Unrated severityNVD Advisory· Published Mar 1, 2018· Updated Aug 5, 2024
CVE-2018-7550
CVE-2018-7550
Description
The load_multiboot function in hw/i386/multiboot.c in Quick Emulator (aka QEMU) allows local guest OS users to execute arbitrary code on the QEMU host via a mh_load_end_addr value greater than mh_bss_end_addr, which triggers an out-of-bounds read or write memory access.
Affected products
23- osv-coords23 versionspkg:rpm/suse/kvm&distro=SUSE%20Linux%20Enterprise%20Point%20of%20Sale%2011%20SP3pkg:rpm/suse/kvm&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-LTSSpkg:rpm/suse/kvm&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-TERADATApkg:rpm/suse/kvm&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kvm&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP2pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP3pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Server%20for%20Raspberry%20Pi%2012%20SP2pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Point%20of%20Sale%2011%20SP3pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-LTSSpkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2011%20SP4pkg:rpm/suse/xen&distro=SUSE%20OpenStack%20Cloud%206
< 1.4.2-53.17.1+ 22 more
- (no CPE)range: < 1.4.2-53.17.1
- (no CPE)range: < 1.4.2-53.17.1
- (no CPE)range: < 1.4.2-53.17.1
- (no CPE)range: < 1.4.2-60.9.1
- (no CPE)range: < 1.4.2-60.9.1
- (no CPE)range: < 2.6.2-41.37.1
- (no CPE)range: < 2.9.1-6.12.1
- (no CPE)range: < 2.11.2-9.4.1
- (no CPE)range: < 2.11.2-9.4.1
- (no CPE)range: < 2.6.2-41.37.1
- (no CPE)range: < 2.9.1-6.12.1
- (no CPE)range: < 2.6.2-41.37.1
- (no CPE)range: < 2.6.2-41.37.1
- (no CPE)range: < 2.9.1-6.12.1
- (no CPE)range: < 4.2.5_21-45.22.1
- (no CPE)range: < 4.2.5_21-45.22.1
- (no CPE)range: < 4.4.4_30-61.26.1
- (no CPE)range: < 4.5.5_24-22.46.1
- (no CPE)range: < 4.4.4_30-22.65.1
- (no CPE)range: < 4.4.4_30-61.26.1
- (no CPE)range: < 4.5.5_24-22.46.1
- (no CPE)range: < 4.4.4_30-61.26.1
- (no CPE)range: < 4.5.5_24-22.46.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
11- access.redhat.com/errata/RHSA-2018:1369mitrevendor-advisory
- access.redhat.com/errata/RHSA-2018:2462mitrevendor-advisory
- usn.ubuntu.com/3649-1/mitrevendor-advisory
- www.debian.org/security/2018/dsa-4213mitrevendor-advisory
- www.securityfocus.com/bid/103181mitrevdb-entry
- lists.debian.org/debian-lts-announce/2018/04/msg00015.htmlmitremailing-list
- lists.debian.org/debian-lts-announce/2018/04/msg00016.htmlmitremailing-list
- lists.debian.org/debian-lts-announce/2018/09/msg00007.htmlmitremailing-list
- lists.gnu.org/archive/html/qemu-devel/2018-02/msg06890.htmlmitremailing-list
- bugzilla.redhat.com/show_bug.cgimitre
- github.com/orangecertcc/security-research/security/advisories/GHSA-f49v-45qp-cv53mitre
News mentions
0No linked articles in our index yet.