rpm package
suse/qemu&distro=SUSE Linux Enterprise Module for Server Applications 15 SP7
pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP7
Vulnerabilities (5)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2026-0665 | Med | 6.5 | < 9.2.4-150700.3.14.1 | 9.2.4-150700.3.14.1 | Feb 18, 2026 | An off-by-one error was found in QEMU's KVM Xen guest support. A malicious guest could use this flaw to trigger out-of-bounds heap accesses in the QEMU process via the emulated Xen physdev hypercall interface, leading to a denial of service or potential memory corruption. | |
| CVE-2025-14876 | Med | 5.5 | < 9.2.4-150700.3.17.1 | 9.2.4-150700.3.17.1 | Feb 18, 2026 | A flaw was found in the virtio-crypto device of QEMU. A malicious guest operating system can exploit a missing length limit in the AKCIPHER path, leading to uncontrolled memory allocation. This can result in a denial of service (DoS) on the host system by causing the QEMU process | |
| CVE-2025-12464 | Med | 6.2 | < 7.1.0-150500.49.36.2 | 7.1.0-150500.49.36.2 | Oct 31, 2025 | A stack-based buffer overflow was found in the QEMU e1000 network device. The code for padding short frames was dropped from individual network devices and moved to the net core code. The issue stems from the device's receive code still being able to process a short frame in loop | |
| CVE-2025-11234 | Hig | 7.5 | < 7.1.0-150500.49.36.2 | 7.1.0-150500.49.36.2 | Oct 3, 2025 | A flaw was found in QEMU. If the QIOChannelWebsock object is freed while it is waiting to complete a handshake, a GSource is leaked. This can lead to the callback firing later on and triggering a use-after-free in the use of the channel. This can be abused by a malicious client w | |
| CVE-2024-6505 | — | < 7.1.0-150500.49.36.2 | 7.1.0-150500.49.36.2 | Jul 5, 2024 | A flaw was found in the virtio-net device in QEMU. When enabling the RSS feature on the virtio-net network card, the indirections_table data within RSS becomes controllable. Setting excessively large values may cause an index out-of-bounds issue, potentially resulting in heap ove |
- affected < 9.2.4-150700.3.14.1fixed 9.2.4-150700.3.14.1
An off-by-one error was found in QEMU's KVM Xen guest support. A malicious guest could use this flaw to trigger out-of-bounds heap accesses in the QEMU process via the emulated Xen physdev hypercall interface, leading to a denial of service or potential memory corruption.
- affected < 9.2.4-150700.3.17.1fixed 9.2.4-150700.3.17.1
A flaw was found in the virtio-crypto device of QEMU. A malicious guest operating system can exploit a missing length limit in the AKCIPHER path, leading to uncontrolled memory allocation. This can result in a denial of service (DoS) on the host system by causing the QEMU process
- affected < 7.1.0-150500.49.36.2fixed 7.1.0-150500.49.36.2
A stack-based buffer overflow was found in the QEMU e1000 network device. The code for padding short frames was dropped from individual network devices and moved to the net core code. The issue stems from the device's receive code still being able to process a short frame in loop
- affected < 7.1.0-150500.49.36.2fixed 7.1.0-150500.49.36.2
A flaw was found in QEMU. If the QIOChannelWebsock object is freed while it is waiting to complete a handshake, a GSource is leaked. This can lead to the callback firing later on and triggering a use-after-free in the use of the channel. This can be abused by a malicious client w
- CVE-2024-6505Jul 5, 2024affected < 7.1.0-150500.49.36.2fixed 7.1.0-150500.49.36.2
A flaw was found in the virtio-net device in QEMU. When enabling the RSS feature on the virtio-net network card, the indirections_table data within RSS becomes controllable. Setting excessively large values may cause an index out-of-bounds issue, potentially resulting in heap ove