Логотип exploitDog
bind:"GHSA-59fq-gggw-pqjr" OR bind:"CVE-2025-12464"
Консоль
Логотип exploitDog

exploitDog

bind:"GHSA-59fq-gggw-pqjr" OR bind:"CVE-2025-12464"

Количество 11

Количество 11

github логотип

GHSA-59fq-gggw-pqjr

3 месяца назад

A stack-based buffer overflow was found in the QEMU e1000 network device. The code for padding short frames was dropped from individual network devices and moved to the net core code. The issue stems from the device's receive code still being able to process a short frame in loopback mode. This could lead to a buffer overrun in the e1000_receive_iov() function via the loopback code path. A malicious guest user could use this vulnerability to crash the QEMU process on the host, resulting in a denial of service.

CVSS3: 6.2
EPSS: Низкий
ubuntu логотип

CVE-2025-12464

3 месяца назад

A stack-based buffer overflow was found in the QEMU e1000 network device. The code for padding short frames was dropped from individual network devices and moved to the net core code. The issue stems from the device's receive code still being able to process a short frame in loopback mode. This could lead to a buffer overrun in the e1000_receive_iov() function via the loopback code path. A malicious guest user could use this vulnerability to crash the QEMU process on the host, resulting in a denial of service.

CVSS3: 6.2
EPSS: Низкий
nvd логотип

CVE-2025-12464

3 месяца назад

A stack-based buffer overflow was found in the QEMU e1000 network device. The code for padding short frames was dropped from individual network devices and moved to the net core code. The issue stems from the device's receive code still being able to process a short frame in loopback mode. This could lead to a buffer overrun in the e1000_receive_iov() function via the loopback code path. A malicious guest user could use this vulnerability to crash the QEMU process on the host, resulting in a denial of service.

CVSS3: 6.2
EPSS: Низкий
msrc логотип

CVE-2025-12464

3 месяца назад

Qemu-kvm: stack buffer overflow in e1000 device via short frames in loopback mode

CVSS3: 6.2
EPSS: Низкий
debian логотип

CVE-2025-12464

3 месяца назад

A stack-based buffer overflow was found in the QEMU e1000 network devi ...

CVSS3: 6.2
EPSS: Низкий
fstec логотип

BDU:2026-00527

3 месяца назад

Уязвимость компонента e1000 Device эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 8
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2025:20171-1

около 2 месяцев назад

Security update for qemu

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0288-1

11 дней назад

Security update for qemu

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0022-1

около 1 месяца назад

Security update for qemu

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0043-1

около 1 месяца назад

Security update for qemu

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0039-1

около 1 месяца назад

Security update for qemu

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-59fq-gggw-pqjr

A stack-based buffer overflow was found in the QEMU e1000 network device. The code for padding short frames was dropped from individual network devices and moved to the net core code. The issue stems from the device's receive code still being able to process a short frame in loopback mode. This could lead to a buffer overrun in the e1000_receive_iov() function via the loopback code path. A malicious guest user could use this vulnerability to crash the QEMU process on the host, resulting in a denial of service.

CVSS3: 6.2
0%
Низкий
3 месяца назад
ubuntu логотип
CVE-2025-12464

A stack-based buffer overflow was found in the QEMU e1000 network device. The code for padding short frames was dropped from individual network devices and moved to the net core code. The issue stems from the device's receive code still being able to process a short frame in loopback mode. This could lead to a buffer overrun in the e1000_receive_iov() function via the loopback code path. A malicious guest user could use this vulnerability to crash the QEMU process on the host, resulting in a denial of service.

CVSS3: 6.2
0%
Низкий
3 месяца назад
nvd логотип
CVE-2025-12464

A stack-based buffer overflow was found in the QEMU e1000 network device. The code for padding short frames was dropped from individual network devices and moved to the net core code. The issue stems from the device's receive code still being able to process a short frame in loopback mode. This could lead to a buffer overrun in the e1000_receive_iov() function via the loopback code path. A malicious guest user could use this vulnerability to crash the QEMU process on the host, resulting in a denial of service.

CVSS3: 6.2
0%
Низкий
3 месяца назад
msrc логотип
CVE-2025-12464

Qemu-kvm: stack buffer overflow in e1000 device via short frames in loopback mode

CVSS3: 6.2
0%
Низкий
3 месяца назад
debian логотип
CVE-2025-12464

A stack-based buffer overflow was found in the QEMU e1000 network devi ...

CVSS3: 6.2
0%
Низкий
3 месяца назад
fstec логотип
BDU:2026-00527

Уязвимость компонента e1000 Device эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 8
0%
Низкий
3 месяца назад
suse-cvrf логотип
openSUSE-SU-2025:20171-1

Security update for qemu

около 2 месяцев назад
suse-cvrf логотип
SUSE-SU-2026:0288-1

Security update for qemu

11 дней назад
suse-cvrf логотип
SUSE-SU-2026:0022-1

Security update for qemu

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2026:0043-1

Security update for qemu

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2026:0039-1

Security update for qemu

около 1 месяца назад

Уязвимостей на страницу