发布时间: 2024年4月26日
修改时间: 2024年4月26日
A heap-based buffer overflow was found in the SDHCI device emulation of QEMU. The bug is triggered when both `s->data_count` and the size of `s->fifo_buffer` are set to 0x200, leading to an out-of-bound access. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition.
NVD | openEuler | |
---|---|---|
CVSS评分 | 6.0 | |
Attack Vector | Local | |
Attack Complexity | Low | |
Privileges Required | High | |
User Interaction | None | |
Scope | Changed | |
Confidentiality | None | |
Integrity | None | |
Availability | High |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2024-1507 | qemu security update | 2024年4月26日 |
KylinSec-SA-2024-3488 | qemu security update | 2024年4月26日 |
产品 | 包 | 状态 |
---|---|---|
KY3.4-4A | qemu | Fixed |
KY3.4-5A | qemu | Fixed |
KY3.5.1 | qemu | Fixed |
KY3.5.2 | qemu | Fixed |