First published: Wed Mar 27 2019(Updated: )
A heap buffer overflow issue was found in the load_device_tree() function of QEMU, which is invoked to load device tree blob at boot time. It occurs due to device tree size manipulation before buffer allocation, which could overflow a signed int type. A user/process could use this flaw to potentially execute arbitrary code on a host system with privileges of the QEMU process. Upstream patch: --------------- -> <a href="https://git.qemu.org/?p=qemu.git;a=commitdiff;h=da885fe1ee8b4589047484bd7fa05a4905b52b17">https://git.qemu.org/?p=qemu.git;a=commitdiff;h=da885fe1ee8b4589047484bd7fa05a4905b52b17</a> -> <a href="https://git.qemu.org/?p=qemu.git;a=commitdiff;h=065e6298a75164b4347682b63381dbe752c2b156">https://git.qemu.org/?p=qemu.git;a=commitdiff;h=065e6298a75164b4347682b63381dbe752c2b156</a> Reference: ---------- -> <a href="https://www.openwall.com/lists/oss-security/2019/03/27/1">https://www.openwall.com/lists/oss-security/2019/03/27/1</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU KVM | =3.1.0 | |
debian/qemu | 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u12 1:9.2.0+ds-5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2018-20815.
CVE-2018-20815 has a severity rating of high.
Various versions of QEMU are affected, including 1:2.11+dfsg-1ubuntu7.13, 1:2.12+dfsg-3ubuntu8.7, 1:3.1+dfsg-2ubuntu4, and more.
To fix CVE-2018-20815, update to a version of QEMU that includes the necessary security patches, such as 1:2.11+dfsg-1ubuntu7.13 or 1:2.12+dfsg-3ubuntu8.7.
More information about CVE-2018-20815 can be found in the references provided, including the commitdiff links and the OSS Security mailing list.