Количество 47
Количество 47
SUSE-SU-2023:3082-1
Security update for qemu
ROS-20240606-01
Множественные уязвимости qemu
GHSA-9627-hqj3-f64h
A bug in QEMU could cause a guest I/O operation otherwise addressed to an arbitrary disk offset to be targeted to offset 0 instead (potentially overwriting the VM's boot code). This could be used, for example, by L2 guests with a virtual disk (vdiskL2) stored on a virtual disk of an L1 (vdiskL1) hypervisor to read and/or write data to LBA 0 of vdiskL1, potentially gaining control of L1 at its next reboot.
ELSA-2023-12855
ELSA-2023-12855: kvm_utils3 security update (IMPORTANT)
BDU:2023-07853
Уязвимость функции ide_dma_cb() эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю получить доступ на чтение, изменение или удаление данных или вызвать отказ в обслуживании
ROS-20240625-04
Уязвимости qemu
CVE-2023-6693
A stack based buffer overflow was found in the virtio-net device of QEMU. This issue occurs when flushing TX in the virtio_net_flush_tx function if guest features VIRTIO_NET_F_HASH_REPORT, VIRTIO_F_VERSION_1 and VIRTIO_NET_F_MRG_RXBUF are enabled. This could allow a malicious user to overwrite local variables allocated on the stack. Specifically, the `out_sg` variable could be used to read a part of process memory and send it to the wire, causing an information leak.
CVE-2023-6693
A stack based buffer overflow was found in the virtio-net device of QEMU. This issue occurs when flushing TX in the virtio_net_flush_tx function if guest features VIRTIO_NET_F_HASH_REPORT, VIRTIO_F_VERSION_1 and VIRTIO_NET_F_MRG_RXBUF are enabled. This could allow a malicious user to overwrite local variables allocated on the stack. Specifically, the `out_sg` variable could be used to read a part of process memory and send it to the wire, causing an information leak.
CVE-2023-6693
A stack based buffer overflow was found in the virtio-net device of QEMU. This issue occurs when flushing TX in the virtio_net_flush_tx function if guest features VIRTIO_NET_F_HASH_REPORT, VIRTIO_F_VERSION_1 and VIRTIO_NET_F_MRG_RXBUF are enabled. This could allow a malicious user to overwrite local variables allocated on the stack. Specifically, the `out_sg` variable could be used to read a part of process memory and send it to the wire, causing an information leak.
CVE-2023-6693
CVE-2023-6693
A stack based buffer overflow was found in the virtio-net device of QE ...
CVE-2023-6683
A flaw was found in the QEMU built-in VNC server while processing ClientCutText messages. The qemu_clipboard_request() function can be reached before vnc_server_cut_text_caps() was called and had the chance to initialize the clipboard peer, leading to a NULL pointer dereference. This could allow a malicious authenticated VNC client to crash QEMU and trigger a denial of service.
CVE-2023-6683
A flaw was found in the QEMU built-in VNC server while processing ClientCutText messages. The qemu_clipboard_request() function can be reached before vnc_server_cut_text_caps() was called and had the chance to initialize the clipboard peer, leading to a NULL pointer dereference. This could allow a malicious authenticated VNC client to crash QEMU and trigger a denial of service.
CVE-2023-6683
A flaw was found in the QEMU built-in VNC server while processing ClientCutText messages. The qemu_clipboard_request() function can be reached before vnc_server_cut_text_caps() was called and had the chance to initialize the clipboard peer, leading to a NULL pointer dereference. This could allow a malicious authenticated VNC client to crash QEMU and trigger a denial of service.
CVE-2023-6683
CVE-2023-6683
A flaw was found in the QEMU built-in VNC server while processing Clie ...
ROS-20240401-01
Множественные уязвимости qemu
GHSA-x9c6-9g9w-hg73
A flaw was found in the QEMU built-in VNC server while processing ClientCutText messages. The qemu_clipboard_request() function can be reached before vnc_server_cut_text_caps() was called and had the chance to initialize the clipboard peer, leading to a NULL pointer dereference. This could allow a malicious authenticated VNC client to crash QEMU and trigger a denial of service.
GHSA-835p-c6x8-xh5f
A stack based buffer overflow was found in the virtio-net device of QEMU. This issue occurs when flushing TX in the virtio_net_flush_tx function if guest features VIRTIO_NET_F_HASH_REPORT, VIRTIO_F_VERSION_1 and VIRTIO_NET_F_MRG_RXBUF are enabled. This could allow a malicious user to overwrite local variables allocated on the stack. Specifically, the `out_sg` variable could be used to read a part of process memory and send it to the wire, causing an information leak.
