Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-13362

Опубликовано: 28 мая 2020
Источник: debian
EPSS Низкий

Описание

In QEMU 5.0.0 and earlier, megasas_lookup_frame in hw/scsi/megasas.c has an out-of-bounds read via a crafted reply_queue_head field from a guest OS user.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
qemufixed1:5.0-6package

Примечания

  • https://lists.gnu.org/archive/html/qemu-devel/2020-05/msg03463.html

EPSS

Процентиль: 29%
0.00103
Низкий

Связанные уязвимости

CVSS3: 3.2
ubuntu
около 5 лет назад

In QEMU 5.0.0 and earlier, megasas_lookup_frame in hw/scsi/megasas.c has an out-of-bounds read via a crafted reply_queue_head field from a guest OS user.

CVSS3: 3.2
redhat
около 5 лет назад

In QEMU 5.0.0 and earlier, megasas_lookup_frame in hw/scsi/megasas.c has an out-of-bounds read via a crafted reply_queue_head field from a guest OS user.

CVSS3: 3.2
nvd
около 5 лет назад

In QEMU 5.0.0 and earlier, megasas_lookup_frame in hw/scsi/megasas.c has an out-of-bounds read via a crafted reply_queue_head field from a guest OS user.

CVSS3: 3.2
msrc
почти 5 лет назад

Описание отсутствует

CVSS3: 3.2
github
около 3 лет назад

In QEMU 4.2.0, megasas_lookup_frame in hw/scsi/megasas.c has an out-of-bounds read via a crafted reply_queue_head field from a guest OS user.

EPSS

Процентиль: 29%
0.00103
Низкий