Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2017-11334

Опубликовано: 02 авг. 2017
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 2.1
CVSS3: 4.4

Описание

The address_space_write_continue function in exec.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (out-of-bounds access and guest instance crash) by leveraging use of qemu_map_ram_ptr to access guest ram block area.

РелизСтатусПримечание
artful

not-affected

1:2.10+dfsg-0ubuntu3.4
bionic

not-affected

1:2.11+dfsg-1ubuntu1
devel

not-affected

1:2.11+dfsg-1ubuntu1
esm-infra-legacy/trusty

ignored

esm-infra/bionic

not-affected

1:2.11+dfsg-1ubuntu1
esm-infra/xenial

ignored

precise/esm

DNE

trusty

ignored

trusty/esm

ignored

upstream

needs-triage

Показывать по

РелизСтатусПримечание
artful

DNE

bionic

DNE

devel

DNE

esm-infra-legacy/trusty

DNE

precise/esm

ignored

trusty

DNE

trusty/esm

DNE

upstream

needs-triage

vivid/ubuntu-core

DNE

xenial

DNE

Показывать по

EPSS

Процентиль: 24%
0.00078
Низкий

2.1 Low

CVSS2

4.4 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.5
redhat
почти 8 лет назад

The address_space_write_continue function in exec.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (out-of-bounds access and guest instance crash) by leveraging use of qemu_map_ram_ptr to access guest ram block area.

CVSS3: 4.4
nvd
почти 8 лет назад

The address_space_write_continue function in exec.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (out-of-bounds access and guest instance crash) by leveraging use of qemu_map_ram_ptr to access guest ram block area.

CVSS3: 4.4
debian
почти 8 лет назад

The address_space_write_continue function in exec.c in QEMU (aka Quick ...

CVSS3: 4.4
github
около 3 лет назад

The address_space_write_continue function in exec.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (out-of-bounds access and guest instance crash) by leveraging use of qemu_map_ram_ptr to access guest ram block area.

suse-cvrf
почти 8 лет назад

Security update for qemu

EPSS

Процентиль: 24%
0.00078
Низкий

2.1 Low

CVSS2

4.4 Medium

CVSS3