Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-11102

Опубликовано: 06 апр. 2020
Источник: debian

Описание

hw/net/tulip.c in QEMU 4.2.0 has a buffer overflow during the copying of tx/rx buffers because the frame size is not validated against the r/w data length.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
qemufixed1:4.2-4package
qemunot-affectedbusterpackage
qemunot-affectedstretchpackage
qemunot-affectedjessiepackage
qemu-kvmnot-affectedpackage

Примечания

  • https://www.openwall.com/lists/oss-security/2020/04/06/1

  • https://git.qemu.org/?p=qemu.git;a=commit;h=8ffb7265af64ec81748335ec8f20e7ab542c3850 (v5.0.0-rc1)

Связанные уязвимости

CVSS3: 5.6
ubuntu
больше 5 лет назад

hw/net/tulip.c in QEMU 4.2.0 has a buffer overflow during the copying of tx/rx buffers because the frame size is not validated against the r/w data length.

CVSS3: 5.6
redhat
больше 5 лет назад

hw/net/tulip.c in QEMU 4.2.0 has a buffer overflow during the copying of tx/rx buffers because the frame size is not validated against the r/w data length.

CVSS3: 5.6
nvd
больше 5 лет назад

hw/net/tulip.c in QEMU 4.2.0 has a buffer overflow during the copying of tx/rx buffers because the frame size is not validated against the r/w data length.

CVSS3: 5.6
msrc
почти 5 лет назад

Описание отсутствует

github
около 3 лет назад

hw/net/tulip.c in QEMU 4.2.0 has a buffer overflow during the copying of tx/rx buffers because the frame size is not validated against the r/w data length.