exploited by attackers to cause a denial of service, potentially without requiring local access.
Systems running vulnerable versions of QEMU on Debian and Ubuntu, as well as specific Fedora versions, are affected by CVE-2018-20191.