Описание
sd_wp_addr in hw/sd/sd.c in QEMU 4.2.0 uses an unvalidated address, which leads to an out-of-bounds read during sdhci_write() operations. A guest OS user can crash the QEMU process.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | released | 1:2.11+dfsg-1ubuntu7.31 |
| devel | not-affected | 1:5.0-5ubuntu4 |
| eoan | ignored | end of life |
| esm-infra-legacy/trusty | released | 2.0.0+dfsg-2ubuntu1.47+esm1 |
| esm-infra/bionic | released | 1:2.11+dfsg-1ubuntu7.31 |
| esm-infra/focal | released | 1:4.2-3ubuntu6.4 |
| esm-infra/xenial | released | 1:2.5+dfsg-5ubuntu10.45 |
| focal | released | 1:4.2-3ubuntu6.4 |
| groovy | not-affected | 1:5.0-5ubuntu4 |
| hirsute | not-affected | 1:5.0-5ubuntu4 |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | DNE | |
| devel | DNE | |
| eoan | DNE | |
| esm-infra-legacy/trusty | DNE | |
| esm-infra/focal | DNE | |
| focal | DNE | |
| groovy | DNE | |
| hirsute | DNE | |
| precise/esm | ignored | end of life, was needs-triage |
| trusty | DNE |
Показывать по
EPSS
2.1 Low
CVSS2
5.5 Medium
CVSS3
Связанные уязвимости
sd_wp_addr in hw/sd/sd.c in QEMU 4.2.0 uses an unvalidated address, which leads to an out-of-bounds read during sdhci_write() operations. A guest OS user can crash the QEMU process.
sd_wp_addr in hw/sd/sd.c in QEMU 4.2.0 uses an unvalidated address, which leads to an out-of-bounds read during sdhci_write() operations. A guest OS user can crash the QEMU process.
sd_wp_addr in hw/sd/sd.c in QEMU 4.2.0 uses an unvalidated address which leads to an out-of-bounds read during sdhci_write() operations. A guest OS user can crash the QEMU process.
sd_wp_addr in hw/sd/sd.c in QEMU 4.2.0 uses an unvalidated address, wh ...
sd_wp_addr in hw/sd/sd.c in QEMU 4.2.0 uses an unvalidated address, which leads to an out-of-bounds read during sdhci_write() operations. A guest OS user can crash the QEMU process.
EPSS
2.1 Low
CVSS2
5.5 Medium
CVSS3