Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-20808

Опубликовано: 31 дек. 2020
Источник: debian
EPSS Низкий

Описание

In QEMU 4.1.0, an out-of-bounds read flaw was found in the ATI VGA implementation. It occurs in the ati_cursor_define() routine while handling MMIO write operations through the ati_mm_write() callback. A malicious guest could abuse this flaw to crash the QEMU process, resulting in a denial of service.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
qemufixed1:4.2-1package
qemunot-affectedbusterpackage
qemunot-affectedstretchpackage
qemunot-affectedjessiepackage

Примечания

  • https://git.qemu.org/?p=qemu.git;a=commit;h=aab0e2a661b2b6bf7915c0aefe807fb60d6d9d13 (v4.2.0-rc0)

EPSS

Процентиль: 30%
0.00105
Низкий

Связанные уязвимости

CVSS3: 6.5
ubuntu
больше 4 лет назад

In QEMU 4.1.0, an out-of-bounds read flaw was found in the ATI VGA implementation. It occurs in the ati_cursor_define() routine while handling MMIO write operations through the ati_mm_write() callback. A malicious guest could abuse this flaw to crash the QEMU process, resulting in a denial of service.

CVSS3: 2.8
redhat
почти 6 лет назад

In QEMU 4.1.0, an out-of-bounds read flaw was found in the ATI VGA implementation. It occurs in the ati_cursor_define() routine while handling MMIO write operations through the ati_mm_write() callback. A malicious guest could abuse this flaw to crash the QEMU process, resulting in a denial of service.

CVSS3: 6.5
nvd
больше 4 лет назад

In QEMU 4.1.0, an out-of-bounds read flaw was found in the ATI VGA implementation. It occurs in the ati_cursor_define() routine while handling MMIO write operations through the ati_mm_write() callback. A malicious guest could abuse this flaw to crash the QEMU process, resulting in a denial of service.

github
около 3 лет назад

In QEMU 4.1.0, an out-of-bounds read flaw was found in the ATI VGA implementation. It occurs in the ati_cursor_define() routine while handling MMIO write operations through the ati_mm_write() callback. A malicious guest could abuse this flaw to crash the QEMU process, resulting in a denial of service.

oracle-oval
больше 4 лет назад

ELSA-2021-9109: qemu security update (IMPORTANT)

EPSS

Процентиль: 30%
0.00105
Низкий