[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:89002165
This update for qemu fixes the following issues: Security issues fixed: - CVE-2018-10839: Fixed NE2000 NIC emulation support that is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use thi ...

oval:org.secpod.oval:def:89002173
This update for kvm fixes the following issues: Security issues fixed: - CVE-2018-10839: Fixed NE2000 NIC emulation support that is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this ...

oval:org.secpod.oval:def:89002316
This update for qemu fixes the following issues: Security issues fixed: - CVE-2018-10839: Fixed NE2000 NIC emulation support that is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use thi ...

oval:org.secpod.oval:def:115587
QEMU is a generic and open source processor emulator which achieves a good emulation speed by using dynamic translation. QEMU has two operating modes: * Full system emulation. In this mode, QEMU emulates a full system , including a processor and various peripherials. It can be used to launch differe ...

oval:org.secpod.oval:def:89002439
This update for qemu fixes the following issues: Security issues fixed: - CVE-2018-10839: Fixed NE2000 NIC emulation support that is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use thi ...

oval:org.secpod.oval:def:1504385
[12:2.9.0-17.el7] - i386: Remove generic SMT thread check [Orabug: 28676425] - pc: Fix typo on PC_COMPAT_2_12 [Orabug: 28676425] - i386: Enable TOPOEXT feature on AMD EPYC CPU [Orabug: 28676425] - net: ignore packet size greater than INT_MAX [Orabug: 28762625] {CVE-2018-17963} - pcnet: fix possi ...

oval:org.secpod.oval:def:205612
Kernel-based Virtual Machine is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM. Security Fix: * QEMU: seccomp: blacklist is not applied to all threads * QEMU: vnc: memory leaka ...

oval:org.secpod.oval:def:504345
Kernel-based Virtual Machine is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-ma packages provide the user-space component for running virtual machines that use KVM on the IBM z Systems, IBM Power, and 64-bit ARM architectures. Security Fix: * QEMU: seccomp: b ...

oval:org.secpod.oval:def:1504432
[1.5.3-175.el7] - kvm-vnc-fix-memory-leak-when-vnc-disconnect.patch [bz#1810408] - Resolves: bz#1810408 [1.5.3-174.el7] - kvm-util-add-slirp_fmt-helpers2.patch [bz#1800515] - kvm-tcp_emu-fix-unsafe-snprintf-usages2.patch [bz#1800515] - kvm-slirp-disable-tcp_emu.patch [bz#1791679] - kvm-gluster-Hand ...

oval:org.secpod.oval:def:1601209
qemu-seccomp.c in QEMU might allow local OS guest users to cause a denial of service by leveraging mishandling of the seccomp policy for threads other than the main thread. A heap buffer overflow issue was found in the SLiRP networking implementation of the QEMU emulator. This flaw occurs in the ip ...

oval:org.secpod.oval:def:504317
Kernel-based Virtual Machine is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM. Security Fix: * QEMU: seccomp: blacklist is not applied to all threads * QEMU: vnc: memory leaka ...

oval:org.secpod.oval:def:89049595
This update for qemu fixes the following issues: Security issues fixed: - CVE-2018-10839: Fixed NE2000 NIC emulation support that is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use thi ...

oval:org.secpod.oval:def:1504737
[15:3.0.0-1.el7] - net: ignore packet size greater than INT_MAX [Orabug: 28763782] {CVE-2018-17963} - pcnet: fix possible buffer overflow [Orabug: 28763774] {CVE-2018-17962} - rtl8139: fix possible out of bound access [Orabug: 28763765] {CVE-2018-17958} - ne2000: fix possible out of bound access ...

CPE    1
cpe:/a:qemu:qemu:-
CWE    1
CWE-358
*CVE
CVE-2018-15746

© SecPod Technologies