Количество 18
Количество 18
CVE-2016-1981
QEMU (aka Quick Emulator) built with the e1000 NIC emulation support is vulnerable to an infinite loop issue. It could occur while processing data via transmit or receive descriptors, provided the initial receive/transmit descriptor head (TDH/RDH) is set outside the allocated descriptor buffer. A privileged user inside guest could use this flaw to crash the QEMU instance resulting in DoS.
CVE-2016-1981
QEMU (aka Quick Emulator) built with the e1000 NIC emulation support is vulnerable to an infinite loop issue. It could occur while processing data via transmit or receive descriptors, provided the initial receive/transmit descriptor head (TDH/RDH) is set outside the allocated descriptor buffer. A privileged user inside guest could use this flaw to crash the QEMU instance resulting in DoS.
CVE-2016-1981
QEMU (aka Quick Emulator) built with the e1000 NIC emulation support is vulnerable to an infinite loop issue. It could occur while processing data via transmit or receive descriptors, provided the initial receive/transmit descriptor head (TDH/RDH) is set outside the allocated descriptor buffer. A privileged user inside guest could use this flaw to crash the QEMU instance resulting in DoS.
CVE-2016-1981
QEMU (aka Quick Emulator) built with the e1000 NIC emulation support i ...
GHSA-ch9p-9c28-4r3p
QEMU (aka Quick Emulator) built with the e1000 NIC emulation support is vulnerable to an infinite loop issue. It could occur while processing data via transmit or receive descriptors, provided the initial receive/transmit descriptor head (TDH/RDH) is set outside the allocated descriptor buffer. A privileged user inside guest could use this flaw to crash the QEMU instance resulting in DoS.
ELSA-2016-2585
ELSA-2016-2585: qemu-kvm security, bug fix, and enhancement update (MODERATE)
openSUSE-SU-2016:0914-1
Security update for xen
SUSE-SU-2016:1154-1
Security update for xen
openSUSE-SU-2016:1750-1
Security update for qemu
SUSE-SU-2016:1703-1
Security update for qemu
SUSE-SU-2016:1785-1
Security update for kvm
SUSE-SU-2016:1698-1
Security update for kvm
SUSE-SU-2016:1745-1
Security update for xen
SUSE-SU-2016:1560-1
Security update for qemu
SUSE-SU-2016:0873-1
Security update for xen
SUSE-SU-2016:1318-1
Security update for xen
openSUSE-SU-2016:2494-1
Security update for xen
SUSE-SU-2016:0955-1
Security update for xen
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2016-1981 QEMU (aka Quick Emulator) built with the e1000 NIC emulation support is vulnerable to an infinite loop issue. It could occur while processing data via transmit or receive descriptors, provided the initial receive/transmit descriptor head (TDH/RDH) is set outside the allocated descriptor buffer. A privileged user inside guest could use this flaw to crash the QEMU instance resulting in DoS. | CVSS3: 5.5 | 0% Низкий | почти 9 лет назад | |
CVE-2016-1981 QEMU (aka Quick Emulator) built with the e1000 NIC emulation support is vulnerable to an infinite loop issue. It could occur while processing data via transmit or receive descriptors, provided the initial receive/transmit descriptor head (TDH/RDH) is set outside the allocated descriptor buffer. A privileged user inside guest could use this flaw to crash the QEMU instance resulting in DoS. | CVSS2: 2.3 | 0% Низкий | почти 10 лет назад | |
CVE-2016-1981 QEMU (aka Quick Emulator) built with the e1000 NIC emulation support is vulnerable to an infinite loop issue. It could occur while processing data via transmit or receive descriptors, provided the initial receive/transmit descriptor head (TDH/RDH) is set outside the allocated descriptor buffer. A privileged user inside guest could use this flaw to crash the QEMU instance resulting in DoS. | CVSS3: 5.5 | 0% Низкий | почти 9 лет назад | |
CVE-2016-1981 QEMU (aka Quick Emulator) built with the e1000 NIC emulation support i ... | CVSS3: 5.5 | 0% Низкий | почти 9 лет назад | |
GHSA-ch9p-9c28-4r3p QEMU (aka Quick Emulator) built with the e1000 NIC emulation support is vulnerable to an infinite loop issue. It could occur while processing data via transmit or receive descriptors, provided the initial receive/transmit descriptor head (TDH/RDH) is set outside the allocated descriptor buffer. A privileged user inside guest could use this flaw to crash the QEMU instance resulting in DoS. | CVSS3: 5.5 | 0% Низкий | больше 3 лет назад | |
ELSA-2016-2585 ELSA-2016-2585: qemu-kvm security, bug fix, and enhancement update (MODERATE) | около 9 лет назад | |||
openSUSE-SU-2016:0914-1 Security update for xen | больше 9 лет назад | |||
SUSE-SU-2016:1154-1 Security update for xen | больше 9 лет назад | |||
openSUSE-SU-2016:1750-1 Security update for qemu | больше 9 лет назад | |||
SUSE-SU-2016:1703-1 Security update for qemu | больше 9 лет назад | |||
SUSE-SU-2016:1785-1 Security update for kvm | больше 9 лет назад | |||
SUSE-SU-2016:1698-1 Security update for kvm | больше 9 лет назад | |||
SUSE-SU-2016:1745-1 Security update for xen | больше 9 лет назад | |||
SUSE-SU-2016:1560-1 Security update for qemu | больше 9 лет назад | |||
SUSE-SU-2016:0873-1 Security update for xen | больше 9 лет назад | |||
SUSE-SU-2016:1318-1 Security update for xen | больше 9 лет назад | |||
openSUSE-SU-2016:2494-1 Security update for xen | около 9 лет назад | |||
SUSE-SU-2016:0955-1 Security update for xen | больше 9 лет назад |
Уязвимостей на страницу