Количество 12
Количество 12
CVE-2020-13253
sd_wp_addr in hw/sd/sd.c in QEMU 4.2.0 uses an unvalidated address, which leads to an out-of-bounds read during sdhci_write() operations. A guest OS user can crash the QEMU process.
CVE-2020-13253
sd_wp_addr in hw/sd/sd.c in QEMU 4.2.0 uses an unvalidated address, which leads to an out-of-bounds read during sdhci_write() operations. A guest OS user can crash the QEMU process.
CVE-2020-13253
sd_wp_addr in hw/sd/sd.c in QEMU 4.2.0 uses an unvalidated address, which leads to an out-of-bounds read during sdhci_write() operations. A guest OS user can crash the QEMU process.
CVE-2020-13253
sd_wp_addr in hw/sd/sd.c in QEMU 4.2.0 uses an unvalidated address which leads to an out-of-bounds read during sdhci_write() operations. A guest OS user can crash the QEMU process.
CVE-2020-13253
sd_wp_addr in hw/sd/sd.c in QEMU 4.2.0 uses an unvalidated address, wh ...
GHSA-mpcr-cpf2-g7x3
sd_wp_addr in hw/sd/sd.c in QEMU 4.2.0 uses an unvalidated address, which leads to an out-of-bounds read during sdhci_write() operations. A guest OS user can crash the QEMU process.
BDU:2021-05207
Уязвимость компонента sd_wp_addr программы для эмуляции аппаратного обеспечения других платформ QEMU, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю вызвать отказ в обслуживании
openSUSE-SU-2022:0210-2
Security update for qemu
openSUSE-SU-2022:0210-1
Security update for qemu
SUSE-SU-2022:0210-2
Security update for qemu
SUSE-SU-2023:0761-1
Security update for qemu
ELSA-2021-9034
ELSA-2021-9034: qemu security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2020-13253 sd_wp_addr in hw/sd/sd.c in QEMU 4.2.0 uses an unvalidated address, which leads to an out-of-bounds read during sdhci_write() operations. A guest OS user can crash the QEMU process. | CVSS3: 5.5 | 0% Низкий | больше 5 лет назад | |
CVE-2020-13253 sd_wp_addr in hw/sd/sd.c in QEMU 4.2.0 uses an unvalidated address, which leads to an out-of-bounds read during sdhci_write() operations. A guest OS user can crash the QEMU process. | CVSS3: 3.3 | 0% Низкий | больше 5 лет назад | |
CVE-2020-13253 sd_wp_addr in hw/sd/sd.c in QEMU 4.2.0 uses an unvalidated address, which leads to an out-of-bounds read during sdhci_write() operations. A guest OS user can crash the QEMU process. | CVSS3: 5.5 | 0% Низкий | больше 5 лет назад | |
CVE-2020-13253 sd_wp_addr in hw/sd/sd.c in QEMU 4.2.0 uses an unvalidated address which leads to an out-of-bounds read during sdhci_write() operations. A guest OS user can crash the QEMU process. | CVSS3: 5.5 | 0% Низкий | около 5 лет назад | |
CVE-2020-13253 sd_wp_addr in hw/sd/sd.c in QEMU 4.2.0 uses an unvalidated address, wh ... | CVSS3: 5.5 | 0% Низкий | больше 5 лет назад | |
GHSA-mpcr-cpf2-g7x3 sd_wp_addr in hw/sd/sd.c in QEMU 4.2.0 uses an unvalidated address, which leads to an out-of-bounds read during sdhci_write() operations. A guest OS user can crash the QEMU process. | CVSS3: 5.5 | 0% Низкий | больше 3 лет назад | |
BDU:2021-05207 Уязвимость компонента sd_wp_addr программы для эмуляции аппаратного обеспечения других платформ QEMU, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 5.5 | 0% Низкий | больше 5 лет назад | |
openSUSE-SU-2022:0210-2 Security update for qemu | больше 3 лет назад | |||
openSUSE-SU-2022:0210-1 Security update for qemu | почти 4 года назад | |||
SUSE-SU-2022:0210-2 Security update for qemu | больше 3 лет назад | |||
SUSE-SU-2023:0761-1 Security update for qemu | больше 2 лет назад | |||
ELSA-2021-9034 ELSA-2021-9034: qemu security update (IMPORTANT) | почти 5 лет назад |
Уязвимостей на страницу