VYPR

rpm package

suse/qemu&distro=SUSE Linux Enterprise Module for Package Hub 15 SP6

pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Package%20Hub%2015%20SP6

Vulnerabilities (5)

  • CVE-2024-8612LowSep 20, 2024
    affected < 8.2.7-150600.3.20.1fixed 8.2.7-150600.3.20.1

    A flaw was found in QEMU, in the virtio-scsi, virtio-blk, and virtio-crypto devices. The size for virtqueue_push as set in virtio_scsi_complete_req / virtio_blk_req_complete / virito_crypto_req_complete could be larger than the true size of the data which has been sent to guest.

  • CVE-2024-8354Sep 19, 2024
    affected < 8.2.7-150600.3.20.1fixed 8.2.7-150600.3.20.1

    A flaw was found in QEMU. An assertion failure was present in the usb_ep_get() function in hw/net/core.c when trying to get the USB endpoint from a USB device. This flaw may allow a malicious unprivileged guest user to crash the QEMU process on the host and cause a denial of serv

  • CVE-2024-7409HigAug 5, 2024
    affected < 8.2.6-150600.3.9.1fixed 8.2.6-150600.3.9.1

    A flaw was found in the QEMU NBD Server. This vulnerability allows a denial of service (DoS) attack via improper synchronization during socket closure when a client keeps a socket open as the server is taken offline.

  • CVE-2024-4467HigJul 2, 2024
    affected < 8.2.6-150600.3.9.1fixed 8.2.6-150600.3.9.1

    A flaw was found in the QEMU disk image utility (qemu-img) 'info' command. A specially crafted image file containing a `json:{}` value describing block devices in QMP could cause the qemu-img process on the host to consume large amounts of memory or CPU time, leading to denial of

  • CVE-2024-4693MedMay 14, 2024
    affected < 8.2.7-150600.3.20.1fixed 8.2.7-150600.3.20.1

    A flaw was found in the QEMU Virtio PCI Bindings (hw/virtio/virtio-pci.c). An improper release and use of the irqfd for vector 0 during the boot process leads to a guest triggerable crash via vhost_net_stop(). This flaw allows a malicious guest to crash the QEMU process on the ho