Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-13362

Опубликовано: 28 мая 2020
Источник: debian

Описание

In QEMU 5.0.0 and earlier, megasas_lookup_frame in hw/scsi/megasas.c has an out-of-bounds read via a crafted reply_queue_head field from a guest OS user.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
qemufixed1:5.0-6package

Примечания

  • https://lists.gnu.org/archive/html/qemu-devel/2020-05/msg03463.html

Связанные уязвимости

CVSS3: 3.2
ubuntu
больше 5 лет назад

In QEMU 5.0.0 and earlier, megasas_lookup_frame in hw/scsi/megasas.c has an out-of-bounds read via a crafted reply_queue_head field from a guest OS user.

CVSS3: 3.2
redhat
больше 5 лет назад

In QEMU 5.0.0 and earlier, megasas_lookup_frame in hw/scsi/megasas.c has an out-of-bounds read via a crafted reply_queue_head field from a guest OS user.

CVSS3: 3.2
nvd
больше 5 лет назад

In QEMU 5.0.0 and earlier, megasas_lookup_frame in hw/scsi/megasas.c has an out-of-bounds read via a crafted reply_queue_head field from a guest OS user.

CVSS3: 3.2
msrc
около 5 лет назад

Описание отсутствует

CVSS3: 3.2
github
больше 3 лет назад

In QEMU 4.2.0, megasas_lookup_frame in hw/scsi/megasas.c has an out-of-bounds read via a crafted reply_queue_head field from a guest OS user.