Количество 14
Количество 14

CVE-2021-3409
The patch for CVE-2020-17380/CVE-2020-25085 was found to be ineffective, thus making QEMU vulnerable to the out-of-bounds read/write access issues previously found in the SDHCI controller emulation code. This flaw allows a malicious privileged guest to crash the QEMU process on the host, resulting in a denial of service or potential code execution. QEMU up to (including) 5.2.0 is affected by this.

CVE-2021-3409
The patch for CVE-2020-17380/CVE-2020-25085 was found to be ineffective, thus making QEMU vulnerable to the out-of-bounds read/write access issues previously found in the SDHCI controller emulation code. This flaw allows a malicious privileged guest to crash the QEMU process on the host, resulting in a denial of service or potential code execution. QEMU up to (including) 5.2.0 is affected by this.

CVE-2021-3409
The patch for CVE-2020-17380/CVE-2020-25085 was found to be ineffective, thus making QEMU vulnerable to the out-of-bounds read/write access issues previously found in the SDHCI controller emulation code. This flaw allows a malicious privileged guest to crash the QEMU process on the host, resulting in a denial of service or potential code execution. QEMU up to (including) 5.2.0 is affected by this.

CVE-2021-3409
CVE-2021-3409
The patch for CVE-2020-17380/CVE-2020-25085 was found to be ineffectiv ...
GHSA-mx4g-vhmg-3rf6
The patch for CVE-2020-17380/CVE-2020-25085 was found to be ineffective, thus making QEMU vulnerable to the out-of-bounds read/write access issues previously found in the SDHCI controller emulation code. This flaw allows a malicious privileged guest to crash the QEMU process on the host, resulting in a denial of service or potential code execution. QEMU up to (including) 5.2.0 is affected by this.

BDU:2022-05831
Уязвимость эмулятора аппаратного обеспечения QEMU, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
ELSA-2021-9285
ELSA-2021-9285: qemu security update (IMPORTANT)

SUSE-SU-2022:3594-1
Security update for qemu

SUSE-SU-2022:3768-1
Security update for qemu

openSUSE-SU-2021:1942-1
Security update for qemu

SUSE-SU-2023:0761-1
Security update for qemu

SUSE-SU-2021:1942-1
Security update for qemu
ELSA-2021-9568
ELSA-2021-9568: virt:kvm_utils security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2021-3409 The patch for CVE-2020-17380/CVE-2020-25085 was found to be ineffective, thus making QEMU vulnerable to the out-of-bounds read/write access issues previously found in the SDHCI controller emulation code. This flaw allows a malicious privileged guest to crash the QEMU process on the host, resulting in a denial of service or potential code execution. QEMU up to (including) 5.2.0 is affected by this. | CVSS3: 5.7 | 0% Низкий | около 4 лет назад |
![]() | CVE-2021-3409 The patch for CVE-2020-17380/CVE-2020-25085 was found to be ineffective, thus making QEMU vulnerable to the out-of-bounds read/write access issues previously found in the SDHCI controller emulation code. This flaw allows a malicious privileged guest to crash the QEMU process on the host, resulting in a denial of service or potential code execution. QEMU up to (including) 5.2.0 is affected by this. | CVSS3: 5.7 | 0% Низкий | больше 4 лет назад |
![]() | CVE-2021-3409 The patch for CVE-2020-17380/CVE-2020-25085 was found to be ineffective, thus making QEMU vulnerable to the out-of-bounds read/write access issues previously found in the SDHCI controller emulation code. This flaw allows a malicious privileged guest to crash the QEMU process on the host, resulting in a denial of service or potential code execution. QEMU up to (including) 5.2.0 is affected by this. | CVSS3: 5.7 | 0% Низкий | около 4 лет назад |
![]() | CVSS3: 5.7 | 0% Низкий | около 4 лет назад | |
CVE-2021-3409 The patch for CVE-2020-17380/CVE-2020-25085 was found to be ineffectiv ... | CVSS3: 5.7 | 0% Низкий | около 4 лет назад | |
GHSA-mx4g-vhmg-3rf6 The patch for CVE-2020-17380/CVE-2020-25085 was found to be ineffective, thus making QEMU vulnerable to the out-of-bounds read/write access issues previously found in the SDHCI controller emulation code. This flaw allows a malicious privileged guest to crash the QEMU process on the host, resulting in a denial of service or potential code execution. QEMU up to (including) 5.2.0 is affected by this. | CVSS3: 5.7 | 0% Низкий | около 3 лет назад | |
![]() | BDU:2022-05831 Уязвимость эмулятора аппаратного обеспечения QEMU, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании | CVSS3: 5.7 | 0% Низкий | больше 4 лет назад |
ELSA-2021-9285 ELSA-2021-9285: qemu security update (IMPORTANT) | около 4 лет назад | |||
![]() | SUSE-SU-2022:3594-1 Security update for qemu | больше 2 лет назад | ||
![]() | SUSE-SU-2022:3768-1 Security update for qemu | больше 2 лет назад | ||
![]() | openSUSE-SU-2021:1942-1 Security update for qemu | почти 4 года назад | ||
![]() | SUSE-SU-2023:0761-1 Security update for qemu | больше 2 лет назад | ||
![]() | SUSE-SU-2021:1942-1 Security update for qemu | около 4 лет назад | ||
ELSA-2021-9568 ELSA-2021-9568: virt:kvm_utils security update (IMPORTANT) | больше 3 лет назад |
Уязвимостей на страницу