Описание
Integer overflow in the load_multiboot function in hw/i386/multiboot.c in QEMU (aka Quick Emulator) allows local guest OS users to execute arbitrary code on the host via crafted multiboot header address values, which trigger an out-of-bounds write.
Релиз | Статус | Примечание |
---|---|---|
artful | not-affected | 1:2.10+dfsg-0ubuntu3.4 |
bionic | not-affected | 1:2.11+dfsg-1ubuntu1 |
cosmic | not-affected | 1:2.11+dfsg-1ubuntu1 |
devel | not-affected | 1:2.11+dfsg-1ubuntu1 |
disco | not-affected | 1:2.11+dfsg-1ubuntu1 |
eoan | not-affected | 1:2.11+dfsg-1ubuntu1 |
esm-infra-legacy/trusty | not-affected | 2.0.0+dfsg-2ubuntu1.39 |
esm-infra/bionic | not-affected | 1:2.11+dfsg-1ubuntu1 |
esm-infra/focal | not-affected | 1:2.11+dfsg-1ubuntu1 |
esm-infra/xenial | not-affected | 1:2.5+dfsg-5ubuntu10.22 |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
artful | DNE | |
bionic | DNE | |
cosmic | DNE | |
devel | DNE | |
disco | DNE | |
eoan | DNE | |
esm-infra-legacy/trusty | DNE | |
esm-infra/focal | DNE | |
focal | DNE | |
groovy | DNE |
Показывать по
7.2 High
CVSS2
8.8 High
CVSS3
Связанные уязвимости
Integer overflow in the load_multiboot function in hw/i386/multiboot.c in QEMU (aka Quick Emulator) allows local guest OS users to execute arbitrary code on the host via crafted multiboot header address values, which trigger an out-of-bounds write.
Integer overflow in the load_multiboot function in hw/i386/multiboot.c in QEMU (aka Quick Emulator) allows local guest OS users to execute arbitrary code on the host via crafted multiboot header address values, which trigger an out-of-bounds write.
Integer overflow in the load_multiboot function in hw/i386/multiboot.c ...
Integer overflow in the load_multiboot function in hw/i386/multiboot.c in QEMU (aka Quick Emulator) allows local guest OS users to execute arbitrary code on the host via crafted multiboot header address values, which trigger an out-of-bounds write.
7.2 High
CVSS2
8.8 High
CVSS3