First published: Thu Mar 08 2018(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU KVM | <=2.11.2 | |
openSUSE | =42.3 | |
redhat enterprise Linux desktop | =6.0 | |
redhat enterprise Linux desktop | =7.0 | |
redhat enterprise Linux server | =6.0 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux server aus | =7.6 | |
redhat enterprise Linux server eus | =7.5 | |
redhat enterprise Linux server eus | =7.6 | |
redhat enterprise Linux server tus | =7.6 | |
redhat enterprise Linux workstation | =6.0 | |
redhat enterprise Linux workstation | =7.0 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =18.04 | |
Ubuntu Linux | =18.10 | |
debian/qemu | 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u12 1:9.2.0+ds-5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-7858 has a medium severity level as it can cause a denial of service due to a crash.
To fix CVE-2018-7858, update QEMU to a version later than 2.11.2 that doesn't include the vulnerability.
CVE-2018-7858 affects QEMU with Cirrus CLGD 54xx VGA Emulator support on various distributions, specifically versions up to 2.11.2.
CVE-2018-7858 is not remotely exploitable as it requires local guest OS privileged user access to trigger the vulnerability.
There are no known workarounds for CVE-2018-7858; upgrading to a patched version is the recommended course of action.