Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-wv4v-cwg3-f8c9

Опубликовано: 13 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 4.4

Описание

The mptsas_process_scsi_io_request function in QEMU (aka Quick Emulator), when built with LSI SAS1068 Host Bus emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors involving MPTSASRequest objects.

The mptsas_process_scsi_io_request function in QEMU (aka Quick Emulator), when built with LSI SAS1068 Host Bus emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors involving MPTSASRequest objects.

EPSS

Процентиль: 34%
0.00141
Низкий

4.4 Medium

CVSS3

Связанные уязвимости

CVSS3: 4.4
ubuntu
больше 9 лет назад

The mptsas_process_scsi_io_request function in QEMU (aka Quick Emulator), when built with LSI SAS1068 Host Bus emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors involving MPTSASRequest objects.

CVSS3: 4.4
redhat
больше 9 лет назад

The mptsas_process_scsi_io_request function in QEMU (aka Quick Emulator), when built with LSI SAS1068 Host Bus emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors involving MPTSASRequest objects.

CVSS3: 4.4
nvd
больше 9 лет назад

The mptsas_process_scsi_io_request function in QEMU (aka Quick Emulator), when built with LSI SAS1068 Host Bus emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors involving MPTSASRequest objects.

CVSS3: 4.4
debian
больше 9 лет назад

The mptsas_process_scsi_io_request function in QEMU (aka Quick Emulato ...

EPSS

Процентиль: 34%
0.00141
Низкий

4.4 Medium

CVSS3