Qemu emulator <= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS.
References
Link | Resource |
---|---|
https://access.redhat.com/errata/RHSA-2019:2892 | |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10839 | Issue Tracking Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html | Third Party Advisory |
https://lists.gnu.org/archive/html/qemu-devel/2018-09/msg03273.html | Exploit Mailing List Third Party Advisory |
https://usn.ubuntu.com/3826-1/ | Patch Vendor Advisory |
https://www.debian.org/security/2018/dsa-4338 | Vendor Advisory |
https://www.openwall.com/lists/oss-security/2018/10/08/1 | Mailing List Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: redhat
Published: 2018-10-16T14:00:00
Updated: 2019-09-24T15:06:17
Reserved: 2018-05-09T00:00:00
Link: CVE-2018-10839
JSON object: View
NVD Information
Status : Modified
Published: 2018-10-16T14:29:01.197
Modified: 2023-02-13T04:50:18.723
Link: CVE-2018-10839
JSON object: View
Redhat Information
No data.