Количество 23
Количество 23

CVE-2021-3416
A potential stack overflow via infinite loop issue was found in various NIC emulators of QEMU in versions up to and including 5.2.0. The issue occurs in loopback mode of a NIC wherein reentrant DMA checks get bypassed. A guest user/process may use this flaw to consume CPU cycles or crash the QEMU process on the host resulting in DoS scenario.

CVE-2021-3416
A potential stack overflow via infinite loop issue was found in various NIC emulators of QEMU in versions up to and including 5.2.0. The issue occurs in loopback mode of a NIC wherein reentrant DMA checks get bypassed. A guest user/process may use this flaw to consume CPU cycles or crash the QEMU process on the host resulting in DoS scenario.

CVE-2021-3416
A potential stack overflow via infinite loop issue was found in various NIC emulators of QEMU in versions up to and including 5.2.0. The issue occurs in loopback mode of a NIC wherein reentrant DMA checks get bypassed. A guest user/process may use this flaw to consume CPU cycles or crash the QEMU process on the host resulting in DoS scenario.

CVE-2021-3416
CVE-2021-3416
A potential stack overflow via infinite loop issue was found in variou ...
GHSA-g3hx-jv57-3ffr
A potential stack overflow via infinite loop issue was found in various NIC emulators of QEMU in versions up to and including 5.2.0. The issue occurs in loopback mode of a NIC wherein reentrant DMA checks get bypassed. A guest user/process may use this flaw to consume CPU cycles or crash the QEMU process on the host resulting in DoS scenario.

BDU:2022-05839
Уязвимость эмулятора аппаратного обеспечения QEMU, связанная с выполнением цикла с недоступным условием выхода, позволяющая нарушителю вызвать отказ в обслуживании

RLSA-2021:3061
Moderate: virt:rhel and virt-devel:rhel security and bug fix update
ELSA-2022-9123
ELSA-2022-9123: qemu security update (IMPORTANT)
ELSA-2021-3061
ELSA-2021-3061: virt:ol and virt-devel:rhel security and bug fix update (MODERATE)

SUSE-SU-2021:14774-1
Security update for kvm

SUSE-SU-2021:14772-1
Security update for kvm

openSUSE-SU-2021:1942-1
Security update for qemu

SUSE-SU-2021:1942-1
Security update for qemu

openSUSE-SU-2021:0600-1
Security update for qemu

SUSE-SU-2021:1243-1
Security update for qemu
ELSA-2022-9172
ELSA-2022-9172: virt:kvm_utils security update (IMPORTANT)

SUSE-SU-2021:1305-1
Security update for qemu

SUSE-SU-2021:1242-1
Security update for qemu

SUSE-SU-2021:1240-1
Security update for qemu
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2021-3416 A potential stack overflow via infinite loop issue was found in various NIC emulators of QEMU in versions up to and including 5.2.0. The issue occurs in loopback mode of a NIC wherein reentrant DMA checks get bypassed. A guest user/process may use this flaw to consume CPU cycles or crash the QEMU process on the host resulting in DoS scenario. | CVSS3: 6 | 0% Низкий | больше 4 лет назад |
![]() | CVE-2021-3416 A potential stack overflow via infinite loop issue was found in various NIC emulators of QEMU in versions up to and including 5.2.0. The issue occurs in loopback mode of a NIC wherein reentrant DMA checks get bypassed. A guest user/process may use this flaw to consume CPU cycles or crash the QEMU process on the host resulting in DoS scenario. | CVSS3: 3.2 | 0% Низкий | больше 4 лет назад |
![]() | CVE-2021-3416 A potential stack overflow via infinite loop issue was found in various NIC emulators of QEMU in versions up to and including 5.2.0. The issue occurs in loopback mode of a NIC wherein reentrant DMA checks get bypassed. A guest user/process may use this flaw to consume CPU cycles or crash the QEMU process on the host resulting in DoS scenario. | CVSS3: 6 | 0% Низкий | больше 4 лет назад |
![]() | CVSS3: 6 | 0% Низкий | больше 4 лет назад | |
CVE-2021-3416 A potential stack overflow via infinite loop issue was found in variou ... | CVSS3: 6 | 0% Низкий | больше 4 лет назад | |
GHSA-g3hx-jv57-3ffr A potential stack overflow via infinite loop issue was found in various NIC emulators of QEMU in versions up to and including 5.2.0. The issue occurs in loopback mode of a NIC wherein reentrant DMA checks get bypassed. A guest user/process may use this flaw to consume CPU cycles or crash the QEMU process on the host resulting in DoS scenario. | CVSS3: 6 | 0% Низкий | около 3 лет назад | |
![]() | BDU:2022-05839 Уязвимость эмулятора аппаратного обеспечения QEMU, связанная с выполнением цикла с недоступным условием выхода, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 6 | 0% Низкий | больше 4 лет назад |
![]() | RLSA-2021:3061 Moderate: virt:rhel and virt-devel:rhel security and bug fix update | почти 4 года назад | ||
ELSA-2022-9123 ELSA-2022-9123: qemu security update (IMPORTANT) | больше 3 лет назад | |||
ELSA-2021-3061 ELSA-2021-3061: virt:ol and virt-devel:rhel security and bug fix update (MODERATE) | почти 4 года назад | |||
![]() | SUSE-SU-2021:14774-1 Security update for kvm | около 4 лет назад | ||
![]() | SUSE-SU-2021:14772-1 Security update for kvm | около 4 лет назад | ||
![]() | openSUSE-SU-2021:1942-1 Security update for qemu | около 4 лет назад | ||
![]() | SUSE-SU-2021:1942-1 Security update for qemu | около 4 лет назад | ||
![]() | openSUSE-SU-2021:0600-1 Security update for qemu | больше 4 лет назад | ||
![]() | SUSE-SU-2021:1243-1 Security update for qemu | больше 4 лет назад | ||
ELSA-2022-9172 ELSA-2022-9172: virt:kvm_utils security update (IMPORTANT) | больше 3 лет назад | |||
![]() | SUSE-SU-2021:1305-1 Security update for qemu | больше 4 лет назад | ||
![]() | SUSE-SU-2021:1242-1 Security update for qemu | больше 4 лет назад | ||
![]() | SUSE-SU-2021:1240-1 Security update for qemu | больше 4 лет назад |
Уязвимостей на страницу