Количество 19
Количество 19
GHSA-q4w6-2g7p-pr2c
An out-of-bounds write flaw was found in the UAS (USB Attached SCSI) device emulation of QEMU in versions prior to 6.2.0-rc0. The device uses the guest supplied stream number unchecked, which can lead to out-of-bounds access to the UASDevice->data3 and UASDevice->status3 fields. A malicious guest user could use this flaw to crash QEMU or potentially achieve code execution with the privileges of the QEMU process on the host.

CVE-2021-3713
An out-of-bounds write flaw was found in the UAS (USB Attached SCSI) device emulation of QEMU in versions prior to 6.2.0-rc0. The device uses the guest supplied stream number unchecked, which can lead to out-of-bounds access to the UASDevice->data3 and UASDevice->status3 fields. A malicious guest user could use this flaw to crash QEMU or potentially achieve code execution with the privileges of the QEMU process on the host.

CVE-2021-3713
An out-of-bounds write flaw was found in the UAS (USB Attached SCSI) device emulation of QEMU in versions prior to 6.2.0-rc0. The device uses the guest supplied stream number unchecked, which can lead to out-of-bounds access to the UASDevice->data3 and UASDevice->status3 fields. A malicious guest user could use this flaw to crash QEMU or potentially achieve code execution with the privileges of the QEMU process on the host.

CVE-2021-3713
An out-of-bounds write flaw was found in the UAS (USB Attached SCSI) device emulation of QEMU in versions prior to 6.2.0-rc0. The device uses the guest supplied stream number unchecked, which can lead to out-of-bounds access to the UASDevice->data3 and UASDevice->status3 fields. A malicious guest user could use this flaw to crash QEMU or potentially achieve code execution with the privileges of the QEMU process on the host.

CVE-2021-3713
CVE-2021-3713
An out-of-bounds write flaw was found in the UAS (USB Attached SCSI) d ...

BDU:2021-06306
Уязвимость эмуляции устройства UAS эмулятора аппаратного обеспечения QEMU, связанная с записью за границами буфера, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

openSUSE-SU-2021:3605-1
Security update for qemu

openSUSE-SU-2021:3604-1
Security update for qemu

openSUSE-SU-2021:1461-1
Security update for qemu

SUSE-SU-2021:3653-1
Security update for qemu

SUSE-SU-2021:3605-1
Security update for qemu

SUSE-SU-2021:3604-1
Security update for qemu

SUSE-SU-2021:3519-1
Security update for qemu

SUSE-SU-2021:3635-1
Security update for qemu

SUSE-SU-2021:3614-1
Security update for qemu

SUSE-SU-2021:3613-1
Security update for qemu
ELSA-2021-9638
ELSA-2021-9638: qemu security update (IMPORTANT)
ELSA-2022-9172
ELSA-2022-9172: virt:kvm_utils security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
GHSA-q4w6-2g7p-pr2c An out-of-bounds write flaw was found in the UAS (USB Attached SCSI) device emulation of QEMU in versions prior to 6.2.0-rc0. The device uses the guest supplied stream number unchecked, which can lead to out-of-bounds access to the UASDevice->data3 and UASDevice->status3 fields. A malicious guest user could use this flaw to crash QEMU or potentially achieve code execution with the privileges of the QEMU process on the host. | CVSS3: 7.4 | 0% Низкий | около 3 лет назад | |
![]() | CVE-2021-3713 An out-of-bounds write flaw was found in the UAS (USB Attached SCSI) device emulation of QEMU in versions prior to 6.2.0-rc0. The device uses the guest supplied stream number unchecked, which can lead to out-of-bounds access to the UASDevice->data3 and UASDevice->status3 fields. A malicious guest user could use this flaw to crash QEMU or potentially achieve code execution with the privileges of the QEMU process on the host. | CVSS3: 7.4 | 0% Низкий | почти 4 года назад |
![]() | CVE-2021-3713 An out-of-bounds write flaw was found in the UAS (USB Attached SCSI) device emulation of QEMU in versions prior to 6.2.0-rc0. The device uses the guest supplied stream number unchecked, which can lead to out-of-bounds access to the UASDevice->data3 and UASDevice->status3 fields. A malicious guest user could use this flaw to crash QEMU or potentially achieve code execution with the privileges of the QEMU process on the host. | CVSS3: 7.8 | 0% Низкий | почти 4 года назад |
![]() | CVE-2021-3713 An out-of-bounds write flaw was found in the UAS (USB Attached SCSI) device emulation of QEMU in versions prior to 6.2.0-rc0. The device uses the guest supplied stream number unchecked, which can lead to out-of-bounds access to the UASDevice->data3 and UASDevice->status3 fields. A malicious guest user could use this flaw to crash QEMU or potentially achieve code execution with the privileges of the QEMU process on the host. | CVSS3: 7.4 | 0% Низкий | почти 4 года назад |
![]() | CVSS3: 7.4 | 0% Низкий | больше 2 лет назад | |
CVE-2021-3713 An out-of-bounds write flaw was found in the UAS (USB Attached SCSI) d ... | CVSS3: 7.4 | 0% Низкий | почти 4 года назад | |
![]() | BDU:2021-06306 Уязвимость эмуляции устройства UAS эмулятора аппаратного обеспечения QEMU, связанная с записью за границами буфера, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании | CVSS3: 7.4 | 0% Низкий | почти 4 года назад |
![]() | openSUSE-SU-2021:3605-1 Security update for qemu | больше 3 лет назад | ||
![]() | openSUSE-SU-2021:3604-1 Security update for qemu | больше 3 лет назад | ||
![]() | openSUSE-SU-2021:1461-1 Security update for qemu | больше 3 лет назад | ||
![]() | SUSE-SU-2021:3653-1 Security update for qemu | больше 3 лет назад | ||
![]() | SUSE-SU-2021:3605-1 Security update for qemu | больше 3 лет назад | ||
![]() | SUSE-SU-2021:3604-1 Security update for qemu | больше 3 лет назад | ||
![]() | SUSE-SU-2021:3519-1 Security update for qemu | больше 3 лет назад | ||
![]() | SUSE-SU-2021:3635-1 Security update for qemu | больше 3 лет назад | ||
![]() | SUSE-SU-2021:3614-1 Security update for qemu | больше 3 лет назад | ||
![]() | SUSE-SU-2021:3613-1 Security update for qemu | больше 3 лет назад | ||
ELSA-2021-9638 ELSA-2021-9638: qemu security update (IMPORTANT) | больше 3 лет назад | |||
ELSA-2022-9172 ELSA-2022-9172: virt:kvm_utils security update (IMPORTANT) | больше 3 лет назад |
Уязвимостей на страницу