Количество 58
Количество 58
ELSA-2020-4079
ELSA-2020-4079: qemu-kvm security update (IMPORTANT)

CVE-2020-1983
A use after free vulnerability in ip_reass() in ip_input.c of libslirp 4.2.0 and prior releases allows crafted packets to cause a denial of service.

CVE-2020-1983
A use after free vulnerability in ip_reass() in ip_input.c of libslirp 4.2.0 and prior releases allows crafted packets to cause a denial of service.

CVE-2020-1983
A use after free vulnerability in ip_reass() in ip_input.c of libslirp 4.2.0 and prior releases allows crafted packets to cause a denial of service.
CVE-2020-1983
A use after free vulnerability in ip_reass() in ip_input.c of libslirp ...

CVE-2020-14364
An out-of-bounds read/write access flaw was found in the USB emulator of the QEMU in versions before 5.2.0. This issue occurs while processing USB packets from a guest when USBDevice 'setup_len' exceeds its 'data_buf[4096]' in the do_token_in, do_token_out routines. This flaw allows a guest user to crash the QEMU process, resulting in a denial of service, or the potential execution of arbitrary code with the privileges of the QEMU process on the host.

CVE-2020-14364
An out-of-bounds read/write access flaw was found in the USB emulator of the QEMU in versions before 5.2.0. This issue occurs while processing USB packets from a guest when USBDevice 'setup_len' exceeds its 'data_buf[4096]' in the do_token_in, do_token_out routines. This flaw allows a guest user to crash the QEMU process, resulting in a denial of service, or the potential execution of arbitrary code with the privileges of the QEMU process on the host.

CVE-2020-14364
An out-of-bounds read/write access flaw was found in the USB emulator of the QEMU in versions before 5.2.0. This issue occurs while processing USB packets from a guest when USBDevice 'setup_len' exceeds its 'data_buf[4096]' in the do_token_in, do_token_out routines. This flaw allows a guest user to crash the QEMU process, resulting in a denial of service, or the potential execution of arbitrary code with the privileges of the QEMU process on the host.

CVE-2020-14364
CVE-2020-14364
An out-of-bounds read/write access flaw was found in the USB emulator ...

SUSE-SU-2021:14706-1
Security update for kvm

openSUSE-SU-2020:0756-1
Security update for qemu

openSUSE-SU-2020:0636-1
Security update for slirp4netns

SUSE-SU-2020:1516-1
Security update for qemu

SUSE-SU-2020:1502-1
Security update for qemu

SUSE-SU-2020:1197-1
Security update for slirp4netns
GHSA-m3gw-pxj4-v7p8
A use after free vulnerability in ip_reass() in ip_input.c of libslirp 4.2.0 and prior releases allows crafted packets to cause a denial of service.
ELSA-2020-3053
ELSA-2020-3053: container-tools:ol8 security, bug fix, and enhancement update (MODERATE)

