Количество 20
Количество 20

CVE-2021-3527
A flaw was found in the USB redirector device (usb-redir) of QEMU. Small USB packets are combined into a single, large transfer request, to reduce the overhead and improve performance. The combined size of the bulk transfer is used to dynamically allocate a variable length array (VLA) on the stack without proper validation. Since the total size is not bounded, a malicious guest could use this flaw to influence the array length and cause the QEMU process to perform an excessive allocation on the stack, resulting in a denial of service.

CVE-2021-3527
A flaw was found in the USB redirector device (usb-redir) of QEMU. Small USB packets are combined into a single, large transfer request, to reduce the overhead and improve performance. The combined size of the bulk transfer is used to dynamically allocate a variable length array (VLA) on the stack without proper validation. Since the total size is not bounded, a malicious guest could use this flaw to influence the array length and cause the QEMU process to perform an excessive allocation on the stack, resulting in a denial of service.

CVE-2021-3527
A flaw was found in the USB redirector device (usb-redir) of QEMU. Small USB packets are combined into a single, large transfer request, to reduce the overhead and improve performance. The combined size of the bulk transfer is used to dynamically allocate a variable length array (VLA) on the stack without proper validation. Since the total size is not bounded, a malicious guest could use this flaw to influence the array length and cause the QEMU process to perform an excessive allocation on the stack, resulting in a denial of service.

CVE-2021-3527
CVE-2021-3527
A flaw was found in the USB redirector device (usb-redir) of QEMU. Sma ...
GHSA-fwv2-775h-qv4v
A flaw was found in the USB redirector device (usb-redir) of QEMU. Small USB packets are combined into a single, large transfer request, to reduce the overhead and improve performance. The combined size of the bulk transfer is used to dynamically allocate a variable length array (VLA) on the stack without proper validation. Since the total size is not bounded, a malicious guest could use this flaw to influence the array length and cause the QEMU process to perform an excessive allocation on the stack, resulting in a denial of service.

BDU:2022-05840
Уязвимость эмулятора аппаратного обеспечения QEMU, связанная с выделением неограниченной памяти, позволяющая нарушителю вызвать отказ в обслуживании

openSUSE-SU-2021:2858-1
Security update for qemu

openSUSE-SU-2021:2789-1
Security update for qemu

SUSE-SU-2021:3575-1
Security update for qemu

SUSE-SU-2021:2858-1
Security update for qemu

SUSE-SU-2021:2813-1
Security update for qemu

SUSE-SU-2021:2789-1
Security update for qemu
ELSA-2021-9425
ELSA-2021-9425: qemu security update (IMPORTANT)

SUSE-SU-2021:3635-1
Security update for qemu

SUSE-SU-2021:3614-1
Security update for qemu

SUSE-SU-2021:3613-1
Security update for qemu
ELSA-2021-9568
ELSA-2021-9568: virt:kvm_utils security update (IMPORTANT)

openSUSE-SU-2021:1202-1
Security update for qemu

SUSE-SU-2021:14848-1
Security update for xen
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2021-3527 A flaw was found in the USB redirector device (usb-redir) of QEMU. Small USB packets are combined into a single, large transfer request, to reduce the overhead and improve performance. The combined size of the bulk transfer is used to dynamically allocate a variable length array (VLA) on the stack without proper validation. Since the total size is not bounded, a malicious guest could use this flaw to influence the array length and cause the QEMU process to perform an excessive allocation on the stack, resulting in a denial of service. | CVSS3: 5.5 | 0% Низкий | около 4 лет назад |
![]() | CVE-2021-3527 A flaw was found in the USB redirector device (usb-redir) of QEMU. Small USB packets are combined into a single, large transfer request, to reduce the overhead and improve performance. The combined size of the bulk transfer is used to dynamically allocate a variable length array (VLA) on the stack without proper validation. Since the total size is not bounded, a malicious guest could use this flaw to influence the array length and cause the QEMU process to perform an excessive allocation on the stack, resulting in a denial of service. | CVSS3: 3.2 | 0% Низкий | около 4 лет назад |
![]() | CVE-2021-3527 A flaw was found in the USB redirector device (usb-redir) of QEMU. Small USB packets are combined into a single, large transfer request, to reduce the overhead and improve performance. The combined size of the bulk transfer is used to dynamically allocate a variable length array (VLA) on the stack without proper validation. Since the total size is not bounded, a malicious guest could use this flaw to influence the array length and cause the QEMU process to perform an excessive allocation on the stack, resulting in a denial of service. | CVSS3: 5.5 | 0% Низкий | около 4 лет назад |
![]() | CVSS3: 5.5 | 0% Низкий | около 4 лет назад | |
CVE-2021-3527 A flaw was found in the USB redirector device (usb-redir) of QEMU. Sma ... | CVSS3: 5.5 | 0% Низкий | около 4 лет назад | |
GHSA-fwv2-775h-qv4v A flaw was found in the USB redirector device (usb-redir) of QEMU. Small USB packets are combined into a single, large transfer request, to reduce the overhead and improve performance. The combined size of the bulk transfer is used to dynamically allocate a variable length array (VLA) on the stack without proper validation. Since the total size is not bounded, a malicious guest could use this flaw to influence the array length and cause the QEMU process to perform an excessive allocation on the stack, resulting in a denial of service. | CVSS3: 5.5 | 0% Низкий | около 3 лет назад | |
![]() | BDU:2022-05840 Уязвимость эмулятора аппаратного обеспечения QEMU, связанная с выделением неограниченной памяти, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 5.5 | 0% Низкий | около 4 лет назад |
![]() | openSUSE-SU-2021:2858-1 Security update for qemu | почти 4 года назад | ||
![]() | openSUSE-SU-2021:2789-1 Security update for qemu | почти 4 года назад | ||
![]() | SUSE-SU-2021:3575-1 Security update for qemu | больше 3 лет назад | ||
![]() | SUSE-SU-2021:2858-1 Security update for qemu | почти 4 года назад | ||
![]() | SUSE-SU-2021:2813-1 Security update for qemu | почти 4 года назад | ||
![]() | SUSE-SU-2021:2789-1 Security update for qemu | почти 4 года назад | ||
ELSA-2021-9425 ELSA-2021-9425: qemu security update (IMPORTANT) | почти 4 года назад | |||
![]() | SUSE-SU-2021:3635-1 Security update for qemu | больше 3 лет назад | ||
![]() | SUSE-SU-2021:3614-1 Security update for qemu | больше 3 лет назад | ||
![]() | SUSE-SU-2021:3613-1 Security update for qemu | больше 3 лет назад | ||
ELSA-2021-9568 ELSA-2021-9568: virt:kvm_utils security update (IMPORTANT) | больше 3 лет назад | |||
![]() | openSUSE-SU-2021:1202-1 Security update for qemu | почти 4 года назад | ||
![]() | SUSE-SU-2021:14848-1 Security update for xen | больше 3 лет назад |
Уязвимостей на страницу