Source: qemu Version: 1:2.11+dfsg-1 Severity: important Tags: patch security upstream
Hi, the following vulnerability was published for qemu. CVE-2018-7550[0]: | The load_multiboot function in hw/i386/multiboot.c in Quick Emulator | (aka QEMU) allows local guest OS users to execute arbitrary code on | the QEMU host via a mh_load_end_addr value greater than | mh_bss_end_addr, which triggers an out-of-bounds read or write memory | access. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2018-7550 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550 [1] https://bugzilla.redhat.com/show_bug.cgi?id=1549798 [2] https://lists.gnu.org/archive/html/qemu-devel/2018-02/msg06890.html Please adjust the affected versions in the BTS as needed. Regards, Salvatore