Описание
sd_wp_addr in hw/sd/sd.c in QEMU 4.2.0 uses an unvalidated address, which leads to an out-of-bounds read during sdhci_write() operations. A guest OS user can crash the QEMU process.
Релиз | Статус | Примечание |
---|---|---|
bionic | released | 1:2.11+dfsg-1ubuntu7.31 |
devel | not-affected | 1:5.0-5ubuntu4 |
eoan | ignored | end of life |
esm-infra-legacy/trusty | not-affected | 2.0.0+dfsg-2ubuntu1.47+esm1 |
esm-infra/bionic | not-affected | 1:2.11+dfsg-1ubuntu7.31 |
esm-infra/focal | not-affected | 1:4.2-3ubuntu6.4 |
esm-infra/xenial | not-affected | 1:2.5+dfsg-5ubuntu10.45 |
focal | released | 1:4.2-3ubuntu6.4 |
groovy | not-affected | 1:5.0-5ubuntu4 |
hirsute | not-affected | 1:5.0-5ubuntu4 |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
bionic | DNE | |
devel | DNE | |
eoan | DNE | |
esm-infra-legacy/trusty | DNE | |
esm-infra/focal | DNE | |
focal | DNE | |
groovy | DNE | |
hirsute | DNE | |
precise/esm | ignored | end of life, was needs-triage |
trusty | DNE |
Показывать по
EPSS
2.1 Low
CVSS2
5.5 Medium
CVSS3
Связанные уязвимости
sd_wp_addr in hw/sd/sd.c in QEMU 4.2.0 uses an unvalidated address, which leads to an out-of-bounds read during sdhci_write() operations. A guest OS user can crash the QEMU process.
sd_wp_addr in hw/sd/sd.c in QEMU 4.2.0 uses an unvalidated address, which leads to an out-of-bounds read during sdhci_write() operations. A guest OS user can crash the QEMU process.
sd_wp_addr in hw/sd/sd.c in QEMU 4.2.0 uses an unvalidated address, wh ...
sd_wp_addr in hw/sd/sd.c in QEMU 4.2.0 uses an unvalidated address, which leads to an out-of-bounds read during sdhci_write() operations. A guest OS user can crash the QEMU process.
EPSS
2.1 Low
CVSS2
5.5 Medium
CVSS3