Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-13361

Опубликовано: 28 мая 2020
Источник: debian
EPSS Низкий

Описание

In QEMU 5.0.0 and earlier, es1370_transfer_audio in hw/audio/es1370.c does not properly validate the frame count, which allows guest OS users to trigger an out-of-bounds access during an es1370_write() operation.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
qemufixed1:5.0-6package

Примечания

  • https://lists.gnu.org/archive/html/qemu-devel/2020-05/msg07230.html

EPSS

Процентиль: 27%
0.00098
Низкий

Связанные уязвимости

CVSS3: 3.9
ubuntu
больше 5 лет назад

In QEMU 5.0.0 and earlier, es1370_transfer_audio in hw/audio/es1370.c does not properly validate the frame count, which allows guest OS users to trigger an out-of-bounds access during an es1370_write() operation.

CVSS3: 3.9
redhat
больше 5 лет назад

In QEMU 5.0.0 and earlier, es1370_transfer_audio in hw/audio/es1370.c does not properly validate the frame count, which allows guest OS users to trigger an out-of-bounds access during an es1370_write() operation.

CVSS3: 3.9
nvd
больше 5 лет назад

In QEMU 5.0.0 and earlier, es1370_transfer_audio in hw/audio/es1370.c does not properly validate the frame count, which allows guest OS users to trigger an out-of-bounds access during an es1370_write() operation.

CVSS3: 3.9
msrc
больше 5 лет назад

In QEMU 5.0.0 and earlier es1370_transfer_audio in hw/audio/es1370.c does not properly validate the frame count which allows guest OS users to trigger an out-of-bounds access during an es1370_write() operation.

CVSS3: 3.9
github
больше 3 лет назад

In QEMU 4.2.0, es1370_transfer_audio in hw/audio/es1370.c does not properly validate the frame count, which allows guest OS users to trigger an out-of-bounds access during an es1370_write() operation.

EPSS

Процентиль: 27%
0.00098
Низкий