Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2015-8817

Опубликовано: 29 дек. 2016
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 2.1
CVSS3: 5.5

Описание

QEMU (aka Quick Emulator) built to use 'address_space_translate' to map an address to a MemoryRegionSection is vulnerable to an OOB r/w access issue. It could occur while doing pci_dma_read/write calls. Affects QEMU versions >= 1.6.0 and <= 2.3.1. A privileged user inside guest could use this flaw to crash the guest instance resulting in DoS.

РелизСтатусПримечание
devel

not-affected

1:2.5+dfsg-5ubuntu4
esm-infra-legacy/trusty

ignored

esm-infra/xenial

not-affected

1:2.5+dfsg-5ubuntu4
precise

DNE

precise/esm

DNE

trusty

ignored

trusty/esm

ignored

upstream

needs-triage

vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

precise

not-affected

1.0+noroms-0ubuntu14.27
precise/esm

not-affected

1.0+noroms-0ubuntu14.27
trusty

DNE

trusty/esm

DNE

upstream

needs-triage

vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

wily

DNE

Показывать по

EPSS

Процентиль: 25%
0.00088
Низкий

2.1 Low

CVSS2

5.5 Medium

CVSS3

Связанные уязвимости

redhat
около 10 лет назад

QEMU (aka Quick Emulator) built to use 'address_space_translate' to map an address to a MemoryRegionSection is vulnerable to an OOB r/w access issue. It could occur while doing pci_dma_read/write calls. Affects QEMU versions >= 1.6.0 and <= 2.3.1. A privileged user inside guest could use this flaw to crash the guest instance resulting in DoS.

CVSS3: 5.5
nvd
около 9 лет назад

QEMU (aka Quick Emulator) built to use 'address_space_translate' to map an address to a MemoryRegionSection is vulnerable to an OOB r/w access issue. It could occur while doing pci_dma_read/write calls. Affects QEMU versions >= 1.6.0 and <= 2.3.1. A privileged user inside guest could use this flaw to crash the guest instance resulting in DoS.

CVSS3: 5.5
debian
около 9 лет назад

QEMU (aka Quick Emulator) built to use 'address_space_translate' to ma ...

CVSS3: 5.5
github
больше 3 лет назад

QEMU (aka Quick Emulator) built to use 'address_space_translate' to map an address to a MemoryRegionSection is vulnerable to an OOB r/w access issue. It could occur while doing pci_dma_read/write calls. Affects QEMU versions >= 1.6.0 and <= 2.3.1. A privileged user inside guest could use this flaw to crash the guest instance resulting in DoS.

suse-cvrf
больше 9 лет назад

Security update for qemu

EPSS

Процентиль: 25%
0.00088
Низкий

2.1 Low

CVSS2

5.5 Medium

CVSS3