Описание
Heap-based buffer overflow in the .receive callback of xlnx.xps-ethernetlite in QEMU (aka Quick Emulator) allows attackers to execute arbitrary code on the QEMU host via a large ethlite packet.
Релиз | Статус | Примечание |
---|---|---|
devel | released | 1:2.6.1+dfsg-0ubuntu9 |
esm-infra-legacy/trusty | not-affected | 2.0.0+dfsg-2ubuntu1.30 |
esm-infra/xenial | not-affected | 1:2.5+dfsg-5ubuntu10.6 |
precise | DNE | |
trusty | released | 2.0.0+dfsg-2ubuntu1.30 |
trusty/esm | not-affected | 2.0.0+dfsg-2ubuntu1.30 |
upstream | needs-triage | |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | DNE | |
xenial | released | 1:2.5+dfsg-5ubuntu10.6 |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra-legacy/trusty | DNE | |
precise | released | 1.0+noroms-0ubuntu14.31 |
trusty | DNE | |
trusty/esm | DNE | |
upstream | needs-triage | |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | DNE | |
xenial | DNE | |
yakkety | DNE |
Показывать по
EPSS
10 Critical
CVSS2
9.8 Critical
CVSS3
Связанные уязвимости
Heap-based buffer overflow in the .receive callback of xlnx.xps-ethernetlite in QEMU (aka Quick Emulator) allows attackers to execute arbitrary code on the QEMU host via a large ethlite packet.
Heap-based buffer overflow in the .receive callback of xlnx.xps-ethernetlite in QEMU (aka Quick Emulator) allows attackers to execute arbitrary code on the QEMU host via a large ethlite packet.
Heap-based buffer overflow in the .receive callback of xlnx.xps-ethern ...
Heap-based buffer overflow in the .receive callback of xlnx.xps-ethernetlite in QEMU (aka Quick Emulator) allows attackers to execute arbitrary code on the QEMU host via a large ethlite packet.
EPSS
10 Critical
CVSS2
9.8 Critical
CVSS3