Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2026-0665

Опубликовано: 18 фев. 2026
Источник: debian
EPSS Низкий

Описание

An off-by-one error was found in QEMU's KVM Xen guest support. A malicious guest could use this flaw to trigger out-of-bounds heap accesses in the QEMU process via the emulated Xen physdev hypercall interface, leading to a denial of service or potential memory corruption.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
qemufixed1:10.2.0+ds-2package
qemufixed1:10.0.8+ds-0+deb13u1trixiepackage
qemunot-affectedbookwormpackage
qemunot-affectedbullseyepackage

Примечания

  • https://lore.kernel.org/qemu-devel/13FE03BE60EA78D6+20260109023548.4047-1-vr@darknavy.com/

  • Introduced with: https://gitlab.com/qemu-project/qemu/-/commit/aa98ee38a5e77d1e40987c694abd0c5bc5d6c811 (v8.0.0-rc0)

EPSS

Процентиль: 1%
0.00008
Низкий

Связанные уязвимости

CVSS3: 6.5
ubuntu
около 1 месяца назад

An off-by-one error was found in QEMU's KVM Xen guest support. A malicious guest could use this flaw to trigger out-of-bounds heap accesses in the QEMU process via the emulated Xen physdev hypercall interface, leading to a denial of service or potential memory corruption.

CVSS3: 6.5
redhat
3 месяца назад

An off-by-one error was found in QEMU's KVM Xen guest support. A malicious guest could use this flaw to trigger out-of-bounds heap accesses in the QEMU process via the emulated Xen physdev hypercall interface, leading to a denial of service or potential memory corruption.

CVSS3: 6.5
nvd
около 1 месяца назад

An off-by-one error was found in QEMU's KVM Xen guest support. A malicious guest could use this flaw to trigger out-of-bounds heap accesses in the QEMU process via the emulated Xen physdev hypercall interface, leading to a denial of service or potential memory corruption.

suse-cvrf
около 2 месяцев назад

Security update for qemu

CVSS3: 6.5
github
около 1 месяца назад

An off-by-one error was found in QEMU's KVM Xen guest support. A malicious guest could use this flaw to trigger out-of-bounds heap accesses in the QEMU process via the emulated Xen physdev hypercall interface, leading to a denial of service or potential memory corruption.

EPSS

Процентиль: 1%
0.00008
Низкий