SB2018051026 - Red Hat update for QEMU
Published: May 10, 2018 Updated: May 14, 2018
Security Bulletin ID
SB2018051026
Severity
Medium
Patch available
YES
Number of vulnerabilities
2
Exploitation vector
Adjecent network
Highest impact
Code execution
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Memory corruption (CVE-ID: CVE-2018-7550)
The vulnerability allows an adjacent attacker to execute arbitrary code on the target system.The weakness exists in the load_multiboot function due to out-of-bounds read or write. An adjacent attacker can load a kernel image during the boot process, which may cause the mh_load_end_addr address to be greater than the mh_bss_end_addr address, trigger memory corruption and execute arbitrary code.
Successful exploitation of the vulnerability may result in system compromise.
2) Out-of-bounds read (CVE-ID: CVE-2018-7858)
The vulnerability allows an adjacent attacker to cause DoS condition on the target system.The weakness exists due to improper VGA display updates. An adjacent attacker can use incorrect region calculations during VGA display updates, trigger out-of-bounds read and cause the service to crash.
Remediation
Install update from vendor's website.