Количество 24
Количество 24
RLSA-2025:4492
Moderate: qemu-kvm security update
ELSA-2025-4492
ELSA-2025-4492: qemu-kvm security update (MODERATE)
CVE-2024-3567
A flaw was found in QEMU. An assertion failure was present in the update_sctp_checksum() function in hw/net/net_tx_pkt.c when trying to calculate the checksum of a short-sized fragmented packet. This flaw allows a malicious guest to crash QEMU and cause a denial of service condition.
CVE-2024-3567
A flaw was found in QEMU. An assertion failure was present in the update_sctp_checksum() function in hw/net/net_tx_pkt.c when trying to calculate the checksum of a short-sized fragmented packet. This flaw allows a malicious guest to crash QEMU and cause a denial of service condition.
CVE-2024-3567
A flaw was found in QEMU. An assertion failure was present in the update_sctp_checksum() function in hw/net/net_tx_pkt.c when trying to calculate the checksum of a short-sized fragmented packet. This flaw allows a malicious guest to crash QEMU and cause a denial of service condition.
CVE-2024-3567
CVE-2024-3567
A flaw was found in QEMU. An assertion failure was present in the upda ...
CVE-2023-6693
A stack based buffer overflow was found in the virtio-net device of QEMU. This issue occurs when flushing TX in the virtio_net_flush_tx function if guest features VIRTIO_NET_F_HASH_REPORT, VIRTIO_F_VERSION_1 and VIRTIO_NET_F_MRG_RXBUF are enabled. This could allow a malicious user to overwrite local variables allocated on the stack. Specifically, the `out_sg` variable could be used to read a part of process memory and send it to the wire, causing an information leak.
CVE-2023-6693
A stack based buffer overflow was found in the virtio-net device of QEMU. This issue occurs when flushing TX in the virtio_net_flush_tx function if guest features VIRTIO_NET_F_HASH_REPORT, VIRTIO_F_VERSION_1 and VIRTIO_NET_F_MRG_RXBUF are enabled. This could allow a malicious user to overwrite local variables allocated on the stack. Specifically, the `out_sg` variable could be used to read a part of process memory and send it to the wire, causing an information leak.
CVE-2023-6693
A stack based buffer overflow was found in the virtio-net device of QEMU. This issue occurs when flushing TX in the virtio_net_flush_tx function if guest features VIRTIO_NET_F_HASH_REPORT, VIRTIO_F_VERSION_1 and VIRTIO_NET_F_MRG_RXBUF are enabled. This could allow a malicious user to overwrite local variables allocated on the stack. Specifically, the `out_sg` variable could be used to read a part of process memory and send it to the wire, causing an information leak.
CVE-2023-6693
CVE-2023-6693
A stack based buffer overflow was found in the virtio-net device of QE ...
ELSA-2024-12605
ELSA-2024-12605: virt:kvm_utils2 security update (IMPORTANT)
ROS-20240627-05
Уязвимость qemu
GHSA-mqq7-33jf-2x53
A flaw was found in QEMU. An assertion failure was present in the update_sctp_checksum() function in hw/net/net_tx_pkt.c when trying to calculate the checksum of a short-sized fragmented packet. This flaw allows a malicious guest to crash QEMU and cause a denial of service condition.
BDU:2024-04887
Уязвимость функции update_sctp_checksum() эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании
GHSA-835p-c6x8-xh5f
A stack based buffer overflow was found in the virtio-net device of QEMU. This issue occurs when flushing TX in the virtio_net_flush_tx function if guest features VIRTIO_NET_F_HASH_REPORT, VIRTIO_F_VERSION_1 and VIRTIO_NET_F_MRG_RXBUF are enabled. This could allow a malicious user to overwrite local variables allocated on the stack. Specifically, the `out_sg` variable could be used to read a part of process memory and send it to the wire, causing an information leak.
