QEMU security update for multiple vulnerabilities including DoS, information leak, and code executio
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
![]() | qemu - security update | 16 Feb 202100:00 | – | osv |
![]() | qemu vulnerabilities | 8 Feb 202113:12 | – | osv |
![]() | CVE-2020-25084 | 25 Sep 202005:15 | – | osv |
![]() | Red Hat Security Advisory: qemu-kvm-rhev security update | 13 Sep 202415:43 | – | osv |
![]() | CVE-2020-15859 | 21 Jul 202016:15 | – | osv |
![]() | CVE-2020-28916 | 4 Dec 202007:15 | – | osv |
![]() | CVE-2021-20221 | 13 May 202116:15 | – | osv |
![]() | CVE-2020-15469 | 2 Jul 202020:15 | – | osv |
![]() | Red Hat Security Advisory: virt:8.3 and virt-devel:8.3 security and bug fix update | 13 Sep 202422:45 | – | osv |
![]() | CVE-2021-20181 | 13 May 202116:15 | – | osv |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
Debian | 9 | armhf | qemu-user | 1:2.8+dfsg-6+deb9u13 | qemu-user_1:2.8+dfsg-6+deb9u13_armhf.deb |
Debian | 9 | armel | qemu-user-binfmt | 1:2.8+dfsg-6+deb9u13 | qemu-user-binfmt_1:2.8+dfsg-6+deb9u13_armel.deb |
Debian | 9 | i386 | qemu | 1:2.8+dfsg-6+deb9u13 | qemu_1:2.8+dfsg-6+deb9u13_i386.deb |
Debian | 9 | armel | qemu-system | 1:2.8+dfsg-6+deb9u13 | qemu-system_1:2.8+dfsg-6+deb9u13_armel.deb |
Debian | 9 | i386 | qemu-block-extra | 1:2.8+dfsg-6+deb9u13 | qemu-block-extra_1:2.8+dfsg-6+deb9u13_i386.deb |
Debian | 9 | arm64 | qemu-system-ppc | 1:2.8+dfsg-6+deb9u13 | qemu-system-ppc_1:2.8+dfsg-6+deb9u13_arm64.deb |
Debian | 9 | amd64 | qemu | 1:2.8+dfsg-6+deb9u13 | qemu_1:2.8+dfsg-6+deb9u13_amd64.deb |
Debian | 10 | i386 | qemu-utils | 1:3.1+dfsg-8+deb10u9 | qemu-utils_1:3.1+dfsg-8+deb10u9_i386.deb |
Debian | 10 | amd64 | qemu-utils | 1:3.1+dfsg-8+deb10u9 | qemu-utils_1:3.1+dfsg-8+deb10u9_amd64.deb |
Debian | 10 | armhf | qemu-system-sparc | 1:3.1+dfsg-8+deb10u9 | qemu-system-sparc_1:3.1+dfsg-8+deb10u9_armhf.deb |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo