Количество 53
Количество 53

CVE-2022-26353
A flaw was found in the virtio-net device of QEMU. This flaw was inadvertently introduced with the fix for CVE-2021-3748, which forgot to unmap the cached virtqueue elements on error, leading to memory leakage and other unexpected results. Affected QEMU version: 6.2.0.

CVE-2022-26353
A flaw was found in the virtio-net device of QEMU. This flaw was inadvertently introduced with the fix for CVE-2021-3748, which forgot to unmap the cached virtqueue elements on error, leading to memory leakage and other unexpected results. Affected QEMU version: 6.2.0.

CVE-2022-26353
CVE-2022-26353
A flaw was found in the virtio-net device of QEMU. This flaw was inadv ...
GHSA-xrwp-4qvv-59wr
A flaw was found in the virtio-net device of QEMU. This flaw was inadvertently introduced with the fix for CVE-2021-3748, which forgot to unmap the cached virtqueue elements on error, leading to memory leakage and other unexpected results. Affected QEMU version: 6.2.0.

BDU:2022-05847
Уязвимость устройства virtio-net эмулятора аппаратного обеспечения QEMU, связанная с неосвобождением ресурса после истечения действительного срока его эксплуатирования, позволяющая нарушителю вызвать отказ в обслуживании
ELSA-2022-9494
ELSA-2022-9494: olcne security update (IMPORTANT)
ELSA-2022-9493
ELSA-2022-9493: olcne security update (IMPORTANT)
ELSA-2022-9492
ELSA-2022-9492: olcne security update (IMPORTANT)
ELSA-2022-9491
ELSA-2022-9491: olcne security update (IMPORTANT)
ELSA-2022-5263
ELSA-2022-5263: qemu-kvm security and bug fix update (MODERATE)

CVE-2022-0216
A use-after-free vulnerability was found in the LSI53C895A SCSI Host Bus Adapter emulation of QEMU. The flaw occurs while processing repeated messages to cancel the current SCSI request via the lsi_do_msgout function. This flaw allows a malicious privileged user within the guest to crash the QEMU process on the host, resulting in a denial of service.

CVE-2022-0216
A use-after-free vulnerability was found in the LSI53C895A SCSI Host Bus Adapter emulation of QEMU. The flaw occurs while processing repeated messages to cancel the current SCSI request via the lsi_do_msgout function. This flaw allows a malicious privileged user within the guest to crash the QEMU process on the host, resulting in a denial of service.

CVE-2022-0216
A use-after-free vulnerability was found in the LSI53C895A SCSI Host Bus Adapter emulation of QEMU. The flaw occurs while processing repeated messages to cancel the current SCSI request via the lsi_do_msgout function. This flaw allows a malicious privileged user within the guest to crash the QEMU process on the host, resulting in a denial of service.
CVE-2022-0216
A use-after-free vulnerability was found in the LSI53C895A SCSI Host B ...
ELSA-2022-9432
ELSA-2022-9432: qemu security update (IMPORTANT)

CVE-2021-4207
A flaw was found in the QXL display device emulation in QEMU. A double fetch of guest controlled values `cursor->header.width` and `cursor->header.height` can lead to the allocation of a small cursor object followed by a subsequent heap-based buffer overflow. A malicious privileged guest user could use this flaw to crash the QEMU process on the host or potentially execute arbitrary code within the context of the QEMU process.

CVE-2021-4207
A flaw was found in the QXL display device emulation in QEMU. A double fetch of guest controlled values `cursor->header.width` and `cursor->header.height` can lead to the allocation of a small cursor object followed by a subsequent heap-based buffer overflow. A malicious privileged guest user could use this flaw to crash the QEMU process on the host or potentially execute arbitrary code within the context of the QEMU process.

CVE-2021-4207
A flaw was found in the QXL display device emulation in QEMU. A double fetch of guest controlled values `cursor->header.width` and `cursor->header.height` can lead to the allocation of a small cursor object followed by a subsequent heap-based buffer overflow. A malicious privileged guest user could use this flaw to crash the QEMU process on the host or potentially execute arbitrary code within the context of the QEMU process.

