Количество 58
Количество 58
ELSA-2020-4079
ELSA-2020-4079: qemu-kvm security update (IMPORTANT)
CVE-2020-1983
A use after free vulnerability in ip_reass() in ip_input.c of libslirp 4.2.0 and prior releases allows crafted packets to cause a denial of service.
CVE-2020-1983
A use after free vulnerability in ip_reass() in ip_input.c of libslirp 4.2.0 and prior releases allows crafted packets to cause a denial of service.
CVE-2020-1983
A use after free vulnerability in ip_reass() in ip_input.c of libslirp 4.2.0 and prior releases allows crafted packets to cause a denial of service.
CVE-2020-1983
A use after free vulnerability in ip_reass() in ip_input.c of libslirp ...
CVE-2020-14364
An out-of-bounds read/write access flaw was found in the USB emulator of the QEMU in versions before 5.2.0. This issue occurs while processing USB packets from a guest when USBDevice 'setup_len' exceeds its 'data_buf[4096]' in the do_token_in, do_token_out routines. This flaw allows a guest user to crash the QEMU process, resulting in a denial of service, or the potential execution of arbitrary code with the privileges of the QEMU process on the host.
CVE-2020-14364
An out-of-bounds read/write access flaw was found in the USB emulator of the QEMU in versions before 5.2.0. This issue occurs while processing USB packets from a guest when USBDevice 'setup_len' exceeds its 'data_buf[4096]' in the do_token_in, do_token_out routines. This flaw allows a guest user to crash the QEMU process, resulting in a denial of service, or the potential execution of arbitrary code with the privileges of the QEMU process on the host.
CVE-2020-14364
An out-of-bounds read/write access flaw was found in the USB emulator of the QEMU in versions before 5.2.0. This issue occurs while processing USB packets from a guest when USBDevice 'setup_len' exceeds its 'data_buf[4096]' in the do_token_in, do_token_out routines. This flaw allows a guest user to crash the QEMU process, resulting in a denial of service, or the potential execution of arbitrary code with the privileges of the QEMU process on the host.
CVE-2020-14364
CVE-2020-14364
An out-of-bounds read/write access flaw was found in the USB emulator ...
SUSE-SU-2021:14706-1
Security update for kvm
openSUSE-SU-2020:0756-1
Security update for qemu
openSUSE-SU-2020:0636-1
Security update for slirp4netns
SUSE-SU-2020:1516-1
Security update for qemu
SUSE-SU-2020:1502-1
Security update for qemu
SUSE-SU-2020:1197-1
Security update for slirp4netns
GHSA-m3gw-pxj4-v7p8
A use after free vulnerability in ip_reass() in ip_input.c of libslirp 4.2.0 and prior releases allows crafted packets to cause a denial of service.
ELSA-2020-3053
ELSA-2020-3053: container-tools:ol8 security, bug fix, and enhancement update (MODERATE)
BDU:2021-03631
Уязвимость функции ip_reass() библиотеки TCP-IP эмулятора Libslirp, связанная с использованием памяти после её освобождения, позволяющая нарушителю вызвать отказ в обслуживании
GHSA-fq9g-vccc-q7c7
An out-of-bounds read/write access flaw was found in the USB emulator of the QEMU in versions before 5.2.0. This issue occurs while processing USB packets from a guest when USBDevice 'setup_len' exceeds its 'data_buf[4096]' in the do_token_in, do_token_out routines. This flaw allows a guest user to crash the QEMU process, resulting in a denial of service, or the potential execution of arbitrary code with the privileges of the QEMU process on the host.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
ELSA-2020-4079 ELSA-2020-4079: qemu-kvm security update (IMPORTANT) | около 5 лет назад | |||
CVE-2020-1983 A use after free vulnerability in ip_reass() in ip_input.c of libslirp 4.2.0 and prior releases allows crafted packets to cause a denial of service. | CVSS3: 7.5 | 0% Низкий | больше 5 лет назад | |
