Описание
hw/input/ps2.c in Qemu does not validate 'rptr' and 'count' values during guest migration, leading to out-of-bounds access.
hw/input/ps2.c in Qemu does not validate 'rptr' and 'count' values during guest migration, leading to out-of-bounds access.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2017-16845
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
- https://lists.gnu.org/archive/html/qemu-devel/2017-11/msg02982.html
- https://usn.ubuntu.com/3575-1
- https://usn.ubuntu.com/3649-1
- https://www.debian.org/security/2018/dsa-4213
- http://www.securityfocus.com/bid/101923
Связанные уязвимости
hw/input/ps2.c in Qemu does not validate 'rptr' and 'count' values during guest migration, leading to out-of-bounds access.
hw/input/ps2.c in Qemu does not validate 'rptr' and 'count' values during guest migration, leading to out-of-bounds access.
hw/input/ps2.c in Qemu does not validate 'rptr' and 'count' values during guest migration, leading to out-of-bounds access.
hw/input/ps2.c in Qemu does not validate 'rptr' and 'count' values dur ...
Уязвимость функции post_load (hw/input/ps2.c) эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю выполнить чтение за границами буфера в динамической памяти