CVE-2021-4207
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2022-26353 A flaw was found in the virtio-net device of QEMU. This flaw was inadvertently introduced with the fix for CVE-2021-3748, which forgot to unmap the cached virtqueue elements on error, leading to memory leakage and other unexpected results. Affected QEMU version: 6.2.0. | CVSS3: 7.5 | 0% Низкий | больше 3 лет назад |
![]() | CVE-2022-26353 A flaw was found in the virtio-net device of QEMU. This flaw was inadvertently introduced with the fix for CVE-2021-3748, which forgot to unmap the cached virtqueue elements on error, leading to memory leakage and other unexpected results. Affected QEMU version: 6.2.0. | CVSS3: 7.5 | 0% Низкий | больше 3 лет назад |
![]() | CVSS3: 7.5 | 0% Низкий | 12 месяцев назад | |
CVE-2022-26353 A flaw was found in the virtio-net device of QEMU. This flaw was inadv ... | CVSS3: 7.5 | 0% Низкий | больше 3 лет назад | |
GHSA-xrwp-4qvv-59wr A flaw was found in the virtio-net device of QEMU. This flaw was inadvertently introduced with the fix for CVE-2021-3748, which forgot to unmap the cached virtqueue elements on error, leading to memory leakage and other unexpected results. Affected QEMU version: 6.2.0. | CVSS3: 7.5 | 0% Низкий | больше 3 лет назад | |
![]() | BDU:2022-05847 Уязвимость устройства virtio-net эмулятора аппаратного обеспечения QEMU, связанная с неосвобождением ресурса после истечения действительного срока его эксплуатирования, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7.5 | 0% Низкий | больше 3 лет назад |
ELSA-2022-9494 ELSA-2022-9494: olcne security update (IMPORTANT) | около 3 лет назад | |||
ELSA-2022-9493 ELSA-2022-9493: olcne security update (IMPORTANT) | около 3 лет назад | |||
ELSA-2022-9492 ELSA-2022-9492: olcne security update (IMPORTANT) | около 3 лет назад | |||
ELSA-2022-9491 ELSA-2022-9491: olcne security update (IMPORTANT) | около 3 лет назад | |||
ELSA-2022-5263 ELSA-2022-5263: qemu-kvm security and bug fix update (MODERATE) | около 3 лет назад | |||
![]() | CVE-2022-0216 A use-after-free vulnerability was found in the LSI53C895A SCSI Host Bus Adapter emulation of QEMU. The flaw occurs while processing repeated messages to cancel the current SCSI request via the lsi_do_msgout function. This flaw allows a malicious privileged user within the guest to crash the QEMU process on the host, resulting in a denial of service. | CVSS3: 4.4 | 0% Низкий | почти 3 года назад |
![]() | CVE-2022-0216 A use-after-free vulnerability was found in the LSI53C895A SCSI Host Bus Adapter emulation of QEMU. The flaw occurs while processing repeated messages to cancel the current SCSI request via the lsi_do_msgout function. This flaw allows a malicious privileged user within the guest to crash the QEMU process on the host, resulting in a denial of service. | CVSS3: 5.3 | 0% Низкий | больше 3 лет назад |
![]() | CVE-2022-0216 A use-after-free vulnerability was found in the LSI53C895A SCSI Host Bus Adapter emulation of QEMU. The flaw occurs while processing repeated messages to cancel the current SCSI request via the lsi_do_msgout function. This flaw allows a malicious privileged user within the guest to crash the QEMU process on the host, resulting in a denial of service. | CVSS3: 4.4 | 0% Низкий | почти 3 года назад |
CVE-2022-0216 A use-after-free vulnerability was found in the LSI53C895A SCSI Host B ... | CVSS3: 4.4 | 0% Низкий | почти 3 года назад | |
ELSA-2022-9432 ELSA-2022-9432: qemu security update (IMPORTANT) | около 3 лет назад | |||
![]() | CVE-2021-4207 A flaw was found in the QXL display device emulation in QEMU. A double fetch of guest controlled values `cursor->header.width` and `cursor->header.height` can lead to the allocation of a small cursor object followed by a subsequent heap-based buffer overflow. A malicious privileged guest user could use this flaw to crash the QEMU process on the host or potentially execute arbitrary code within the context of the QEMU process. | CVSS3: 8.2 | 0% Низкий | около 3 лет назад |
![]() | CVE-2021-4207 A flaw was found in the QXL display device emulation in QEMU. A double fetch of guest controlled values `cursor->header.width` and `cursor->header.height` can lead to the allocation of a small cursor object followed by a subsequent heap-based buffer overflow. A malicious privileged guest user could use this flaw to crash the QEMU process on the host or potentially execute arbitrary code within the context of the QEMU process. | CVSS3: 7.5 | 0% Низкий | больше 3 лет назад |
![]() | CVE-2021-4207 A flaw was found in the QXL display device emulation in QEMU. A double fetch of guest controlled values `cursor->header.width` and `cursor->header.height` can lead to the allocation of a small cursor object followed by a subsequent heap-based buffer overflow. A malicious privileged guest user could use this flaw to crash the QEMU process on the host or potentially execute arbitrary code within the context of the QEMU process. | CVSS3: 8.2 | 0% Низкий | около 3 лет назад |
![]() | CVSS3: 8.2 | 0% Низкий | 11 месяцев назад |
Уязвимостей на страницу