Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
The address_space_write_continue function in exec.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (out-of-bounds access and guest instance crash) by leveraging use of qemu_map_ram_ptr to access guest ram block area.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
QEMU 安全漏洞
Vulnerability Description
QEMU(又名Quick Emulator)是法国程序员法布里斯-贝拉(Fabrice Bellard)所研发的一套模拟处理器软件。该软件具有速度快、跨平台等特点。 QEMU中的exec.c文件的‘address_space_write_continue’函数存在安全漏洞。本地攻击者可利用该漏洞造成拒绝服务(越边界访问和guest实例崩溃)。
CVSS Information
N/A
Vulnerability Type
N/A