In Qemu 3.0.0, lsi_do_msgin in hw/scsi/lsi53c895a.c allows out-of-bounds access by triggering an invalid msg_len value.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
21 Nov 2024, 03:56
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2018-12/msg00004.html - Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2018-12/msg00028.html - Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2018-12/msg00043.html - Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2018/11/01/1 - Mailing List, Patch, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2019/05/msg00010.html - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LQIBTGNRDQEXGAAYHE4JIWFAYFNHZ6QP/ - | |
References | () https://lists.gnu.org/archive/html/qemu-devel/2018-10/msg06401.html - Patch, Third Party Advisory | |
References | () https://seclists.org/bugtraq/2019/May/76 - | |
References | () https://security.netapp.com/advisory/ntap-20190411-0006/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/3826-1/ - Third Party Advisory | |
References | () https://www.debian.org/security/2019/dsa-4454 - |
07 Nov 2023, 02:55
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2019-03-21 16:00
Updated : 2024-11-21 03:56
NVD link : CVE-2018-18849
Mitre link : CVE-2018-18849
CVE.ORG link : CVE-2018-18849
JSON object : View
Products Affected
opensuse
- leap
canonical
- ubuntu_linux
fedoraproject
- fedora
qemu
- qemu
CWE
CWE-125
Out-of-bounds Read