First published: Fri Jan 11 2019(Updated: )
An out of bounds r/w access issue was found in the way QEMU handled inquiry request coming from a guest in scsi_handle_inquiry_reply(). A guest user/process could use this flaw to corrupt byte of QEMU process memory. Upstream patch: --------------- -> <a href="https://lists.gnu.org/archive/html/qemu-devel/2019-01/msg02324.html">https://lists.gnu.org/archive/html/qemu-devel/2019-01/msg02324.html</a> Reference: ---------- -> <a href="https://www.openwall.com/lists/oss-security/2019/01/24/1">https://www.openwall.com/lists/oss-security/2019/01/24/1</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/qemu-kvm-ma | <10:2.12.0-33.el7 | 10:2.12.0-33.el7 |
redhat/qemu-kvm-rhev | <10:2.12.0-33.el7 | 10:2.12.0-33.el7 |
QEMU KVM | =3.1 | |
Fedora | =30 | |
Fedoraproject Fedora | =30 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)