Qemu emulator <= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS.
References
Link | Resource |
---|---|
https://www.openwall.com/lists/oss-security/2018/10/08/1 | Mailing List Third Party Advisory |
https://lists.gnu.org/archive/html/qemu-devel/2018-09/msg03273.html | Exploit Mailing List Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10839 | Issue Tracking Third Party Advisory |
https://www.debian.org/security/2018/dsa-4338 | Vendor Advisory |
https://usn.ubuntu.com/3826-1/ | Patch Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2019:2892 |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2018-10-16 07:29
Updated : 2023-02-12 20:50
NVD link : CVE-2018-10839
Mitre link : CVE-2018-10839
JSON object : View
CWE
CWE-121
Stack-based Buffer Overflow
Products Affected
debian
- debian_linux
canonical
- ubuntu_linux
qemu
- qemu