Количество 14
Количество 14
CVE-2015-8745
QEMU (aka Quick Emulator) built with a VMWARE VMXNET3 paravirtual NIC emulator support is vulnerable to crash issue. It could occur while reading Interrupt Mask Registers (IMR). A privileged (CAP_SYS_RAWIO) guest user could use this flaw to crash the QEMU process instance resulting in DoS.
CVE-2015-8745
QEMU (aka Quick Emulator) built with a VMWARE VMXNET3 paravirtual NIC emulator support is vulnerable to crash issue. It could occur while reading Interrupt Mask Registers (IMR). A privileged (CAP_SYS_RAWIO) guest user could use this flaw to crash the QEMU process instance resulting in DoS.
CVE-2015-8745
QEMU (aka Quick Emulator) built with a VMWARE VMXNET3 paravirtual NIC emulator support is vulnerable to crash issue. It could occur while reading Interrupt Mask Registers (IMR). A privileged (CAP_SYS_RAWIO) guest user could use this flaw to crash the QEMU process instance resulting in DoS.
CVE-2015-8745
QEMU (aka Quick Emulator) built with a VMWARE VMXNET3 paravirtual NIC ...
GHSA-c86g-2x4g-v7wf
QEMU (aka Quick Emulator) built with a VMWARE VMXNET3 paravirtual NIC emulator support is vulnerable to crash issue. It could occur while reading Interrupt Mask Registers (IMR). A privileged (CAP_SYS_RAWIO) guest user could use this flaw to crash the QEMU process instance resulting in DoS.
openSUSE-SU-2016:0914-1
Security update for xen
SUSE-SU-2016:1154-1
Security update for xen
openSUSE-SU-2016:1750-1
Security update for qemu
SUSE-SU-2016:1703-1
Security update for qemu
SUSE-SU-2016:1745-1
Security update for xen
SUSE-SU-2016:1560-1
Security update for qemu
SUSE-SU-2016:0873-1
Security update for xen
SUSE-SU-2016:1318-1
Security update for xen
SUSE-SU-2016:0955-1
Security update for xen
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2015-8745 QEMU (aka Quick Emulator) built with a VMWARE VMXNET3 paravirtual NIC emulator support is vulnerable to crash issue. It could occur while reading Interrupt Mask Registers (IMR). A privileged (CAP_SYS_RAWIO) guest user could use this flaw to crash the QEMU process instance resulting in DoS. | CVSS3: 5.5 | 0% Низкий | около 9 лет назад | |
CVE-2015-8745 QEMU (aka Quick Emulator) built with a VMWARE VMXNET3 paravirtual NIC emulator support is vulnerable to crash issue. It could occur while reading Interrupt Mask Registers (IMR). A privileged (CAP_SYS_RAWIO) guest user could use this flaw to crash the QEMU process instance resulting in DoS. | CVSS2: 2.3 | 0% Низкий | больше 10 лет назад | |
CVE-2015-8745 QEMU (aka Quick Emulator) built with a VMWARE VMXNET3 paravirtual NIC emulator support is vulnerable to crash issue. It could occur while reading Interrupt Mask Registers (IMR). A privileged (CAP_SYS_RAWIO) guest user could use this flaw to crash the QEMU process instance resulting in DoS. | CVSS3: 5.5 | 0% Низкий | около 9 лет назад | |
CVE-2015-8745 QEMU (aka Quick Emulator) built with a VMWARE VMXNET3 paravirtual NIC ... | CVSS3: 5.5 | 0% Низкий | около 9 лет назад | |
GHSA-c86g-2x4g-v7wf QEMU (aka Quick Emulator) built with a VMWARE VMXNET3 paravirtual NIC emulator support is vulnerable to crash issue. It could occur while reading Interrupt Mask Registers (IMR). A privileged (CAP_SYS_RAWIO) guest user could use this flaw to crash the QEMU process instance resulting in DoS. | CVSS3: 5.5 | 0% Низкий | больше 3 лет назад | |
openSUSE-SU-2016:0914-1 Security update for xen | почти 10 лет назад | |||
SUSE-SU-2016:1154-1 Security update for xen | почти 10 лет назад | |||
openSUSE-SU-2016:1750-1 Security update for qemu | больше 9 лет назад | |||
SUSE-SU-2016:1703-1 Security update for qemu | больше 9 лет назад | |||
SUSE-SU-2016:1745-1 Security update for xen | больше 9 лет назад | |||
SUSE-SU-2016:1560-1 Security update for qemu | больше 9 лет назад | |||
SUSE-SU-2016:0873-1 Security update for xen | почти 10 лет назад | |||
SUSE-SU-2016:1318-1 Security update for xen | больше 9 лет назад | |||
SUSE-SU-2016:0955-1 Security update for xen | почти 10 лет назад |
Уязвимостей на страницу