Количество 8
Количество 8
GHSA-4pq4-6gr5-cr69
An off-by-one error was found in QEMU's KVM Xen guest support. A malicious guest could use this flaw to trigger out-of-bounds heap accesses in the QEMU process via the emulated Xen physdev hypercall interface, leading to a denial of service or potential memory corruption.
CVE-2026-0665
An off-by-one error was found in QEMU's KVM Xen guest support. A malicious guest could use this flaw to trigger out-of-bounds heap accesses in the QEMU process via the emulated Xen physdev hypercall interface, leading to a denial of service or potential memory corruption.
CVE-2026-0665
An off-by-one error was found in QEMU's KVM Xen guest support. A malicious guest could use this flaw to trigger out-of-bounds heap accesses in the QEMU process via the emulated Xen physdev hypercall interface, leading to a denial of service or potential memory corruption.
CVE-2026-0665
An off-by-one error was found in QEMU's KVM Xen guest support. A malicious guest could use this flaw to trigger out-of-bounds heap accesses in the QEMU process via the emulated Xen physdev hypercall interface, leading to a denial of service or potential memory corruption.
CVE-2026-0665
An off-by-one error was found in QEMU's KVM Xen guest support. A malic ...
SUSE-SU-2026:0445-1
Security update for qemu
openSUSE-SU-2026:20357-1
Security update for qemu
SUSE-SU-2026:0662-1
Security update for qemu
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
GHSA-4pq4-6gr5-cr69 An off-by-one error was found in QEMU's KVM Xen guest support. A malicious guest could use this flaw to trigger out-of-bounds heap accesses in the QEMU process via the emulated Xen physdev hypercall interface, leading to a denial of service or potential memory corruption. | CVSS3: 6.5 | 0% Низкий | около 1 месяца назад | |
CVE-2026-0665 An off-by-one error was found in QEMU's KVM Xen guest support. A malicious guest could use this flaw to trigger out-of-bounds heap accesses in the QEMU process via the emulated Xen physdev hypercall interface, leading to a denial of service or potential memory corruption. | CVSS3: 6.5 | 0% Низкий | около 1 месяца назад | |
CVE-2026-0665 An off-by-one error was found in QEMU's KVM Xen guest support. A malicious guest could use this flaw to trigger out-of-bounds heap accesses in the QEMU process via the emulated Xen physdev hypercall interface, leading to a denial of service or potential memory corruption. | CVSS3: 6.5 | 0% Низкий | 3 месяца назад | |
CVE-2026-0665 An off-by-one error was found in QEMU's KVM Xen guest support. A malicious guest could use this flaw to trigger out-of-bounds heap accesses in the QEMU process via the emulated Xen physdev hypercall interface, leading to a denial of service or potential memory corruption. | CVSS3: 6.5 | 0% Низкий | около 1 месяца назад | |
CVE-2026-0665 An off-by-one error was found in QEMU's KVM Xen guest support. A malic ... | CVSS3: 6.5 | 0% Низкий | около 1 месяца назад | |
SUSE-SU-2026:0445-1 Security update for qemu | 0% Низкий | около 2 месяцев назад | ||
openSUSE-SU-2026:20357-1 Security update for qemu | 18 дней назад | |||
SUSE-SU-2026:0662-1 Security update for qemu | около 1 месяца назад |
Уязвимостей на страницу