Описание
In QEMU 3.1, scsi_handle_inquiry_reply in hw/scsi/scsi-generic.c allows out-of-bounds write and read operations.
Пакеты
Пакет | Статус | Версия исправления | Релиз | Тип |
---|---|---|---|---|
qemu | fixed | 1:3.1+dfsg-3 | package | |
qemu | not-affected | stretch | package | |
qemu | not-affected | jessie | package | |
qemu-kvm | removed | package |
Примечания
https://lists.gnu.org/archive/html/qemu-devel/2019-01/msg02324.html
Code introduced by https://git.qemu.org/?p=qemu.git;a=commit;h=6c219fc8a1 ,
but but the overflow was already possible before.
https://git.qemu.org/?p=qemu.git;a=commit;h=e909ff93698851777faac3c45d03c1b73f311ea6
Overflow introduced by https://git.qemu.org/?p=qemu.git;a=commit;h=a71c775b24,
vulnerability not present prior 2.12.50
EPSS
Связанные уязвимости
In QEMU 3.1, scsi_handle_inquiry_reply in hw/scsi/scsi-generic.c allows out-of-bounds write and read operations.
In QEMU 3.1, scsi_handle_inquiry_reply in hw/scsi/scsi-generic.c allows out-of-bounds write and read operations.
In QEMU 3.1, scsi_handle_inquiry_reply in hw/scsi/scsi-generic.c allows out-of-bounds write and read operations.
In QEMU 3.1, scsi_handle_inquiry_reply in hw/scsi/scsi-generic.c allows out-of-bounds write and read operations.
Уязвимость компонента hw/scsi/scsi-generic.c эмулятора аппаратного обеспечения QEMU, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю вызвать отказ в обслуживании
EPSS