Количество 12
Количество 12

BDU:2021-05207
Уязвимость компонента sd_wp_addr программы для эмуляции аппаратного обеспечения других платформ QEMU, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю вызвать отказ в обслуживании

CVE-2020-13253
sd_wp_addr in hw/sd/sd.c in QEMU 4.2.0 uses an unvalidated address, which leads to an out-of-bounds read during sdhci_write() operations. A guest OS user can crash the QEMU process.

CVE-2020-13253
sd_wp_addr in hw/sd/sd.c in QEMU 4.2.0 uses an unvalidated address, which leads to an out-of-bounds read during sdhci_write() operations. A guest OS user can crash the QEMU process.

CVE-2020-13253
sd_wp_addr in hw/sd/sd.c in QEMU 4.2.0 uses an unvalidated address, which leads to an out-of-bounds read during sdhci_write() operations. A guest OS user can crash the QEMU process.

CVE-2020-13253
CVE-2020-13253
sd_wp_addr in hw/sd/sd.c in QEMU 4.2.0 uses an unvalidated address, wh ...
GHSA-mpcr-cpf2-g7x3
sd_wp_addr in hw/sd/sd.c in QEMU 4.2.0 uses an unvalidated address, which leads to an out-of-bounds read during sdhci_write() operations. A guest OS user can crash the QEMU process.

openSUSE-SU-2022:0210-2
Security update for qemu

openSUSE-SU-2022:0210-1
Security update for qemu

SUSE-SU-2022:0210-2
Security update for qemu

SUSE-SU-2023:0761-1
Security update for qemu
ELSA-2021-9034
ELSA-2021-9034: qemu security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | BDU:2021-05207 Уязвимость компонента sd_wp_addr программы для эмуляции аппаратного обеспечения других платформ QEMU, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 5.5 | 0% Низкий | около 5 лет назад |
![]() | CVE-2020-13253 sd_wp_addr in hw/sd/sd.c in QEMU 4.2.0 uses an unvalidated address, which leads to an out-of-bounds read during sdhci_write() operations. A guest OS user can crash the QEMU process. | CVSS3: 5.5 | 0% Низкий | около 5 лет назад |
![]() | CVE-2020-13253 sd_wp_addr in hw/sd/sd.c in QEMU 4.2.0 uses an unvalidated address, which leads to an out-of-bounds read during sdhci_write() operations. A guest OS user can crash the QEMU process. | CVSS3: 3.3 | 0% Низкий | около 5 лет назад |
![]() | CVE-2020-13253 sd_wp_addr in hw/sd/sd.c in QEMU 4.2.0 uses an unvalidated address, which leads to an out-of-bounds read during sdhci_write() operations. A guest OS user can crash the QEMU process. | CVSS3: 5.5 | 0% Низкий | около 5 лет назад |
![]() | CVSS3: 5.5 | 0% Низкий | почти 5 лет назад | |
CVE-2020-13253 sd_wp_addr in hw/sd/sd.c in QEMU 4.2.0 uses an unvalidated address, wh ... | CVSS3: 5.5 | 0% Низкий | около 5 лет назад | |
GHSA-mpcr-cpf2-g7x3 sd_wp_addr in hw/sd/sd.c in QEMU 4.2.0 uses an unvalidated address, which leads to an out-of-bounds read during sdhci_write() operations. A guest OS user can crash the QEMU process. | CVSS3: 5.5 | 0% Низкий | около 3 лет назад | |
![]() | openSUSE-SU-2022:0210-2 Security update for qemu | больше 3 лет назад | ||
![]() | openSUSE-SU-2022:0210-1 Security update for qemu | больше 3 лет назад | ||
![]() | SUSE-SU-2022:0210-2 Security update for qemu | больше 3 лет назад | ||
![]() | SUSE-SU-2023:0761-1 Security update for qemu | больше 2 лет назад | ||
ELSA-2021-9034 ELSA-2021-9034: qemu security update (IMPORTANT) | больше 4 лет назад |
Уязвимостей на страницу