Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-hch7-9gh2-qf6g

Опубликовано: 05 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 7.8

Описание

A flaw was found in the way qemu v1.3.0 and later (virtio-rng) validates addresses when guest accesses the config space of a virtio device. If the virtio device has zero/small sized config space, such as virtio-rng, a privileged guest user could use this flaw to access the matching host's qemu address space and thus increase their privileges on the host.

A flaw was found in the way qemu v1.3.0 and later (virtio-rng) validates addresses when guest accesses the config space of a virtio device. If the virtio device has zero/small sized config space, such as virtio-rng, a privileged guest user could use this flaw to access the matching host's qemu address space and thus increase their privileges on the host.

EPSS

Процентиль: 22%
0.00074
Низкий

7.8 High

CVSS3

Дефекты

CWE-269

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 6 лет назад

A flaw was found in the way qemu v1.3.0 and later (virtio-rng) validates addresses when guest accesses the config space of a virtio device. If the virtio device has zero/small sized config space, such as virtio-rng, a privileged guest user could use this flaw to access the matching host's qemu address space and thus increase their privileges on the host.

redhat
почти 13 лет назад

A flaw was found in the way qemu v1.3.0 and later (virtio-rng) validates addresses when guest accesses the config space of a virtio device. If the virtio device has zero/small sized config space, such as virtio-rng, a privileged guest user could use this flaw to access the matching host's qemu address space and thus increase their privileges on the host.

CVSS3: 7.8
nvd
около 6 лет назад

A flaw was found in the way qemu v1.3.0 and later (virtio-rng) validates addresses when guest accesses the config space of a virtio device. If the virtio device has zero/small sized config space, such as virtio-rng, a privileged guest user could use this flaw to access the matching host's qemu address space and thus increase their privileges on the host.

CVSS3: 7.8
debian
около 6 лет назад

A flaw was found in the way qemu v1.3.0 and later (virtio-rng) validat ...

suse-cvrf
больше 11 лет назад

Security update for kvm

EPSS

Процентиль: 22%
0.00074
Низкий

7.8 High

CVSS3

Дефекты

CWE-269