Количество 20
Количество 20

BDU:2022-05693
Уязвимость эмуляции USB-перенаправителя эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

CVE-2021-3682
A flaw was found in the USB redirector device emulation of QEMU in versions prior to 6.1.0-rc2. It occurs when dropping packets during a bulk transfer from a SPICE client due to the packet queue being full. A malicious SPICE client could use this flaw to make QEMU call free() with faked heap chunk metadata, resulting in a crash of QEMU or potential code execution with the privileges of the QEMU process on the host.

CVE-2021-3682
A flaw was found in the USB redirector device emulation of QEMU in versions prior to 6.1.0-rc2. It occurs when dropping packets during a bulk transfer from a SPICE client due to the packet queue being full. A malicious SPICE client could use this flaw to make QEMU call free() with faked heap chunk metadata, resulting in a crash of QEMU or potential code execution with the privileges of the QEMU process on the host.

CVE-2021-3682
A flaw was found in the USB redirector device emulation of QEMU in versions prior to 6.1.0-rc2. It occurs when dropping packets during a bulk transfer from a SPICE client due to the packet queue being full. A malicious SPICE client could use this flaw to make QEMU call free() with faked heap chunk metadata, resulting in a crash of QEMU or potential code execution with the privileges of the QEMU process on the host.

CVE-2021-3682
CVE-2021-3682
A flaw was found in the USB redirector device emulation of QEMU in ver ...
GHSA-2w4j-r5v6-3vgr
A flaw was found in the USB redirector device emulation of QEMU in versions prior to 6.1.0-rc2. It occurs when dropping packets during a bulk transfer from a SPICE client due to the packet queue being full. A malicious SPICE client could use this flaw to make QEMU call free() with faked heap chunk metadata, resulting in a crash of QEMU or potential code execution with the privileges of the QEMU process on the host.

openSUSE-SU-2021:2858-1
Security update for qemu

openSUSE-SU-2021:2789-1
Security update for qemu

SUSE-SU-2021:3575-1
Security update for qemu

SUSE-SU-2021:2858-1
Security update for qemu

SUSE-SU-2021:2813-1
Security update for qemu

SUSE-SU-2021:2789-1
Security update for qemu

SUSE-SU-2021:3635-1
Security update for qemu

SUSE-SU-2021:3614-1
Security update for qemu

SUSE-SU-2021:3613-1
Security update for qemu
ELSA-2021-9638
ELSA-2021-9638: qemu security update (IMPORTANT)

openSUSE-SU-2021:1202-1
Security update for qemu
ELSA-2022-9172
ELSA-2022-9172: virt:kvm_utils security update (IMPORTANT)

SUSE-SU-2021:14848-1
Security update for xen
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | BDU:2022-05693 Уязвимость эмуляции USB-перенаправителя эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании | CVSS3: 8.5 | 1% Низкий | около 4 лет назад |
![]() | CVE-2021-3682 A flaw was found in the USB redirector device emulation of QEMU in versions prior to 6.1.0-rc2. It occurs when dropping packets during a bulk transfer from a SPICE client due to the packet queue being full. A malicious SPICE client could use this flaw to make QEMU call free() with faked heap chunk metadata, resulting in a crash of QEMU or potential code execution with the privileges of the QEMU process on the host. | CVSS3: 8.5 | 1% Низкий | около 4 лет назад |
![]() | CVE-2021-3682 A flaw was found in the USB redirector device emulation of QEMU in versions prior to 6.1.0-rc2. It occurs when dropping packets during a bulk transfer from a SPICE client due to the packet queue being full. A malicious SPICE client could use this flaw to make QEMU call free() with faked heap chunk metadata, resulting in a crash of QEMU or potential code execution with the privileges of the QEMU process on the host. | CVSS3: 8.5 | 1% Низкий | около 4 лет назад |
![]() | CVE-2021-3682 A flaw was found in the USB redirector device emulation of QEMU in versions prior to 6.1.0-rc2. It occurs when dropping packets during a bulk transfer from a SPICE client due to the packet queue being full. A malicious SPICE client could use this flaw to make QEMU call free() with faked heap chunk metadata, resulting in a crash of QEMU or potential code execution with the privileges of the QEMU process on the host. | CVSS3: 8.5 | 1% Низкий | около 4 лет назад |
![]() | CVSS3: 8.5 | 1% Низкий | больше 2 лет назад | |
CVE-2021-3682 A flaw was found in the USB redirector device emulation of QEMU in ver ... | CVSS3: 8.5 | 1% Низкий | около 4 лет назад | |
GHSA-2w4j-r5v6-3vgr A flaw was found in the USB redirector device emulation of QEMU in versions prior to 6.1.0-rc2. It occurs when dropping packets during a bulk transfer from a SPICE client due to the packet queue being full. A malicious SPICE client could use this flaw to make QEMU call free() with faked heap chunk metadata, resulting in a crash of QEMU or potential code execution with the privileges of the QEMU process on the host. | CVSS3: 8.5 | 1% Низкий | около 3 лет назад | |
![]() | openSUSE-SU-2021:2858-1 Security update for qemu | почти 4 года назад | ||
![]() | openSUSE-SU-2021:2789-1 Security update for qemu | почти 4 года назад | ||
![]() | SUSE-SU-2021:3575-1 Security update for qemu | почти 4 года назад | ||
![]() | SUSE-SU-2021:2858-1 Security update for qemu | почти 4 года назад | ||
![]() | SUSE-SU-2021:2813-1 Security update for qemu | почти 4 года назад | ||
![]() | SUSE-SU-2021:2789-1 Security update for qemu | почти 4 года назад | ||
![]() | SUSE-SU-2021:3635-1 Security update for qemu | больше 3 лет назад | ||
![]() | SUSE-SU-2021:3614-1 Security update for qemu | почти 4 года назад | ||
![]() | SUSE-SU-2021:3613-1 Security update for qemu | почти 4 года назад | ||
ELSA-2021-9638 ELSA-2021-9638: qemu security update (IMPORTANT) | больше 3 лет назад | |||
![]() | openSUSE-SU-2021:1202-1 Security update for qemu | почти 4 года назад | ||
ELSA-2022-9172 ELSA-2022-9172: virt:kvm_utils security update (IMPORTANT) | больше 3 лет назад | |||
![]() | SUSE-SU-2021:14848-1 Security update for xen | больше 3 лет назад |
Уязвимостей на страницу