Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2022-3872

Опубликовано: 07 нояб. 2022
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 8.6

Описание

An off-by-one read/write issue was found in the SDHCI device of QEMU. It occurs when reading/writing the Buffer Data Port Register in sdhci_read_dataport and sdhci_write_dataport, respectively, if data_count == block_size. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition.

РелизСтатусПримечание
bionic

ignored

end of standard support, was deferred
devel

deferred

esm-infra-legacy/trusty

deferred

esm-infra/bionic

deferred

esm-infra/focal

deferred

esm-infra/xenial

deferred

focal

ignored

end of standard support, was deferred
jammy

deferred

kinetic

ignored

end of life, was deferred [2025-01-16]
lunar

ignored

end of life, was deferred [2025-01-16]

Показывать по

EPSS

Процентиль: 11%
0.00039
Низкий

8.6 High

CVSS3

Связанные уязвимости

CVSS3: 6
redhat
больше 2 лет назад

An off-by-one read/write issue was found in the SDHCI device of QEMU. It occurs when reading/writing the Buffer Data Port Register in sdhci_read_dataport and sdhci_write_dataport, respectively, if data_count == block_size. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition.

CVSS3: 8.6
nvd
больше 2 лет назад

An off-by-one read/write issue was found in the SDHCI device of QEMU. It occurs when reading/writing the Buffer Data Port Register in sdhci_read_dataport and sdhci_write_dataport, respectively, if data_count == block_size. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition.

CVSS3: 8.6
msrc
11 месяцев назад

Описание отсутствует

CVSS3: 8.6
debian
больше 2 лет назад

An off-by-one read/write issue was found in the SDHCI device of QEMU. ...

CVSS3: 8.6
github
больше 2 лет назад

An off-by-one read/write issue was found in the SDHCI device of QEMU. It occurs when reading/writing the Buffer Data Port Register in sdhci_read_dataport and sdhci_write_dataport, respectively, if data_count == block_size. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition.

EPSS

Процентиль: 11%
0.00039
Низкий

8.6 High

CVSS3