Количество 44
Количество 44

CVE-2024-3446
A double free vulnerability was found in QEMU virtio devices (virtio-gpu, virtio-serial-bus, virtio-crypto), where the mem_reentrancy_guard flag insufficiently protects against DMA reentrancy issues. This issue could allow a malicious privileged guest user to crash the QEMU process on the host, resulting in a denial of service or allow arbitrary code execution within the context of the QEMU process on the host.

CVE-2024-3446
A double free vulnerability was found in QEMU virtio devices (virtio-gpu, virtio-serial-bus, virtio-crypto), where the mem_reentrancy_guard flag insufficiently protects against DMA reentrancy issues. This issue could allow a malicious privileged guest user to crash the QEMU process on the host, resulting in a denial of service or allow arbitrary code execution within the context of the QEMU process on the host.

CVE-2024-3446
A double free vulnerability was found in QEMU virtio devices (virtio-gpu, virtio-serial-bus, virtio-crypto), where the mem_reentrancy_guard flag insufficiently protects against DMA reentrancy issues. This issue could allow a malicious privileged guest user to crash the QEMU process on the host, resulting in a denial of service or allow arbitrary code execution within the context of the QEMU process on the host.
CVE-2024-3446
A double free vulnerability was found in QEMU virtio devices (virtio-g ...

CVE-2024-4467
A flaw was found in the QEMU disk image utility (qemu-img) 'info' command. A specially crafted image file containing a `json:{}` value describing block devices in QMP could cause the qemu-img process on the host to consume large amounts of memory or CPU time, leading to denial of service or read/write to an existing external file.

CVE-2024-4467
A flaw was found in the QEMU disk image utility (qemu-img) 'info' command. A specially crafted image file containing a `json:{}` value describing block devices in QMP could cause the qemu-img process on the host to consume large amounts of memory or CPU time, leading to denial of service or read/write to an existing external file.

CVE-2024-4467
A flaw was found in the QEMU disk image utility (qemu-img) 'info' command. A specially crafted image file containing a `json:{}` value describing block devices in QMP could cause the qemu-img process on the host to consume large amounts of memory or CPU time, leading to denial of service or read/write to an existing external file.

CVE-2024-4467
CVE-2024-4467
A flaw was found in the QEMU disk image utility (qemu-img) 'info' comm ...
GHSA-rgvf-j3x5-6277
A double free vulnerability was found in QEMU virtio devices (virtio-gpu, virtio-serial-bus, virtio-crypto), where the mem_reentrancy_guard flag insufficiently protects against DMA reentrancy issues. This issue could allow a malicious privileged guest to crash the QEMU process on the host, resulting in a denial of service or allow arbitrary code execution within the context of the QEMU process on the host.

BDU:2024-03304
Уязвимость эмулятора аппаратного обеспечения QEMU, связанная с ошибкой повторного освобождения памяти, позволяющая нарушителю выполнить произвольный код

SUSE-SU-2024:3396-1
Security update for qemu

SUSE-SU-2024:3077-1
Security update for qemu
GHSA-5cwv-6xqx-92m5
A flaw was found in the QEMU disk image utility (qemu-img) 'info' command. A specially crafted image file containing a `json:{}` value describing block devices in QMP could cause the qemu-img process on the host to consume large amounts of memory or CPU time, leading to denial of service or read/write to an existing external file.
ELSA-2024-4420
ELSA-2024-4420: virt:ol and virt-devel:rhel security update (IMPORTANT)
ELSA-2024-4278
ELSA-2024-4278: qemu-kvm security update (IMPORTANT)

BDU:2024-06923
Уязвимость команды info эмулятора аппаратного обеспечения QEMU, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

