发布时间: 2021年9月24日
修改时间: 2024年10月31日
An out-of-bounds write flaw was found in the UAS (USB Attached SCSI) device emulation of QEMU in versions prior to 6.2.0-rc0. The device uses the guest supplied stream number unchecked, which can lead to out-of-bounds access to the UASDevice->data3 and UASDevice->status3 fields. A malicious guest user could use this flaw to crash QEMU or potentially achieve code execution with the privileges of the QEMU process on the host.
NVD | openEuler | |
---|---|---|
Confidentiality | High | High |
Attack Vector | Physical | Physical |
CVSS评分 | 7.4 | 7.4 |
Attack Complexity | Low | Low |
Privileges Required | Low | Low |
Scope | Changed | Changed |
Integrity | High | High |
User Interaction | None | None |
Availability | High | High |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2021-1347 | qemu security update | 2021年9月24日 |
产品 | 包 | 状态 |
---|---|---|
KY3.4-4A | qemu | Fixed |