BDU:2021-03631
Уязвимость функции ip_reass() библиотеки TCP-IP эмулятора Libslirp, связанная с использованием памяти после её освобождения, позволяющая нарушителю вызвать отказ в обслуживании
GHSA-fq9g-vccc-q7c7
An out-of-bounds read/write access flaw was found in the USB emulator of the QEMU in versions before 5.2.0. This issue occurs while processing USB packets from a guest when USBDevice 'setup_len' exceeds its 'data_buf[4096]' in the do_token_in, do_token_out routines. This flaw allows a guest user to crash the QEMU process, resulting in a denial of service, or the potential execution of arbitrary code with the privileges of the QEMU process on the host.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
ELSA-2020-4079 ELSA-2020-4079: qemu-kvm security update (IMPORTANT) | больше 4 лет назад | |||
![]() | CVE-2020-1983 A use after free vulnerability in ip_reass() in ip_input.c of libslirp 4.2.0 and prior releases allows crafted packets to cause a denial of service. | CVSS3: 7.5 | 0% Низкий | около 5 лет назад |
![]() | CVE-2020-1983 A use after free vulnerability in ip_reass() in ip_input.c of libslirp 4.2.0 and prior releases allows crafted packets to cause a denial of service. | CVSS3: 6.5 | 0% Низкий | около 5 лет назад |
![]() | CVE-2020-1983 A use after free vulnerability in ip_reass() in ip_input.c of libslirp 4.2.0 and prior releases allows crafted packets to cause a denial of service. | CVSS3: 7.5 | 0% Низкий | около 5 лет назад |
CVE-2020-1983 A use after free vulnerability in ip_reass() in ip_input.c of libslirp ... | CVSS3: 7.5 | 0% Низкий | около 5 лет назад | |
![]() | CVE-2020-14364 An out-of-bounds read/write access flaw was found in the USB emulator of the QEMU in versions before 5.2.0. This issue occurs while processing USB packets from a guest when USBDevice 'setup_len' exceeds its 'data_buf[4096]' in the do_token_in, do_token_out routines. This flaw allows a guest user to crash the QEMU process, resulting in a denial of service, or the potential execution of arbitrary code with the privileges of the QEMU process on the host. | CVSS3: 5 | 12% Средний | почти 5 лет назад |
![]() | CVE-2020-14364 An out-of-bounds read/write access flaw was found in the USB emulator of the QEMU in versions before 5.2.0. This issue occurs while processing USB packets from a guest when USBDevice 'setup_len' exceeds its 'data_buf[4096]' in the do_token_in, do_token_out routines. This flaw allows a guest user to crash the QEMU process, resulting in a denial of service, or the potential execution of arbitrary code with the privileges of the QEMU process on the host. | CVSS3: 5 | 12% Средний | почти 5 лет назад |
![]() | CVE-2020-14364 An out-of-bounds read/write access flaw was found in the USB emulator of the QEMU in versions before 5.2.0. This issue occurs while processing USB packets from a guest when USBDevice 'setup_len' exceeds its 'data_buf[4096]' in the do_token_in, do_token_out routines. This flaw allows a guest user to crash the QEMU process, resulting in a denial of service, or the potential execution of arbitrary code with the privileges of the QEMU process on the host. | CVSS3: 5 | 12% Средний | почти 5 лет назад |
![]() | CVSS3: 5 | 12% Средний | почти 5 лет назад | |
CVE-2020-14364 An out-of-bounds read/write access flaw was found in the USB emulator ... | CVSS3: 5 | 12% Средний | почти 5 лет назад | |
![]() | SUSE-SU-2021:14706-1 Security update for kvm | около 4 лет назад | ||
![]() | openSUSE-SU-2020:0756-1 Security update for qemu | 0% Низкий | около 5 лет назад | |
![]() | openSUSE-SU-2020:0636-1 Security update for slirp4netns | 0% Низкий | около 5 лет назад | |
![]() | SUSE-SU-2020:1516-1 Security update for qemu | 0% Низкий | около 5 лет назад | |
![]() | SUSE-SU-2020:1502-1 Security update for qemu | 0% Низкий | около 5 лет назад | |
![]() | SUSE-SU-2020:1197-1 Security update for slirp4netns | 0% Низкий | около 5 лет назад | |
GHSA-m3gw-pxj4-v7p8 A use after free vulnerability in ip_reass() in ip_input.c of libslirp 4.2.0 and prior releases allows crafted packets to cause a denial of service. | CVSS3: 6.5 | 0% Низкий | около 3 лет назад | |
ELSA-2020-3053 ELSA-2020-3053: container-tools:ol8 security, bug fix, and enhancement update (MODERATE) | почти 5 лет назад | |||
![]() | BDU:2021-03631 Уязвимость функции ip_reass() библиотеки TCP-IP эмулятора Libslirp, связанная с использованием памяти после её освобождения, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 6.5 | 0% Низкий | около 5 лет назад |
GHSA-fq9g-vccc-q7c7 An out-of-bounds read/write access flaw was found in the USB emulator of the QEMU in versions before 5.2.0. This issue occurs while processing USB packets from a guest when USBDevice 'setup_len' exceeds its 'data_buf[4096]' in the do_token_in, do_token_out routines. This flaw allows a guest user to crash the QEMU process, resulting in a denial of service, or the potential execution of arbitrary code with the privileges of the QEMU process on the host. | CVSS3: 5 | 12% Средний | около 3 лет назад |
Уязвимостей на страницу