Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2016-1922

Опубликовано: 29 дек. 2016
Источник: ubuntu
Приоритет: low
CVSS2: 2.1
CVSS3: 5.5

Описание

QEMU (aka Quick Emulator) built with the TPR optimization for 32-bit Windows guests support is vulnerable to a null pointer dereference flaw. It occurs while doing I/O port write operations via hmp interface. In that, 'current_cpu' remains null, which leads to the null pointer dereference. A user or process could use this flaw to crash the QEMU instance, resulting in DoS issue.

РелизСтатусПримечание
devel

released

1:2.5+dfsg-1ubuntu5
esm-infra-legacy/trusty

released

2.0.0+dfsg-2ubuntu1.22
precise

DNE

trusty

released

2.0.0+dfsg-2ubuntu1.22
trusty/esm

released

2.0.0+dfsg-2ubuntu1.22
upstream

needed

vivid

ignored

end of life
vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

wily

released

1:2.3+dfsg-5ubuntu9.2

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

precise

not-affected

code not present
trusty

DNE

trusty/esm

DNE

upstream

not-affected

vivid

DNE

vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

wily

DNE

Показывать по

2.1 Low

CVSS2

5.5 Medium

CVSS3

Связанные уязвимости

redhat
около 10 лет назад

QEMU (aka Quick Emulator) built with the TPR optimization for 32-bit Windows guests support is vulnerable to a null pointer dereference flaw. It occurs while doing I/O port write operations via hmp interface. In that, 'current_cpu' remains null, which leads to the null pointer dereference. A user or process could use this flaw to crash the QEMU instance, resulting in DoS issue.

CVSS3: 5.5
nvd
около 9 лет назад

QEMU (aka Quick Emulator) built with the TPR optimization for 32-bit Windows guests support is vulnerable to a null pointer dereference flaw. It occurs while doing I/O port write operations via hmp interface. In that, 'current_cpu' remains null, which leads to the null pointer dereference. A user or process could use this flaw to crash the QEMU instance, resulting in DoS issue.

CVSS3: 5.5
debian
около 9 лет назад

QEMU (aka Quick Emulator) built with the TPR optimization for 32-bit W ...

CVSS3: 5.5
github
больше 3 лет назад

QEMU (aka Quick Emulator) built with the TPR optimization for 32-bit Windows guests support is vulnerable to a null pointer dereference flaw. It occurs while doing I/O port write operations via hmp interface. In that, 'current_cpu' remains null, which leads to the null pointer dereference. A user or process could use this flaw to crash the QEMU instance, resulting in DoS issue.

suse-cvrf
больше 9 лет назад

Security update for qemu

2.1 Low

CVSS2

5.5 Medium

CVSS3