BDU:2024-04886
Уязвимость интерфейса virtio-net сервера QEMU, позволяющая нарушителю вызвать утечку информации
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
SUSE-SU-2023:3082-1 Security update for qemu | больше 2 лет назад | |||
ROS-20240606-01 Множественные уязвимости qemu | CVSS3: 7.5 | больше 1 года назад | ||
GHSA-9627-hqj3-f64h A bug in QEMU could cause a guest I/O operation otherwise addressed to an arbitrary disk offset to be targeted to offset 0 instead (potentially overwriting the VM's boot code). This could be used, for example, by L2 guests with a virtual disk (vdiskL2) stored on a virtual disk of an L1 (vdiskL1) hypervisor to read and/or write data to LBA 0 of vdiskL1, potentially gaining control of L1 at its next reboot. | CVSS3: 6.4 | 0% Низкий | около 2 лет назад | |
ELSA-2023-12855 ELSA-2023-12855: kvm_utils3 security update (IMPORTANT) | около 2 лет назад | |||
BDU:2023-07853 Уязвимость функции ide_dma_cb() эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю получить доступ на чтение, изменение или удаление данных или вызвать отказ в обслуживании | CVSS3: 6.4 | 0% Низкий | около 2 лет назад | |
ROS-20240625-04 Уязвимости qemu | CVSS3: 6.5 | больше 1 года назад | ||
CVE-2023-6693 A stack based buffer overflow was found in the virtio-net device of QEMU. This issue occurs when flushing TX in the virtio_net_flush_tx function if guest features VIRTIO_NET_F_HASH_REPORT, VIRTIO_F_VERSION_1 and VIRTIO_NET_F_MRG_RXBUF are enabled. This could allow a malicious user to overwrite local variables allocated on the stack. Specifically, the `out_sg` variable could be used to read a part of process memory and send it to the wire, causing an information leak. | CVSS3: 4.9 | 0% Низкий | почти 2 года назад | |
CVE-2023-6693 A stack based buffer overflow was found in the virtio-net device of QEMU. This issue occurs when flushing TX in the virtio_net_flush_tx function if guest features VIRTIO_NET_F_HASH_REPORT, VIRTIO_F_VERSION_1 and VIRTIO_NET_F_MRG_RXBUF are enabled. This could allow a malicious user to overwrite local variables allocated on the stack. Specifically, the `out_sg` variable could be used to read a part of process memory and send it to the wire, causing an information leak. | CVSS3: 4.9 | 0% Низкий | почти 2 года назад | |
CVE-2023-6693 A stack based buffer overflow was found in the virtio-net device of QEMU. This issue occurs when flushing TX in the virtio_net_flush_tx function if guest features VIRTIO_NET_F_HASH_REPORT, VIRTIO_F_VERSION_1 and VIRTIO_NET_F_MRG_RXBUF are enabled. This could allow a malicious user to overwrite local variables allocated on the stack. Specifically, the `out_sg` variable could be used to read a part of process memory and send it to the wire, causing an information leak. | CVSS3: 4.9 | 0% Низкий | почти 2 года назад | |
CVSS3: 5.3 | 0% Низкий | 9 месяцев назад | ||
CVE-2023-6693 A stack based buffer overflow was found in the virtio-net device of QE ... | CVSS3: 4.9 | 0% Низкий | почти 2 года назад | |
CVE-2023-6683 A flaw was found in the QEMU built-in VNC server while processing ClientCutText messages. The qemu_clipboard_request() function can be reached before vnc_server_cut_text_caps() was called and had the chance to initialize the clipboard peer, leading to a NULL pointer dereference. This could allow a malicious authenticated VNC client to crash QEMU and trigger a denial of service. | CVSS3: 6.5 | 0% Низкий | почти 2 года назад | |
CVE-2023-6683 A flaw was found in the QEMU built-in VNC server while processing ClientCutText messages. The qemu_clipboard_request() function can be reached before vnc_server_cut_text_caps() was called and had the chance to initialize the clipboard peer, leading to a NULL pointer dereference. This could allow a malicious authenticated VNC client to crash QEMU and trigger a denial of service. | CVSS3: 6.5 | 0% Низкий | почти 2 года назад | |
CVE-2023-6683 A flaw was found in the QEMU built-in VNC server while processing ClientCutText messages. The qemu_clipboard_request() function can be reached before vnc_server_cut_text_caps() was called and had the chance to initialize the clipboard peer, leading to a NULL pointer dereference. This could allow a malicious authenticated VNC client to crash QEMU and trigger a denial of service. | CVSS3: 6.5 | 0% Низкий | почти 2 года назад | |
CVSS3: 6.5 | 0% Низкий | 9 месяцев назад | ||
CVE-2023-6683 A flaw was found in the QEMU built-in VNC server while processing Clie ... | CVSS3: 6.5 | 0% Низкий | почти 2 года назад | |
ROS-20240401-01 Множественные уязвимости qemu | CVSS3: 10 | больше 1 года назад | ||
GHSA-x9c6-9g9w-hg73 A flaw was found in the QEMU built-in VNC server while processing ClientCutText messages. The qemu_clipboard_request() function can be reached before vnc_server_cut_text_caps() was called and had the chance to initialize the clipboard peer, leading to a NULL pointer dereference. This could allow a malicious authenticated VNC client to crash QEMU and trigger a denial of service. | CVSS3: 6.5 | 0% Низкий | почти 2 года назад | |
GHSA-835p-c6x8-xh5f A stack based buffer overflow was found in the virtio-net device of QEMU. This issue occurs when flushing TX in the virtio_net_flush_tx function if guest features VIRTIO_NET_F_HASH_REPORT, VIRTIO_F_VERSION_1 and VIRTIO_NET_F_MRG_RXBUF are enabled. This could allow a malicious user to overwrite local variables allocated on the stack. Specifically, the `out_sg` variable could be used to read a part of process memory and send it to the wire, causing an information leak. | CVSS3: 4.9 | 0% Низкий | почти 2 года назад | |
BDU:2024-04886 Уязвимость интерфейса virtio-net сервера QEMU, позволяющая нарушителю вызвать утечку информации | CVSS3: 5.3 | 0% Низкий | почти 2 года назад |
Уязвимостей на страницу