Qemu emulator <= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 03:42
Type | Values Removed | Values Added |
---|---|---|
References | () https://access.redhat.com/errata/RHSA-2019:2892 - | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10839 - Issue Tracking, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html - Third Party Advisory | |
References | () https://lists.gnu.org/archive/html/qemu-devel/2018-09/msg03273.html - Exploit, Mailing List, Third Party Advisory | |
References | () https://usn.ubuntu.com/3826-1/ - Patch, Vendor Advisory | |
References | () https://www.debian.org/security/2018/dsa-4338 - Vendor Advisory | |
References | () https://www.openwall.com/lists/oss-security/2018/10/08/1 - Mailing List, Third Party Advisory |
Information
Published : 2018-10-16 14:29
Updated : 2024-11-21 03:42
NVD link : CVE-2018-10839
Mitre link : CVE-2018-10839
CVE.ORG link : CVE-2018-10839
JSON object : View
Products Affected
canonical
- ubuntu_linux
debian
- debian_linux
qemu
- qemu