Qemu

Qemu

422 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.03%
  • Veröffentlicht 13.09.2022 20:15:09
  • Zuletzt bearbeitet 23.04.2025 18:15:48

A DMA reentrancy issue was found in the Tulip device emulation in QEMU. When Tulip reads or writes to the rx/tx descriptor or copies the rx/tx frame, it doesn't check whether the destination address is its own MMIO address. This can cause the device ...

  • EPSS 0.02%
  • Veröffentlicht 29.08.2022 15:15:09
  • Zuletzt bearbeitet 21.11.2024 06:38:27

A flaw was found in the QEMU virtio-fs shared file system daemon (virtiofsd) implementation. This flaw is strictly related to CVE-2018-13405. A local guest user can create files in the directories shared by virtio-fs with unintended group ownership i...

Exploit
  • EPSS 0.01%
  • Veröffentlicht 26.08.2022 18:15:08
  • Zuletzt bearbeitet 21.11.2024 06:38:09

A use-after-free vulnerability was found in the LSI53C895A SCSI Host Bus Adapter emulation of QEMU. The flaw occurs while processing repeated messages to cancel the current SCSI request via the lsi_do_msgout function. This flaw allows a malicious pri...

  • EPSS 0.12%
  • Veröffentlicht 26.08.2022 16:15:09
  • Zuletzt bearbeitet 28.02.2025 13:15:25

A deadlock issue was found in the AHCI controller device of QEMU. It occurs on a software reset (ahci_reset_port) while handling a host-to-device Register FIS (Frame Information Structure) packet from the guest. A privileged user inside the guest cou...

Exploit
  • EPSS 4.89%
  • Veröffentlicht 25.08.2022 20:15:09
  • Zuletzt bearbeitet 28.02.2025 13:15:25

A DMA reentrancy issue was found in the NVM Express Controller (NVME) emulation in QEMU. This CVE is similar to CVE-2021-3750 and, just like it, when the reentrancy write triggers the reset function nvme_ctrl_reset(), data structs will be freed leadi...

Exploit
  • EPSS 0.01%
  • Veröffentlicht 24.08.2022 16:15:09
  • Zuletzt bearbeitet 21.11.2024 06:37:01

A NULL pointer dereference issue was found in the ACPI code of QEMU. A malicious, privileged user within the guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition.

Exploit
  • EPSS 0.02%
  • Veröffentlicht 17.08.2022 21:15:07
  • Zuletzt bearbeitet 21.11.2024 05:03:10

An infinite loop flaw was found in the USB xHCI controller emulation of QEMU while computing the length of the Transfer Request Block (TRB) Ring. This flaw allows a privileged guest user to hang the QEMU process on the host, resulting in a denial of ...

Exploit
  • EPSS 0.31%
  • Veröffentlicht 11.07.2022 02:15:07
  • Zuletzt bearbeitet 21.11.2024 07:11:07

softmmu/physmem.c in QEMU through 7.0.0 can perform an uninitialized read on the translate_fail path, leading to an io_readx or io_writex crash. NOTE: a third party states that the Non-virtualization Use Case in the qemu.org reference applies here, i...

Exploit
  • EPSS 0.02%
  • Veröffentlicht 11.05.2022 16:15:08
  • Zuletzt bearbeitet 21.11.2024 06:21:58

A stack overflow vulnerability was found in the Intel HD Audio device (intel-hda) of QEMU. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition. The highest threat from this vulnerabi...

Exploit
  • EPSS 0.02%
  • Veröffentlicht 02.05.2022 19:15:08
  • Zuletzt bearbeitet 21.11.2024 06:22:20

A DMA reentrancy issue was found in the USB EHCI controller emulation of QEMU. EHCI does not verify if the Buffer Pointer overlaps with its MMIO region when it transfers the USB packets. Crafted content may be written to the controller's registers an...