CVE-2018-18438Integer Overflow or Wraparound in Redhat Enterprise Linux

Severity
5.5MEDIUMNVD
EPSS
0.1%
top 74.33%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 19
Latest updateMay 13

Description

Qemu has integer overflows because IOReadHandler and its associated functions use a signed integer data type for a size value.

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages2 packages

Debianqemu/qemu< 1:3.1+dfsg-1+3
NVDredhat/openstack5 versions+4

Also affects: Enterprise Linux 6.0, 7.0

Patches

🔴Vulnerability Details

3
GHSA
GHSA-5g5x-38wg-3rxr: Qemu has integer overflows because IOReadHandler and its associated functions use a signed integer data type for a size value2022-05-13
OSV
CVE-2018-18438: Qemu has integer overflows because IOReadHandler and its associated functions use a signed integer data type for a size value2018-10-19
CVEList
CVE-2018-18438: Qemu has integer overflows because IOReadHandler and its associated functions use a signed integer data type for a size value2018-10-19

📋Vendor Advisories

2
Red Hat
Qemu: Integer overflow in ccid_card_vscard_read() allows memory corruption2018-10-11
Debian
CVE-2018-18438: qemu - Qemu has integer overflows because IOReadHandler and its associated functions us...2018

💬Community

2
Bugzilla
CVE-2018-18438 qemu: Integer overflow in ccid_card_vscard_read() allows memory corruption [fedora-all]2018-10-17
Bugzilla
CVE-2018-18438 Qemu: Integer overflow in ccid_card_vscard_read() allows memory corruption2018-07-26
CVE-2018-18438 — Integer Overflow or Wraparound | cvebase