Количество 45
Количество 45
BDU:2024-01712
Уязвимость функция register_vfs() (hw/pci/pcie_sriov.c) эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании
CVE-2024-3446
A double free vulnerability was found in QEMU virtio devices (virtio-gpu, virtio-serial-bus, virtio-crypto), where the mem_reentrancy_guard flag insufficiently protects against DMA reentrancy issues. This issue could allow a malicious privileged guest user to crash the QEMU process on the host, resulting in a denial of service or allow arbitrary code execution within the context of the QEMU process on the host.
CVE-2024-3446
A double free vulnerability was found in QEMU virtio devices (virtio-gpu, virtio-serial-bus, virtio-crypto), where the mem_reentrancy_guard flag insufficiently protects against DMA reentrancy issues. This issue could allow a malicious privileged guest user to crash the QEMU process on the host, resulting in a denial of service or allow arbitrary code execution within the context of the QEMU process on the host.
CVE-2024-3446
A double free vulnerability was found in QEMU virtio devices (virtio-gpu, virtio-serial-bus, virtio-crypto), where the mem_reentrancy_guard flag insufficiently protects against DMA reentrancy issues. This issue could allow a malicious privileged guest user to crash the QEMU process on the host, resulting in a denial of service or allow arbitrary code execution within the context of the QEMU process on the host.
CVE-2024-3446
A double free vulnerability was found in QEMU virtio devices (virtio-g ...
CVE-2024-4467
A flaw was found in the QEMU disk image utility (qemu-img) 'info' command. A specially crafted image file containing a `json:{}` value describing block devices in QMP could cause the qemu-img process on the host to consume large amounts of memory or CPU time, leading to denial of service or read/write to an existing external file.
CVE-2024-4467
A flaw was found in the QEMU disk image utility (qemu-img) 'info' command. A specially crafted image file containing a `json:{}` value describing block devices in QMP could cause the qemu-img process on the host to consume large amounts of memory or CPU time, leading to denial of service or read/write to an existing external file.
CVE-2024-4467
A flaw was found in the QEMU disk image utility (qemu-img) 'info' command. A specially crafted image file containing a `json:{}` value describing block devices in QMP could cause the qemu-img process on the host to consume large amounts of memory or CPU time, leading to denial of service or read/write to an existing external file.
CVE-2024-4467
CVE-2024-4467
A flaw was found in the QEMU disk image utility (qemu-img) 'info' comm ...
GHSA-rgvf-j3x5-6277
A double free vulnerability was found in QEMU virtio devices (virtio-gpu, virtio-serial-bus, virtio-crypto), where the mem_reentrancy_guard flag insufficiently protects against DMA reentrancy issues. This issue could allow a malicious privileged guest to crash the QEMU process on the host, resulting in a denial of service or allow arbitrary code execution within the context of the QEMU process on the host.
BDU:2024-03304
Уязвимость эмулятора аппаратного обеспечения QEMU, связанная с ошибкой повторного освобождения памяти, позволяющая нарушителю выполнить произвольный код
SUSE-SU-2024:3396-1
Security update for qemu
SUSE-SU-2024:3077-1
Security update for qemu
GHSA-5cwv-6xqx-92m5
A flaw was found in the QEMU disk image utility (qemu-img) 'info' command. A specially crafted image file containing a `json:{}` value describing block devices in QMP could cause the qemu-img process on the host to consume large amounts of memory or CPU time, leading to denial of service or read/write to an existing external file.