BDU:2024-04886
Уязвимость интерфейса virtio-net сервера QEMU, позволяющая нарушителю вызвать утечку информации
SUSE-SU-2024:3229-1
Security update for qemu
ELSA-2024-2962
ELSA-2024-2962: virt:ol and virt-devel:rhel security and enhancement update (MODERATE)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
RLSA-2025:4492 Moderate: qemu-kvm security update | 4 месяца назад | |||
ELSA-2025-4492 ELSA-2025-4492: qemu-kvm security update (MODERATE) | 7 месяцев назад | |||
CVE-2024-3567 A flaw was found in QEMU. An assertion failure was present in the update_sctp_checksum() function in hw/net/net_tx_pkt.c when trying to calculate the checksum of a short-sized fragmented packet. This flaw allows a malicious guest to crash QEMU and cause a denial of service condition. | CVSS3: 5.5 | 0% Низкий | больше 1 года назад | |
CVE-2024-3567 A flaw was found in QEMU. An assertion failure was present in the update_sctp_checksum() function in hw/net/net_tx_pkt.c when trying to calculate the checksum of a short-sized fragmented packet. This flaw allows a malicious guest to crash QEMU and cause a denial of service condition. | CVSS3: 5.5 | 0% Низкий | больше 1 года назад | |
CVE-2024-3567 A flaw was found in QEMU. An assertion failure was present in the update_sctp_checksum() function in hw/net/net_tx_pkt.c when trying to calculate the checksum of a short-sized fragmented packet. This flaw allows a malicious guest to crash QEMU and cause a denial of service condition. | CVSS3: 5.5 | 0% Низкий | больше 1 года назад | |
CVSS3: 5.5 | 0% Низкий | 7 месяцев назад | ||
CVE-2024-3567 A flaw was found in QEMU. An assertion failure was present in the upda ... | CVSS3: 5.5 | 0% Низкий | больше 1 года назад | |
CVE-2023-6693 A stack based buffer overflow was found in the virtio-net device of QEMU. This issue occurs when flushing TX in the virtio_net_flush_tx function if guest features VIRTIO_NET_F_HASH_REPORT, VIRTIO_F_VERSION_1 and VIRTIO_NET_F_MRG_RXBUF are enabled. This could allow a malicious user to overwrite local variables allocated on the stack. Specifically, the `out_sg` variable could be used to read a part of process memory and send it to the wire, causing an information leak. | CVSS3: 4.9 | 0% Низкий | почти 2 года назад | |
CVE-2023-6693 A stack based buffer overflow was found in the virtio-net device of QEMU. This issue occurs when flushing TX in the virtio_net_flush_tx function if guest features VIRTIO_NET_F_HASH_REPORT, VIRTIO_F_VERSION_1 and VIRTIO_NET_F_MRG_RXBUF are enabled. This could allow a malicious user to overwrite local variables allocated on the stack. Specifically, the `out_sg` variable could be used to read a part of process memory and send it to the wire, causing an information leak. | CVSS3: 4.9 | 0% Низкий | почти 2 года назад | |
CVE-2023-6693 A stack based buffer overflow was found in the virtio-net device of QEMU. This issue occurs when flushing TX in the virtio_net_flush_tx function if guest features VIRTIO_NET_F_HASH_REPORT, VIRTIO_F_VERSION_1 and VIRTIO_NET_F_MRG_RXBUF are enabled. This could allow a malicious user to overwrite local variables allocated on the stack. Specifically, the `out_sg` variable could be used to read a part of process memory and send it to the wire, causing an information leak. | CVSS3: 4.9 | 0% Низкий | почти 2 года назад | |
CVSS3: 5.3 | 0% Низкий | 8 месяцев назад | ||
CVE-2023-6693 A stack based buffer overflow was found in the virtio-net device of QE ... | CVSS3: 4.9 | 0% Низкий | почти 2 года назад | |
ELSA-2024-12605 ELSA-2024-12605: virt:kvm_utils2 security update (IMPORTANT) | около 1 года назад | |||
ROS-20240627-05 Уязвимость qemu | CVSS3: 5.5 | 0% Низкий | больше 1 года назад | |
GHSA-mqq7-33jf-2x53 A flaw was found in QEMU. An assertion failure was present in the update_sctp_checksum() function in hw/net/net_tx_pkt.c when trying to calculate the checksum of a short-sized fragmented packet. This flaw allows a malicious guest to crash QEMU and cause a denial of service condition. | CVSS3: 5.5 | 0% Низкий | больше 1 года назад | |
BDU:2024-04887 Уязвимость функции update_sctp_checksum() эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 5.5 | 0% Низкий | больше 1 года назад | |
GHSA-835p-c6x8-xh5f A stack based buffer overflow was found in the virtio-net device of QEMU. This issue occurs when flushing TX in the virtio_net_flush_tx function if guest features VIRTIO_NET_F_HASH_REPORT, VIRTIO_F_VERSION_1 and VIRTIO_NET_F_MRG_RXBUF are enabled. This could allow a malicious user to overwrite local variables allocated on the stack. Specifically, the `out_sg` variable could be used to read a part of process memory and send it to the wire, causing an information leak. | CVSS3: 4.9 | 0% Низкий | почти 2 года назад | |
BDU:2024-04886 Уязвимость интерфейса virtio-net сервера QEMU, позволяющая нарушителю вызвать утечку информации | CVSS3: 5.3 | 0% Низкий | почти 2 года назад | |
SUSE-SU-2024:3229-1 Security update for qemu | около 1 года назад | |||
ELSA-2024-2962 ELSA-2024-2962: virt:ol and virt-devel:rhel security and enhancement update (MODERATE) | больше 1 года назад |
Уязвимостей на страницу