Количество 23
Количество 23
ELSA-2025-4492
ELSA-2025-4492: qemu-kvm security update (MODERATE)

CVE-2024-3567
A flaw was found in QEMU. An assertion failure was present in the update_sctp_checksum() function in hw/net/net_tx_pkt.c when trying to calculate the checksum of a short-sized fragmented packet. This flaw allows a malicious guest to crash QEMU and cause a denial of service condition.

CVE-2024-3567
A flaw was found in QEMU. An assertion failure was present in the update_sctp_checksum() function in hw/net/net_tx_pkt.c when trying to calculate the checksum of a short-sized fragmented packet. This flaw allows a malicious guest to crash QEMU and cause a denial of service condition.

CVE-2024-3567
A flaw was found in QEMU. An assertion failure was present in the update_sctp_checksum() function in hw/net/net_tx_pkt.c when trying to calculate the checksum of a short-sized fragmented packet. This flaw allows a malicious guest to crash QEMU and cause a denial of service condition.

CVE-2024-3567
CVE-2024-3567
A flaw was found in QEMU. An assertion failure was present in the upda ...

CVE-2023-6693
A stack based buffer overflow was found in the virtio-net device of QEMU. This issue occurs when flushing TX in the virtio_net_flush_tx function if guest features VIRTIO_NET_F_HASH_REPORT, VIRTIO_F_VERSION_1 and VIRTIO_NET_F_MRG_RXBUF are enabled. This could allow a malicious user to overwrite local variables allocated on the stack. Specifically, the `out_sg` variable could be used to read a part of process memory and send it to the wire, causing an information leak.

CVE-2023-6693
A stack based buffer overflow was found in the virtio-net device of QEMU. This issue occurs when flushing TX in the virtio_net_flush_tx function if guest features VIRTIO_NET_F_HASH_REPORT, VIRTIO_F_VERSION_1 and VIRTIO_NET_F_MRG_RXBUF are enabled. This could allow a malicious user to overwrite local variables allocated on the stack. Specifically, the `out_sg` variable could be used to read a part of process memory and send it to the wire, causing an information leak.

CVE-2023-6693
A stack based buffer overflow was found in the virtio-net device of QEMU. This issue occurs when flushing TX in the virtio_net_flush_tx function if guest features VIRTIO_NET_F_HASH_REPORT, VIRTIO_F_VERSION_1 and VIRTIO_NET_F_MRG_RXBUF are enabled. This could allow a malicious user to overwrite local variables allocated on the stack. Specifically, the `out_sg` variable could be used to read a part of process memory and send it to the wire, causing an information leak.

CVE-2023-6693
CVE-2023-6693
A stack based buffer overflow was found in the virtio-net device of QE ...
ELSA-2024-12605
ELSA-2024-12605: virt:kvm_utils2 security update (IMPORTANT)

ROS-20240627-05
Уязвимость qemu
GHSA-mqq7-33jf-2x53
A flaw was found in QEMU. An assertion failure was present in the update_sctp_checksum() function in hw/net/net_tx_pkt.c when trying to calculate the checksum of a short-sized fragmented packet. This flaw allows a malicious guest to crash QEMU and cause a denial of service condition.

BDU:2024-04887
Уязвимость функции update_sctp_checksum() эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании
GHSA-835p-c6x8-xh5f
A stack based buffer overflow was found in the virtio-net device of QEMU. This issue occurs when flushing TX in the virtio_net_flush_tx function if guest features VIRTIO_NET_F_HASH_REPORT, VIRTIO_F_VERSION_1 and VIRTIO_NET_F_MRG_RXBUF are enabled. This could allow a malicious user to overwrite local variables allocated on the stack. Specifically, the `out_sg` variable could be used to read a part of process memory and send it to the wire, causing an information leak.

BDU:2024-04886
Уязвимость интерфейса virtio-net сервера QEMU, позволяющая нарушителю вызвать утечку информации

SUSE-SU-2024:3229-1
Security update for qemu
ELSA-2024-2962
ELSA-2024-2962: virt:ol and virt-devel:rhel security and enhancement update (MODERATE)