CVE-2020-1983 A use after free vulnerability in ip_reass() in ip_input.c of libslirp 4.2.0 and prior releases allows crafted packets to cause a denial of service. | CVSS3: 6.5 | 0% Низкий | больше 5 лет назад | |
CVE-2020-1983 A use after free vulnerability in ip_reass() in ip_input.c of libslirp 4.2.0 and prior releases allows crafted packets to cause a denial of service. | CVSS3: 7.5 | 0% Низкий | больше 5 лет назад | |
CVE-2020-1983 A use after free vulnerability in ip_reass() in ip_input.c of libslirp ... | CVSS3: 7.5 | 0% Низкий | больше 5 лет назад | |
CVE-2020-14364 An out-of-bounds read/write access flaw was found in the USB emulator of the QEMU in versions before 5.2.0. This issue occurs while processing USB packets from a guest when USBDevice 'setup_len' exceeds its 'data_buf[4096]' in the do_token_in, do_token_out routines. This flaw allows a guest user to crash the QEMU process, resulting in a denial of service, or the potential execution of arbitrary code with the privileges of the QEMU process on the host. | CVSS3: 5 | 11% Средний | около 5 лет назад | |
CVE-2020-14364 An out-of-bounds read/write access flaw was found in the USB emulator of the QEMU in versions before 5.2.0. This issue occurs while processing USB packets from a guest when USBDevice 'setup_len' exceeds its 'data_buf[4096]' in the do_token_in, do_token_out routines. This flaw allows a guest user to crash the QEMU process, resulting in a denial of service, or the potential execution of arbitrary code with the privileges of the QEMU process on the host. | CVSS3: 5 | 11% Средний | около 5 лет назад | |
CVE-2020-14364 An out-of-bounds read/write access flaw was found in the USB emulator of the QEMU in versions before 5.2.0. This issue occurs while processing USB packets from a guest when USBDevice 'setup_len' exceeds its 'data_buf[4096]' in the do_token_in, do_token_out routines. This flaw allows a guest user to crash the QEMU process, resulting in a denial of service, or the potential execution of arbitrary code with the privileges of the QEMU process on the host. | CVSS3: 5 | 11% Средний | около 5 лет назад | |
CVSS3: 5 | 11% Средний | около 5 лет назад | ||
CVE-2020-14364 An out-of-bounds read/write access flaw was found in the USB emulator ... | CVSS3: 5 | 11% Средний | около 5 лет назад | |
SUSE-SU-2021:14706-1 Security update for kvm | больше 4 лет назад | |||
openSUSE-SU-2020:0756-1 Security update for qemu | 0% Низкий | больше 5 лет назад | ||
openSUSE-SU-2020:0636-1 Security update for slirp4netns | 0% Низкий | больше 5 лет назад | ||
SUSE-SU-2020:1516-1 Security update for qemu | 0% Низкий | больше 5 лет назад | ||
SUSE-SU-2020:1502-1 Security update for qemu | 0% Низкий | больше 5 лет назад | ||
SUSE-SU-2020:1197-1 Security update for slirp4netns | 0% Низкий | больше 5 лет назад | ||
GHSA-m3gw-pxj4-v7p8 A use after free vulnerability in ip_reass() in ip_input.c of libslirp 4.2.0 and prior releases allows crafted packets to cause a denial of service. | CVSS3: 6.5 | 0% Низкий | больше 3 лет назад | |
ELSA-2020-3053 ELSA-2020-3053: container-tools:ol8 security, bug fix, and enhancement update (MODERATE) | больше 5 лет назад | |||
BDU:2021-03631 Уязвимость функции ip_reass() библиотеки TCP-IP эмулятора Libslirp, связанная с использованием памяти после её освобождения, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 6.5 | 0% Низкий | больше 5 лет назад | |
GHSA-fq9g-vccc-q7c7 An out-of-bounds read/write access flaw was found in the USB emulator of the QEMU in versions before 5.2.0. This issue occurs while processing USB packets from a guest when USBDevice 'setup_len' exceeds its 'data_buf[4096]' in the do_token_in, do_token_out routines. This flaw allows a guest user to crash the QEMU process, resulting in a denial of service, or the potential execution of arbitrary code with the privileges of the QEMU process on the host. | CVSS3: 5 | 11% Средний | больше 3 лет назад |
Уязвимостей на страницу