Qemu

Qemu

422 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.1%
  • Veröffentlicht 28.07.2020 16:15:12
  • Zuletzt bearbeitet 21.11.2024 05:06:20

hw/net/xgmac.c in the XGMAC Ethernet controller in QEMU before 07-20-2020 has a buffer overflow. This occurs during packet transmission and affects the highbank and midway emulated machines. A guest user or process could use this flaw to crash the QE...

Exploit
  • EPSS 0.03%
  • Veröffentlicht 21.07.2020 16:15:11
  • Zuletzt bearbeitet 21.11.2024 05:06:19

QEMU 4.2.0 has a use-after-free in hw/net/e1000e_core.c because a guest OS user can trigger an e1000e packet with the data's address set to the e1000e's MMIO address.

  • EPSS 0.03%
  • Veröffentlicht 02.07.2020 20:15:11
  • Zuletzt bearbeitet 21.11.2024 05:05:34

In QEMU 4.2.0, a MemoryRegionOps object may lack read/write callback methods, leading to a NULL pointer dereference.

  • EPSS 0.87%
  • Veröffentlicht 09.06.2020 13:15:10
  • Zuletzt bearbeitet 21.11.2024 04:56:01

An assertion failure issue was found in the Network Block Device(NBD) Server in all QEMU versions before QEMU 5.0.1. This flaw occurs when an nbd-client sends a spec-compliant request that is near the boundary of maximum permitted request length. A r...

  • EPSS 0.04%
  • Veröffentlicht 04.06.2020 18:15:14
  • Zuletzt bearbeitet 21.11.2024 04:55:53

A flaw was found in QEMU in the implementation of the Pointer Authentication (PAuth) support for ARM introduced in version 4.0 and fixed in version 5.0.0. A general failure of the signature generation process caused every PAuth-enforced pointer to be...

  • EPSS 0.81%
  • Veröffentlicht 04.06.2020 16:15:12
  • Zuletzt bearbeitet 21.11.2024 05:01:48

rom_copy() in hw/core/loader.c in QEMU 4.0 and 4.1.0 does not validate the relationship between two addresses, which allows attackers to trigger an invalid memory copy operation.

  • EPSS 0.17%
  • Veröffentlicht 04.06.2020 16:15:12
  • Zuletzt bearbeitet 21.11.2024 05:01:51

hw/pci/pci.c in QEMU 4.2.0 allows guest OS users to trigger an out-of-bounds access by providing an address near the end of the PCI configuration space.

  • EPSS 0.1%
  • Veröffentlicht 04.06.2020 16:15:12
  • Zuletzt bearbeitet 21.11.2024 05:01:53

ati-vga in hw/display/ati.c in QEMU 4.2.0 allows guest OS users to trigger infinite recursion via a crafted mm_index value during an ati_mm_read or ati_mm_write call.

  • EPSS 0.03%
  • Veröffentlicht 02.06.2020 14:15:10
  • Zuletzt bearbeitet 21.11.2024 05:01:47

hw/pci/msix.c in QEMU 4.2.0 allows guest OS users to trigger an out-of-bounds access via a crafted address in an msi-x mmio operation.

  • EPSS 0.03%
  • Veröffentlicht 02.06.2020 13:15:11
  • Zuletzt bearbeitet 21.11.2024 05:01:42

address_space_map in exec.c in QEMU 4.2.0 can trigger a NULL pointer dereference related to BounceBuffer.