Описание
hw/input/ps2.c in Qemu does not validate 'rptr' and 'count' values during guest migration, leading to out-of-bounds access.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 5 | kvm | Not affected | ||
Red Hat Enterprise Linux 5 | xen | Not affected | ||
Red Hat Enterprise Linux 6 | qemu-kvm | Not affected | ||
Red Hat Enterprise Linux 7 | qemu-kvm | Not affected | ||
Red Hat Enterprise Linux 7 | qemu-kvm-rhev | Will not fix | ||
Red Hat Enterprise Linux OpenStack Platform 6 (Juno) | qemu-kvm-rhev | Will not fix | ||
Red Hat Enterprise Linux OpenStack Platform 7 (Kilo) | qemu-kvm-rhev | Will not fix | ||
Red Hat OpenStack Platform 10 (Newton) | qemu-kvm-rhev | Will not fix | ||
Red Hat OpenStack Platform 11 (Ocata) | qemu-kvm-rhev | Will not fix | ||
Red Hat OpenStack Platform 8 (Liberty) | qemu-kvm-rhev | Will not fix |
Показывать по
Дополнительная информация
Статус:
3.3 Low
CVSS3
3.6 Low
CVSS2
Связанные уязвимости
hw/input/ps2.c in Qemu does not validate 'rptr' and 'count' values during guest migration, leading to out-of-bounds access.
hw/input/ps2.c in Qemu does not validate 'rptr' and 'count' values during guest migration, leading to out-of-bounds access.
hw/input/ps2.c in Qemu does not validate 'rptr' and 'count' values dur ...
hw/input/ps2.c in Qemu does not validate 'rptr' and 'count' values during guest migration, leading to out-of-bounds access.
Уязвимость функции post_load (hw/input/ps2.c) эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю выполнить чтение за границами буфера в динамической памяти
3.3 Low
CVSS3
3.6 Low
CVSS2