Количество 8
Количество 8
CVE-2013-2016
A flaw was found in the way qemu v1.3.0 and later (virtio-rng) validates addresses when guest accesses the config space of a virtio device. If the virtio device has zero/small sized config space, such as virtio-rng, a privileged guest user could use this flaw to access the matching host's qemu address space and thus increase their privileges on the host.
CVE-2013-2016
A flaw was found in the way qemu v1.3.0 and later (virtio-rng) validates addresses when guest accesses the config space of a virtio device. If the virtio device has zero/small sized config space, such as virtio-rng, a privileged guest user could use this flaw to access the matching host's qemu address space and thus increase their privileges on the host.
CVE-2013-2016
A flaw was found in the way qemu v1.3.0 and later (virtio-rng) validates addresses when guest accesses the config space of a virtio device. If the virtio device has zero/small sized config space, such as virtio-rng, a privileged guest user could use this flaw to access the matching host's qemu address space and thus increase their privileges on the host.
CVE-2013-2016
A flaw was found in the way qemu v1.3.0 and later (virtio-rng) validat ...
GHSA-hch7-9gh2-qf6g
A flaw was found in the way qemu v1.3.0 and later (virtio-rng) validates addresses when guest accesses the config space of a virtio device. If the virtio device has zero/small sized config space, such as virtio-rng, a privileged guest user could use this flaw to access the matching host's qemu address space and thus increase their privileges on the host.
SUSE-SU-2015:1152-1
Security update for kvm
SUSE-SU-2015:0889-1
Security update for kvm
SUSE-SU-2015:0870-1
Security update for kvm
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2013-2016 A flaw was found in the way qemu v1.3.0 and later (virtio-rng) validates addresses when guest accesses the config space of a virtio device. If the virtio device has zero/small sized config space, such as virtio-rng, a privileged guest user could use this flaw to access the matching host's qemu address space and thus increase their privileges on the host. | CVSS3: 7.8 | 0% Низкий | около 6 лет назад | |
CVE-2013-2016 A flaw was found in the way qemu v1.3.0 and later (virtio-rng) validates addresses when guest accesses the config space of a virtio device. If the virtio device has zero/small sized config space, such as virtio-rng, a privileged guest user could use this flaw to access the matching host's qemu address space and thus increase their privileges on the host. | CVSS2: 6.5 | 0% Низкий | почти 13 лет назад | |
CVE-2013-2016 A flaw was found in the way qemu v1.3.0 and later (virtio-rng) validates addresses when guest accesses the config space of a virtio device. If the virtio device has zero/small sized config space, such as virtio-rng, a privileged guest user could use this flaw to access the matching host's qemu address space and thus increase their privileges on the host. | CVSS3: 7.8 | 0% Низкий | около 6 лет назад | |
CVE-2013-2016 A flaw was found in the way qemu v1.3.0 and later (virtio-rng) validat ... | CVSS3: 7.8 | 0% Низкий | около 6 лет назад | |
GHSA-hch7-9gh2-qf6g A flaw was found in the way qemu v1.3.0 and later (virtio-rng) validates addresses when guest accesses the config space of a virtio device. If the virtio device has zero/small sized config space, such as virtio-rng, a privileged guest user could use this flaw to access the matching host's qemu address space and thus increase their privileges on the host. | CVSS3: 7.8 | 0% Низкий | почти 4 года назад | |
SUSE-SU-2015:1152-1 Security update for kvm | больше 11 лет назад | |||
SUSE-SU-2015:0889-1 Security update for kvm | больше 11 лет назад | |||
SUSE-SU-2015:0870-1 Security update for kvm | больше 11 лет назад |
Уязвимостей на страницу