ELSA-2024-4420
ELSA-2024-4420: virt:ol and virt-devel:rhel security update (IMPORTANT)
ELSA-2024-4278
ELSA-2024-4278: qemu-kvm security update (IMPORTANT)
BDU:2024-06923
Уязвимость команды info эмулятора аппаратного обеспечения QEMU, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
ROS-20240627-03
Уязвимость qemu
SUSE-SU-2024:2983-1
Security update for qemu
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
BDU:2024-01712 Уязвимость функция register_vfs() (hw/pci/pcie_sriov.c) эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 5.5 | 0% Низкий | почти 2 года назад | |
CVE-2024-3446 A double free vulnerability was found in QEMU virtio devices (virtio-gpu, virtio-serial-bus, virtio-crypto), where the mem_reentrancy_guard flag insufficiently protects against DMA reentrancy issues. This issue could allow a malicious privileged guest user to crash the QEMU process on the host, resulting in a denial of service or allow arbitrary code execution within the context of the QEMU process on the host. | CVSS3: 8.2 | 0% Низкий | больше 1 года назад | |
CVE-2024-3446 A double free vulnerability was found in QEMU virtio devices (virtio-gpu, virtio-serial-bus, virtio-crypto), where the mem_reentrancy_guard flag insufficiently protects against DMA reentrancy issues. This issue could allow a malicious privileged guest user to crash the QEMU process on the host, resulting in a denial of service or allow arbitrary code execution within the context of the QEMU process on the host. | CVSS3: 8.2 | 0% Низкий | больше 1 года назад | |
CVE-2024-3446 A double free vulnerability was found in QEMU virtio devices (virtio-gpu, virtio-serial-bus, virtio-crypto), where the mem_reentrancy_guard flag insufficiently protects against DMA reentrancy issues. This issue could allow a malicious privileged guest user to crash the QEMU process on the host, resulting in a denial of service or allow arbitrary code execution within the context of the QEMU process on the host. | CVSS3: 8.2 | 0% Низкий | больше 1 года назад | |
CVE-2024-3446 A double free vulnerability was found in QEMU virtio devices (virtio-g ... | CVSS3: 8.2 | 0% Низкий | больше 1 года назад | |
CVE-2024-4467 A flaw was found in the QEMU disk image utility (qemu-img) 'info' command. A specially crafted image file containing a `json:{}` value describing block devices in QMP could cause the qemu-img process on the host to consume large amounts of memory or CPU time, leading to denial of service or read/write to an existing external file. | CVSS3: 7.8 | 0% Низкий | больше 1 года назад | |
CVE-2024-4467 A flaw was found in the QEMU disk image utility (qemu-img) 'info' command. A specially crafted image file containing a `json:{}` value describing block devices in QMP could cause the qemu-img process on the host to consume large amounts of memory or CPU time, leading to denial of service or read/write to an existing external file. | CVSS3: 7.8 | 0% Низкий | больше 1 года назад | |
CVE-2024-4467 A flaw was found in the QEMU disk image utility (qemu-img) 'info' command. A specially crafted image file containing a `json:{}` value describing block devices in QMP could cause the qemu-img process on the host to consume large amounts of memory or CPU time, leading to denial of service or read/write to an existing external file. | CVSS3: 7.8 | 0% Низкий | больше 1 года назад | |
CVSS3: 7.8 | 0% Низкий | 7 месяцев назад | ||
CVE-2024-4467 A flaw was found in the QEMU disk image utility (qemu-img) 'info' comm ... | CVSS3: 7.8 | 0% Низкий | больше 1 года назад | |
GHSA-rgvf-j3x5-6277 A double free vulnerability was found in QEMU virtio devices (virtio-gpu, virtio-serial-bus, virtio-crypto), where the mem_reentrancy_guard flag insufficiently protects against DMA reentrancy issues. This issue could allow a malicious privileged guest to crash the QEMU process on the host, resulting in a denial of service or allow arbitrary code execution within the context of the QEMU process on the host. | CVSS3: 8.2 | 0% Низкий | больше 1 года назад | |
BDU:2024-03304 Уязвимость эмулятора аппаратного обеспечения QEMU, связанная с ошибкой повторного освобождения памяти, позволяющая нарушителю выполнить произвольный код | CVSS3: 8.2 | 0% Низкий | больше 1 года назад | |
SUSE-SU-2024:3396-1 Security update for qemu | 0% Низкий | около 1 года назад | ||
SUSE-SU-2024:3077-1 Security update for qemu | 0% Низкий | около 1 года назад | ||
GHSA-5cwv-6xqx-92m5 A flaw was found in the QEMU disk image utility (qemu-img) 'info' command. A specially crafted image file containing a `json:{}` value describing block devices in QMP could cause the qemu-img process on the host to consume large amounts of memory or CPU time, leading to denial of service or read/write to an existing external file. | CVSS3: 7.8 | 0% Низкий | больше 1 года назад | |
ELSA-2024-4420 ELSA-2024-4420: virt:ol and virt-devel:rhel security update (IMPORTANT) | больше 1 года назад | |||
ELSA-2024-4278 ELSA-2024-4278: qemu-kvm security update (IMPORTANT) | больше 1 года назад | |||
BDU:2024-06923 Уязвимость команды info эмулятора аппаратного обеспечения QEMU, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании | CVSS3: 7.8 | 0% Низкий | больше 1 года назад | |
ROS-20240627-03 Уязвимость qemu | CVSS3: 8.2 | 0% Низкий | больше 1 года назад | |
SUSE-SU-2024:2983-1 Security update for qemu | около 1 года назад |
Уязвимостей на страницу