Search for packages
| purl | pkg:rpm/redhat/qemu-kvm@2:0.12.1.2-2.415.el6_5?arch=10 |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 3.4 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-3nny-89d4-qyen
Aliases: CVE-2013-6399 |
qemu: virtio: buffer overrun on incoming migration | There are no reported fixed by versions. |
|
VCID-5n4a-ahzv-8uev
Aliases: CVE-2013-4535 |
qemu: virtio: insufficient validation of num_sg when mapping | There are no reported fixed by versions. |
|
VCID-6u6t-75dg-xybn
Aliases: CVE-2014-2894 |
Multiple vulnerabilities have been found in QEMU, worst of which allows local attackers to execute arbitrary code. | There are no reported fixed by versions. |
|
VCID-8mht-ekbe-kfaz
Aliases: CVE-2014-3461 |
Multiple vulnerabilities have been found in QEMU, worst of which allows local attackers to execute arbitrary code. | There are no reported fixed by versions. |
|
VCID-baa4-an7u-p7gm
Aliases: CVE-2013-4151 |
qemu: virtio: out-of-bounds buffer write on invalid state load | There are no reported fixed by versions. |
|
VCID-gww6-vxca-fkhf
Aliases: CVE-2013-4536 |
qemu: virtio: insufficient validation of num_sg when mapping | There are no reported fixed by versions. |
|
VCID-u241-wxh3-nfd5
Aliases: CVE-2013-4148 |
qemu: virtio-net: buffer overflow on invalid state load | There are no reported fixed by versions. |
|
VCID-ud3x-68yc-rkfk
Aliases: CVE-2014-0182 |
qemu: virtio: out-of-bounds buffer write on state load with invalid config_len | There are no reported fixed by versions. |
|
VCID-xpbs-a4tm-6yec
Aliases: CVE-2013-4542 |
qemu: virtio-scsi: buffer overrun on invalid state load | There are no reported fixed by versions. |
|
VCID-ytyn-dbsc-k3cn
Aliases: CVE-2013-4541 |
qemu: usb: insufficient sanity checking of setup_index+setup_len in post_load | There are no reported fixed by versions. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||