CVE-2023-0664
- EPSS 0.02%
- Veröffentlicht 29.03.2023 20:15:07
- Zuletzt bearbeitet 18.02.2025 20:15:16
A flaw was found in the QEMU Guest Agent service for Windows. A local unprivileged user may be able to manipulate the QEMU Guest Agent's Windows installer via repair custom actions to elevate their privileges on the system.
CVE-2023-1544
- EPSS 0.05%
- Veröffentlicht 23.03.2023 20:15:14
- Zuletzt bearbeitet 21.11.2024 07:39:24
A flaw was found in the QEMU implementation of VMWare's paravirtual RDMA device. This flaw allows a crafted guest driver to allocate and initialize a huge number of page tables to be used as a ring of descriptors for CQ and async events, potentially ...
- EPSS 0.02%
- Veröffentlicht 06.03.2023 23:15:11
- Zuletzt bearbeitet 21.11.2024 07:36:59
A vulnerability in the lsi53c895a device affects the latest version of qemu. A DMA-MMIO reentrancy problem may lead to memory corruption bugs like stack overflow or use-after-free.
CVE-2022-4144
- EPSS 0.01%
- Veröffentlicht 29.11.2022 18:15:10
- Zuletzt bearbeitet 14.04.2025 18:15:24
An out-of-bounds read flaw was found in the QXL display device emulation in QEMU. The qxl_phys2virt() function does not check the size of the structure pointed to by the guest physical address, potentially reading past the end of the bar space into a...
CVE-2022-4172
- EPSS 0.03%
- Veröffentlicht 29.11.2022 18:15:10
- Zuletzt bearbeitet 14.04.2025 18:15:25
An integer overflow and buffer overflow issues were found in the ACPI Error Record Serialization Table (ERST) device of QEMU in the read_erst_record() and write_erst_record() functions. Both issues may allow the guest to overrun the host buffer alloc...
CVE-2022-3872
- EPSS 0.04%
- Veröffentlicht 07.11.2022 21:15:09
- Zuletzt bearbeitet 05.05.2025 21:15:46
An off-by-one read/write issue was found in the SDHCI device of QEMU. It occurs when reading/writing the Buffer Data Port Register in sdhci_read_dataport and sdhci_write_dataport, respectively, if data_count == block_size. A malicious guest could use...
CVE-2022-3165
- EPSS 0.1%
- Veröffentlicht 17.10.2022 16:15:22
- Zuletzt bearbeitet 14.05.2025 21:15:52
An integer underflow issue was found in the QEMU VNC server while processing ClientCutText messages in the extended format. A malicious client could use this flaw to make QEMU unresponsive by sending a specially crafted payload message, resulting in ...
CVE-2014-0144
- EPSS 0.41%
- Veröffentlicht 29.09.2022 03:15:11
- Zuletzt bearbeitet 21.11.2024 02:01:28
QEMU before 2.0.0 block drivers for CLOOP, QCOW2 version 2 and various other image formats are vulnerable to potential memory corruptions, integer/buffer overflows or crash caused by missing input validations which could allow a remote user to execut...
CVE-2014-0147
- EPSS 0.08%
- Veröffentlicht 29.09.2022 03:15:11
- Zuletzt bearbeitet 21.11.2024 02:01:28
Qemu before 1.6.2 block diver for the various disk image formats used by Bochs and for the QCOW version 2 format, are vulnerable to a possible crash caused by signed data types or a logic error while creating QCOW2 snapshots, which leads to incorrect...
CVE-2014-0148
- EPSS 0.08%
- Veröffentlicht 29.09.2022 03:15:11
- Zuletzt bearbeitet 21.11.2024 02:01:28
Qemu before 2.0 block driver for Hyper-V VHDX Images is vulnerable to infinite loops and other potential issues when calculating BAT entries, due to missing bounds checks for block_size and logical_sector_size variables. These are used to derive othe...