Filter
AND

Debian Debian LinuxUse After Free

3.3
First published (updated )

Debian Debian LinuxLast updated 24 July 2024

3.2
First published (updated )

Debian Debian LinuxUse After Free

3.2
First published (updated )

Debian Debian LinuxInteger Overflow

3.2
First published (updated )

Debian Debian LinuxLast updated 24 July 2024

3.9
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Canonical Ubuntu LinuxLast updated 24 July 2024

3.8
First published (updated )

Debian Debian LinuxNull Pointer Dereference

2.3
First published (updated )

Canonical Ubuntu LinuxDivide by Zero

3.3
First published (updated )

Canonical Ubuntu LinuxNull Pointer Dereference

2.5
First published (updated )

Debian Debian LinuxLast updated 24 July 2024

3.2
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Debian Debian LinuxLast updated 24 July 2024

3.9
First published (updated )

Canonical Ubuntu LinuxInteger Overflow

3.8
First published (updated )

redhat/qemuBuffer Overflow

3.8
First published (updated )

debian/qemuInteger Overflow

3.3
First published (updated )

openSUSE Leaphw/ppc/spapr.c in QEMU through 3.1.0 allows Information Exposure because the hypervisor shares the /…

3.3
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Canonical Ubuntu LinuxLast updated 11 November 2024

3.5
First published (updated )

QEMU KVMLast updated 24 July 2024

3.8
First published (updated )

Debian Debian LinuxQEMU 0.8.2 allows local users to halt a virtual machine by executing the icebp instruction.

2.1
First published (updated )

Debian Debian LinuxQEMU 0.8.2 allows local users to crash a virtual machine via the divisor operand to the aam instruct…

2.1
First published (updated )

openSUSE openSUSEQEMU 0.9.0 does not properly handle changes to removable media, which allows guest OS users to read …

2.1
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

QEMU KVMThe change_process_uid function in os-posix.c in Qemu 0.14.0 and earlier does not properly drop grou…

2.1
First published (updated )

QEMU KVMUse After Free

2.3
First published (updated )

QEMU KVMThe qdisk PV disk backend in qemu-xen in Xen 4.2.x and 4.3.x before 4.3.1, and qemu 1.1 and other ve…

2.7
First published (updated )

QEMU KVMNull Pointer Dereference

2.1
First published (updated )

Red Hat Enterprise Linux ServerInfoleak

2.1
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Arista EOSThe process_tx_desc function in hw/net/e1000.c in QEMU before 2.4.0.1 does not properly process tran…

3.5
First published (updated )

QEMU KVMThe slirp_smb function in net/slirp.c in QEMU 2.3.0 and earlier creates temporary files with predict…

1.9
First published (updated )

QEMU KVMInfoleak

3.3
First published (updated )

redhat/qemuLast updated 24 July 2024

3.2
First published (updated )

redhat/QEMUNull Pointer Dereference

3.2
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203