Updated qemu packages fix multiple security vulnerabilities including out-of-bounds read-write, null-pointer dereference, and denial of service flaws
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
OpenVAS | Mageia: Security Advisory (MGASA-2016-0176) | 28 Jan 202200:00 | – | openvas |
OpenVAS | Ubuntu: Security Advisory (USN-2974-1) | 17 May 201600:00 | – | openvas |
OpenVAS | Fedora Update for qemu FEDORA-2016-f2b1f07256 | 8 Jun 201600:00 | – | openvas |
OpenVAS | Fedora Update for qemu FEDORA-2016-a3298e39f7 | 8 Jun 201600:00 | – | openvas |
OpenVAS | Fedora Update for xen FEDORA-2016-38 | 20 Mar 201600:00 | – | openvas |
OpenVAS | Fedora Update for qemu FEDORA-2016-1 | 11 Apr 201600:00 | – | openvas |
OpenVAS | Fedora Update for qemu FEDORA-2016-372 | 24 Mar 201600:00 | – | openvas |
OpenVAS | Gentoo Security Advisory GLSA 201604-01 | 6 Apr 201600:00 | – | openvas |
OpenVAS | SUSE: Security Advisory (SUSE-SU-2016:1703-1) | 19 Apr 202100:00 | – | openvas |
OpenVAS | openSUSE: Security Advisory for qemu (openSUSE-SU-2016:1750-1) | 7 Jul 201600:00 | – | openvas |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
Mageia | 5 | noarch | qemu | 2.4.1-5 | qemu-2.4.1-5.mga5 |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo