Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-16847

Опубликовано: 02 нояб. 2018
Источник: debian
EPSS Низкий

Описание

An OOB heap buffer r/w access issue was found in the NVM Express Controller emulation in QEMU. It could occur in nvme_cmb_ops routines in nvme device. A guest user/process could use this flaw to crash the QEMU process resulting in DoS or potentially run arbitrary code with privileges of the QEMU process.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
qemufixed1:3.1+dfsg-1package
qemunot-affectedstretchpackage
qemunot-affectedjessiepackage
qemu-kvmnot-affectedpackage

Примечания

  • https://lists.gnu.org/archive/html/qemu-devel/2018-11/msg00200.html

  • https://git.qemu.org/?p=qemu.git;a=commit;h=87ad860c622cc8f8916b5232bd8728c08f938fce

EPSS

Процентиль: 30%
0.00109
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 6 лет назад

An OOB heap buffer r/w access issue was found in the NVM Express Controller emulation in QEMU. It could occur in nvme_cmb_ops routines in nvme device. A guest user/process could use this flaw to crash the QEMU process resulting in DoS or potentially run arbitrary code with privileges of the QEMU process.

CVSS3: 7
redhat
больше 6 лет назад

An OOB heap buffer r/w access issue was found in the NVM Express Controller emulation in QEMU. It could occur in nvme_cmb_ops routines in nvme device. A guest user/process could use this flaw to crash the QEMU process resulting in DoS or potentially run arbitrary code with privileges of the QEMU process.

CVSS3: 7.8
nvd
больше 6 лет назад

An OOB heap buffer r/w access issue was found in the NVM Express Controller emulation in QEMU. It could occur in nvme_cmb_ops routines in nvme device. A guest user/process could use this flaw to crash the QEMU process resulting in DoS or potentially run arbitrary code with privileges of the QEMU process.

suse-cvrf
больше 6 лет назад

Security update for qemu

suse-cvrf
больше 6 лет назад

Security update for qemu

EPSS

Процентиль: 30%
0.00109
Низкий