ROS-20240627-03
Уязвимость qemu

SUSE-SU-2024:2983-1
Security update for qemu

SUSE-SU-2024:2977-1
Security update for qemu
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2024-3446 A double free vulnerability was found in QEMU virtio devices (virtio-gpu, virtio-serial-bus, virtio-crypto), where the mem_reentrancy_guard flag insufficiently protects against DMA reentrancy issues. This issue could allow a malicious privileged guest user to crash the QEMU process on the host, resulting in a denial of service or allow arbitrary code execution within the context of the QEMU process on the host. | CVSS3: 8.2 | 0% Низкий | около 1 года назад |
![]() | CVE-2024-3446 A double free vulnerability was found in QEMU virtio devices (virtio-gpu, virtio-serial-bus, virtio-crypto), where the mem_reentrancy_guard flag insufficiently protects against DMA reentrancy issues. This issue could allow a malicious privileged guest user to crash the QEMU process on the host, resulting in a denial of service or allow arbitrary code execution within the context of the QEMU process on the host. | CVSS3: 8.2 | 0% Низкий | около 1 года назад |
![]() | CVE-2024-3446 A double free vulnerability was found in QEMU virtio devices (virtio-gpu, virtio-serial-bus, virtio-crypto), where the mem_reentrancy_guard flag insufficiently protects against DMA reentrancy issues. This issue could allow a malicious privileged guest user to crash the QEMU process on the host, resulting in a denial of service or allow arbitrary code execution within the context of the QEMU process on the host. | CVSS3: 8.2 | 0% Низкий | около 1 года назад |
CVE-2024-3446 A double free vulnerability was found in QEMU virtio devices (virtio-g ... | CVSS3: 8.2 | 0% Низкий | около 1 года назад | |
![]() | CVE-2024-4467 A flaw was found in the QEMU disk image utility (qemu-img) 'info' command. A specially crafted image file containing a `json:{}` value describing block devices in QMP could cause the qemu-img process on the host to consume large amounts of memory or CPU time, leading to denial of service or read/write to an existing external file. | CVSS3: 7.8 | 0% Низкий | 12 месяцев назад |
![]() | CVE-2024-4467 A flaw was found in the QEMU disk image utility (qemu-img) 'info' command. A specially crafted image file containing a `json:{}` value describing block devices in QMP could cause the qemu-img process on the host to consume large amounts of memory or CPU time, leading to denial of service or read/write to an existing external file. | CVSS3: 7.8 | 0% Низкий | 12 месяцев назад |
![]() | CVE-2024-4467 A flaw was found in the QEMU disk image utility (qemu-img) 'info' command. A specially crafted image file containing a `json:{}` value describing block devices in QMP could cause the qemu-img process on the host to consume large amounts of memory or CPU time, leading to denial of service or read/write to an existing external file. | CVSS3: 7.8 | 0% Низкий | 12 месяцев назад |
![]() | CVSS3: 7.8 | 0% Низкий | около 2 месяцев назад | |
CVE-2024-4467 A flaw was found in the QEMU disk image utility (qemu-img) 'info' comm ... | CVSS3: 7.8 | 0% Низкий | 12 месяцев назад | |
GHSA-rgvf-j3x5-6277 A double free vulnerability was found in QEMU virtio devices (virtio-gpu, virtio-serial-bus, virtio-crypto), where the mem_reentrancy_guard flag insufficiently protects against DMA reentrancy issues. This issue could allow a malicious privileged guest to crash the QEMU process on the host, resulting in a denial of service or allow arbitrary code execution within the context of the QEMU process on the host. | CVSS3: 8.2 | 0% Низкий | около 1 года назад | |
![]() | BDU:2024-03304 Уязвимость эмулятора аппаратного обеспечения QEMU, связанная с ошибкой повторного освобождения памяти, позволяющая нарушителю выполнить произвольный код | CVSS3: 8.2 | 0% Низкий | около 1 года назад |
![]() | SUSE-SU-2024:3396-1 Security update for qemu | 0% Низкий | 9 месяцев назад | |
![]() | SUSE-SU-2024:3077-1 Security update for qemu | 0% Низкий | 10 месяцев назад | |
GHSA-5cwv-6xqx-92m5 A flaw was found in the QEMU disk image utility (qemu-img) 'info' command. A specially crafted image file containing a `json:{}` value describing block devices in QMP could cause the qemu-img process on the host to consume large amounts of memory or CPU time, leading to denial of service or read/write to an existing external file. | CVSS3: 7.8 | 0% Низкий | 12 месяцев назад | |
ELSA-2024-4420 ELSA-2024-4420: virt:ol and virt-devel:rhel security update (IMPORTANT) | 11 месяцев назад | |||
ELSA-2024-4278 ELSA-2024-4278: qemu-kvm security update (IMPORTANT) | 12 месяцев назад | |||
![]() | BDU:2024-06923 Уязвимость команды info эмулятора аппаратного обеспечения QEMU, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании | CVSS3: 7.8 | 0% Низкий | около 1 года назад |
![]() | ROS-20240627-03 Уязвимость qemu | CVSS3: 8.2 | 0% Низкий | 12 месяцев назад |
![]() | SUSE-SU-2024:2983-1 Security update for qemu | 10 месяцев назад | ||
![]() | SUSE-SU-2024:2977-1 Security update for qemu | 10 месяцев назад |
Уязвимостей на страницу