Количество 18
Количество 18
GHSA-ch9p-9c28-4r3p
QEMU (aka Quick Emulator) built with the e1000 NIC emulation support is vulnerable to an infinite loop issue. It could occur while processing data via transmit or receive descriptors, provided the initial receive/transmit descriptor head (TDH/RDH) is set outside the allocated descriptor buffer. A privileged user inside guest could use this flaw to crash the QEMU instance resulting in DoS.

CVE-2016-1981
QEMU (aka Quick Emulator) built with the e1000 NIC emulation support is vulnerable to an infinite loop issue. It could occur while processing data via transmit or receive descriptors, provided the initial receive/transmit descriptor head (TDH/RDH) is set outside the allocated descriptor buffer. A privileged user inside guest could use this flaw to crash the QEMU instance resulting in DoS.

CVE-2016-1981
QEMU (aka Quick Emulator) built with the e1000 NIC emulation support is vulnerable to an infinite loop issue. It could occur while processing data via transmit or receive descriptors, provided the initial receive/transmit descriptor head (TDH/RDH) is set outside the allocated descriptor buffer. A privileged user inside guest could use this flaw to crash the QEMU instance resulting in DoS.

CVE-2016-1981
QEMU (aka Quick Emulator) built with the e1000 NIC emulation support is vulnerable to an infinite loop issue. It could occur while processing data via transmit or receive descriptors, provided the initial receive/transmit descriptor head (TDH/RDH) is set outside the allocated descriptor buffer. A privileged user inside guest could use this flaw to crash the QEMU instance resulting in DoS.
CVE-2016-1981
QEMU (aka Quick Emulator) built with the e1000 NIC emulation support i ...
ELSA-2016-2585
ELSA-2016-2585: qemu-kvm security, bug fix, and enhancement update (MODERATE)

openSUSE-SU-2016:0914-1
Security update for xen

SUSE-SU-2016:1154-1
Security update for xen

openSUSE-SU-2016:1750-1
Security update for qemu

SUSE-SU-2016:1703-1
Security update for qemu

SUSE-SU-2016:1785-1
Security update for kvm

SUSE-SU-2016:1698-1
Security update for kvm

SUSE-SU-2016:1745-1
Security update for xen

SUSE-SU-2016:1560-1
Security update for qemu

SUSE-SU-2016:0873-1
Security update for xen

SUSE-SU-2016:1318-1
Security update for xen

openSUSE-SU-2016:2494-1
Security update for xen

SUSE-SU-2016:0955-1
Security update for xen
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
GHSA-ch9p-9c28-4r3p QEMU (aka Quick Emulator) built with the e1000 NIC emulation support is vulnerable to an infinite loop issue. It could occur while processing data via transmit or receive descriptors, provided the initial receive/transmit descriptor head (TDH/RDH) is set outside the allocated descriptor buffer. A privileged user inside guest could use this flaw to crash the QEMU instance resulting in DoS. | CVSS3: 5.5 | 0% Низкий | больше 3 лет назад | |
![]() | CVE-2016-1981 QEMU (aka Quick Emulator) built with the e1000 NIC emulation support is vulnerable to an infinite loop issue. It could occur while processing data via transmit or receive descriptors, provided the initial receive/transmit descriptor head (TDH/RDH) is set outside the allocated descriptor buffer. A privileged user inside guest could use this flaw to crash the QEMU instance resulting in DoS. | CVSS3: 5.5 | 0% Низкий | больше 8 лет назад |
![]() | CVE-2016-1981 QEMU (aka Quick Emulator) built with the e1000 NIC emulation support is vulnerable to an infinite loop issue. It could occur while processing data via transmit or receive descriptors, provided the initial receive/transmit descriptor head (TDH/RDH) is set outside the allocated descriptor buffer. A privileged user inside guest could use this flaw to crash the QEMU instance resulting in DoS. | CVSS2: 2.3 | 0% Низкий | больше 9 лет назад |
![]() | CVE-2016-1981 QEMU (aka Quick Emulator) built with the e1000 NIC emulation support is vulnerable to an infinite loop issue. It could occur while processing data via transmit or receive descriptors, provided the initial receive/transmit descriptor head (TDH/RDH) is set outside the allocated descriptor buffer. A privileged user inside guest could use this flaw to crash the QEMU instance resulting in DoS. | CVSS3: 5.5 | 0% Низкий | больше 8 лет назад |
CVE-2016-1981 QEMU (aka Quick Emulator) built with the e1000 NIC emulation support i ... | CVSS3: 5.5 | 0% Низкий | больше 8 лет назад | |
ELSA-2016-2585 ELSA-2016-2585: qemu-kvm security, bug fix, and enhancement update (MODERATE) | почти 9 лет назад | |||
![]() | openSUSE-SU-2016:0914-1 Security update for xen | больше 9 лет назад | ||
![]() | SUSE-SU-2016:1154-1 Security update for xen | больше 9 лет назад | ||
![]() | openSUSE-SU-2016:1750-1 Security update for qemu | около 9 лет назад | ||
![]() | SUSE-SU-2016:1703-1 Security update for qemu | около 9 лет назад | ||
![]() | SUSE-SU-2016:1785-1 Security update for kvm | около 9 лет назад | ||
![]() | SUSE-SU-2016:1698-1 Security update for kvm | около 9 лет назад | ||
![]() | SUSE-SU-2016:1745-1 Security update for xen | около 9 лет назад | ||
![]() | SUSE-SU-2016:1560-1 Security update for qemu | около 9 лет назад | ||
![]() | SUSE-SU-2016:0873-1 Security update for xen | больше 9 лет назад | ||
![]() | SUSE-SU-2016:1318-1 Security update for xen | больше 9 лет назад | ||
![]() | openSUSE-SU-2016:2494-1 Security update for xen | почти 9 лет назад | ||
![]() | SUSE-SU-2016:0955-1 Security update for xen | больше 9 лет назад |
Уязвимостей на страницу