Количество 12
Количество 12
CVE-2015-8744
QEMU (aka Quick Emulator) built with a VMWARE VMXNET3 paravirtual NIC emulator support is vulnerable to crash issue. It occurs when a guest sends a Layer-2 packet smaller than 22 bytes. A privileged (CAP_SYS_RAWIO) guest user could use this flaw to crash the QEMU process instance resulting in DoS.
CVE-2015-8744
QEMU (aka Quick Emulator) built with a VMWARE VMXNET3 paravirtual NIC emulator support is vulnerable to crash issue. It occurs when a guest sends a Layer-2 packet smaller than 22 bytes. A privileged (CAP_SYS_RAWIO) guest user could use this flaw to crash the QEMU process instance resulting in DoS.
CVE-2015-8744
QEMU (aka Quick Emulator) built with a VMWARE VMXNET3 paravirtual NIC emulator support is vulnerable to crash issue. It occurs when a guest sends a Layer-2 packet smaller than 22 bytes. A privileged (CAP_SYS_RAWIO) guest user could use this flaw to crash the QEMU process instance resulting in DoS.
CVE-2015-8744
QEMU (aka Quick Emulator) built with a VMWARE VMXNET3 paravirtual NIC ...
GHSA-5hxw-v9gx-rf25
QEMU (aka Quick Emulator) built with a VMWARE VMXNET3 paravirtual NIC emulator support is vulnerable to crash issue. It occurs when a guest sends a Layer-2 packet smaller than 22 bytes. A privileged (CAP_SYS_RAWIO) guest user could use this flaw to crash the QEMU process instance resulting in DoS.
openSUSE-SU-2016:0914-1
Security update for xen
openSUSE-SU-2016:1750-1
Security update for qemu
SUSE-SU-2016:1703-1
Security update for qemu
SUSE-SU-2016:1560-1
Security update for qemu
SUSE-SU-2016:0873-1
Security update for xen
SUSE-SU-2016:1318-1
Security update for xen
SUSE-SU-2016:0955-1
Security update for xen
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2015-8744 QEMU (aka Quick Emulator) built with a VMWARE VMXNET3 paravirtual NIC emulator support is vulnerable to crash issue. It occurs when a guest sends a Layer-2 packet smaller than 22 bytes. A privileged (CAP_SYS_RAWIO) guest user could use this flaw to crash the QEMU process instance resulting in DoS. | CVSS3: 5.5 | 0% Низкий | около 9 лет назад | |
CVE-2015-8744 QEMU (aka Quick Emulator) built with a VMWARE VMXNET3 paravirtual NIC emulator support is vulnerable to crash issue. It occurs when a guest sends a Layer-2 packet smaller than 22 bytes. A privileged (CAP_SYS_RAWIO) guest user could use this flaw to crash the QEMU process instance resulting in DoS. | CVSS2: 2.3 | 0% Низкий | больше 10 лет назад | |
CVE-2015-8744 QEMU (aka Quick Emulator) built with a VMWARE VMXNET3 paravirtual NIC emulator support is vulnerable to crash issue. It occurs when a guest sends a Layer-2 packet smaller than 22 bytes. A privileged (CAP_SYS_RAWIO) guest user could use this flaw to crash the QEMU process instance resulting in DoS. | CVSS3: 5.5 | 0% Низкий | около 9 лет назад | |
CVE-2015-8744 QEMU (aka Quick Emulator) built with a VMWARE VMXNET3 paravirtual NIC ... | CVSS3: 5.5 | 0% Низкий | около 9 лет назад | |
GHSA-5hxw-v9gx-rf25 QEMU (aka Quick Emulator) built with a VMWARE VMXNET3 paravirtual NIC emulator support is vulnerable to crash issue. It occurs when a guest sends a Layer-2 packet smaller than 22 bytes. A privileged (CAP_SYS_RAWIO) guest user could use this flaw to crash the QEMU process instance resulting in DoS. | CVSS3: 5.5 | 0% Низкий | больше 3 лет назад | |
openSUSE-SU-2016:0914-1 Security update for xen | почти 10 лет назад | |||
openSUSE-SU-2016:1750-1 Security update for qemu | больше 9 лет назад | |||
SUSE-SU-2016:1703-1 Security update for qemu | больше 9 лет назад | |||
SUSE-SU-2016:1560-1 Security update for qemu | больше 9 лет назад | |||
SUSE-SU-2016:0873-1 Security update for xen | почти 10 лет назад | |||
SUSE-SU-2016:1318-1 Security update for xen | больше 9 лет назад | |||
SUSE-SU-2016:0955-1 Security update for xen | почти 10 лет назад |
Уязвимостей на страницу