SUSE-SU-2024:1103-1
Security update for qemu
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
ELSA-2025-4492 ELSA-2025-4492: qemu-kvm security update (MODERATE) | 3 месяца назад | |||
![]() | CVE-2024-3567 A flaw was found in QEMU. An assertion failure was present in the update_sctp_checksum() function in hw/net/net_tx_pkt.c when trying to calculate the checksum of a short-sized fragmented packet. This flaw allows a malicious guest to crash QEMU and cause a denial of service condition. | CVSS3: 5.5 | 0% Низкий | больше 1 года назад |
![]() | CVE-2024-3567 A flaw was found in QEMU. An assertion failure was present in the update_sctp_checksum() function in hw/net/net_tx_pkt.c when trying to calculate the checksum of a short-sized fragmented packet. This flaw allows a malicious guest to crash QEMU and cause a denial of service condition. | CVSS3: 5.5 | 0% Низкий | больше 1 года назад |
![]() | CVE-2024-3567 A flaw was found in QEMU. An assertion failure was present in the update_sctp_checksum() function in hw/net/net_tx_pkt.c when trying to calculate the checksum of a short-sized fragmented packet. This flaw allows a malicious guest to crash QEMU and cause a denial of service condition. | CVSS3: 5.5 | 0% Низкий | больше 1 года назад |
![]() | CVSS3: 5.5 | 0% Низкий | 3 месяца назад | |
CVE-2024-3567 A flaw was found in QEMU. An assertion failure was present in the upda ... | CVSS3: 5.5 | 0% Низкий | больше 1 года назад | |
![]() | CVE-2023-6693 A stack based buffer overflow was found in the virtio-net device of QEMU. This issue occurs when flushing TX in the virtio_net_flush_tx function if guest features VIRTIO_NET_F_HASH_REPORT, VIRTIO_F_VERSION_1 and VIRTIO_NET_F_MRG_RXBUF are enabled. This could allow a malicious user to overwrite local variables allocated on the stack. Specifically, the `out_sg` variable could be used to read a part of process memory and send it to the wire, causing an information leak. | CVSS3: 4.9 | 0% Низкий | больше 1 года назад |
![]() | CVE-2023-6693 A stack based buffer overflow was found in the virtio-net device of QEMU. This issue occurs when flushing TX in the virtio_net_flush_tx function if guest features VIRTIO_NET_F_HASH_REPORT, VIRTIO_F_VERSION_1 and VIRTIO_NET_F_MRG_RXBUF are enabled. This could allow a malicious user to overwrite local variables allocated on the stack. Specifically, the `out_sg` variable could be used to read a part of process memory and send it to the wire, causing an information leak. | CVSS3: 4.9 | 0% Низкий | больше 1 года назад |
![]() | CVE-2023-6693 A stack based buffer overflow was found in the virtio-net device of QEMU. This issue occurs when flushing TX in the virtio_net_flush_tx function if guest features VIRTIO_NET_F_HASH_REPORT, VIRTIO_F_VERSION_1 and VIRTIO_NET_F_MRG_RXBUF are enabled. This could allow a malicious user to overwrite local variables allocated on the stack. Specifically, the `out_sg` variable could be used to read a part of process memory and send it to the wire, causing an information leak. | CVSS3: 4.9 | 0% Низкий | больше 1 года назад |
![]() | CVSS3: 5.3 | 0% Низкий | 5 месяцев назад | |
CVE-2023-6693 A stack based buffer overflow was found in the virtio-net device of QE ... | CVSS3: 4.9 | 0% Низкий | больше 1 года назад | |
ELSA-2024-12605 ELSA-2024-12605: virt:kvm_utils2 security update (IMPORTANT) | 11 месяцев назад | |||
![]() | ROS-20240627-05 Уязвимость qemu | CVSS3: 5.5 | 0% Низкий | около 1 года назад |
GHSA-mqq7-33jf-2x53 A flaw was found in QEMU. An assertion failure was present in the update_sctp_checksum() function in hw/net/net_tx_pkt.c when trying to calculate the checksum of a short-sized fragmented packet. This flaw allows a malicious guest to crash QEMU and cause a denial of service condition. | CVSS3: 5.5 | 0% Низкий | больше 1 года назад | |
![]() | BDU:2024-04887 Уязвимость функции update_sctp_checksum() эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 5.5 | 0% Низкий | больше 1 года назад |
GHSA-835p-c6x8-xh5f A stack based buffer overflow was found in the virtio-net device of QEMU. This issue occurs when flushing TX in the virtio_net_flush_tx function if guest features VIRTIO_NET_F_HASH_REPORT, VIRTIO_F_VERSION_1 and VIRTIO_NET_F_MRG_RXBUF are enabled. This could allow a malicious user to overwrite local variables allocated on the stack. Specifically, the `out_sg` variable could be used to read a part of process memory and send it to the wire, causing an information leak. | CVSS3: 4.9 | 0% Низкий | больше 1 года назад | |
![]() | BDU:2024-04886 Уязвимость интерфейса virtio-net сервера QEMU, позволяющая нарушителю вызвать утечку информации | CVSS3: 5.3 | 0% Низкий | больше 1 года назад |
![]() | SUSE-SU-2024:3229-1 Security update for qemu | 11 месяцев назад | ||
ELSA-2024-2962 ELSA-2024-2962: virt:ol and virt-devel:rhel security and enhancement update (MODERATE) | около 1 года назад | |||
![]() | SUSE-SU-2024:1103-1 Security update for qemu | больше 1 года назад |
Уязвимостей на страницу