Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-20191

Опубликовано: 20 дек. 2018
Источник: debian
EPSS Низкий

Описание

hw/rdma/vmw/pvrdma_main.c in QEMU does not implement a read operation (such as uar_read by analogy to uar_write), which allows attackers to cause a denial of service (NULL pointer dereference).

Пакеты

ПакетСтатусВерсия исправленияРелизТип
qemufixed1:4.1-1package
qemunot-affectedstretchpackage
qemunot-affectedjessiepackage
qemu-kvmremovedpackage

Примечания

  • https://lists.gnu.org/archive/html/qemu-devel/2018-12/msg03066.html

  • PVRDMA support not enabled in the binary packages until 1:3.1+dfsg-3, disabled again in 1:3.1+dfsg-4

EPSS

Процентиль: 81%
0.01625
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 6 лет назад

hw/rdma/vmw/pvrdma_main.c in QEMU does not implement a read operation (such as uar_read by analogy to uar_write), which allows attackers to cause a denial of service (NULL pointer dereference).

CVSS3: 3.8
redhat
больше 6 лет назад

hw/rdma/vmw/pvrdma_main.c in QEMU does not implement a read operation (such as uar_read by analogy to uar_write), which allows attackers to cause a denial of service (NULL pointer dereference).

CVSS3: 7.5
nvd
больше 6 лет назад

hw/rdma/vmw/pvrdma_main.c in QEMU does not implement a read operation (such as uar_read by analogy to uar_write), which allows attackers to cause a denial of service (NULL pointer dereference).

CVSS3: 7.5
github
около 3 лет назад

hw/rdma/vmw/pvrdma_main.c in QEMU does not implement a read operation (such as uar_read by analogy to uar_write), which allows attackers to cause a denial of service (NULL pointer dereference).

CVSS3: 7.5
fstec
больше 6 лет назад

Уязвимость функций uar_read и uar_write виртуального сетевого адаптера PVRDMA эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 81%
0.01625
Низкий