Qemu

Qemu

422 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.31%
  • Published 06.09.2019 17:15:11
  • Last modified 21.11.2024 04:29:40

libslirp 4.0.0, as used in QEMU 4.1.0, has a use-after-free in ip_reass in ip_input.c.

  • EPSS 0.02%
  • Published 03.07.2019 14:15:10
  • Last modified 21.11.2024 04:24:20

qemu-bridge-helper.c in QEMU 3.1 and 4.0.0 does not ensure that a network interface name (obtained from bridge.conf or a --br=bridge option) is limited to the IFNAMSIZ size, which can lead to an ACL bypass.

Exploit
  • EPSS 4.84%
  • Published 24.06.2019 11:15:09
  • Last modified 21.11.2024 04:23:50

The QMP migrate command in QEMU version 4.0.0 and earlier is vulnerable to OS command injection, which allows the remote attacker to achieve code execution, denial of service, or information disclosure by sending a crafted QMP command to the listenin...

Exploit
  • EPSS 3.42%
  • Published 24.06.2019 11:15:09
  • Last modified 21.11.2024 04:23:50

The QMP guest_exec command in QEMU 4.0.0 and earlier is prone to OS command injection, which allows the attacker to achieve code execution, denial of service, or information disclosure by sending a crafted QMP command to the listening server. Note: T...

  • EPSS 0.11%
  • Published 03.06.2019 21:29:00
  • Last modified 21.11.2024 04:52:22

tcp_emu in slirp/tcp_subr.c (aka slirp/src/tcp_subr.c) in QEMU 3.0.0 uses uninitialized data in an snprintf call, leading to Information disclosure.

  • EPSS 1.6%
  • Published 31.05.2019 22:29:00
  • Last modified 21.11.2024 04:02:14

In QEMU 3.1.0, load_device_tree in device_tree.c calls the deprecated load_image function, which has a buffer overflow risk.

Exploit
  • EPSS 1.17%
  • Published 24.05.2019 16:29:00
  • Last modified 21.11.2024 04:22:19

interface_release_resource in hw/display/qxl.c in QEMU 3.1.x through 4.0.0 has a NULL pointer dereference.

  • EPSS 0.53%
  • Published 22.05.2019 15:29:03
  • Last modified 21.11.2024 04:22:28

QEMU 3.0.0 has an Integer Overflow because the qga/commands*.c files do not check the length of the argument list or the number of environment variables. NOTE: This has been disputed as not exploitable

  • EPSS 1.23%
  • Published 19.04.2019 19:29:00
  • Last modified 21.11.2024 04:44:10

hw/sparc64/sun4u.c in QEMU 3.1.50 is vulnerable to a NULL pointer dereference, which allows the attacker to cause a denial of service via a device driver.

Exploit
  • EPSS 0.11%
  • Published 21.03.2019 16:01:14
  • Last modified 21.11.2024 04:50:41

hw/ppc/spapr.c in QEMU through 3.1.0 allows Information Exposure because the hypervisor shares the /proc/device-tree/system-id and /proc/device-tree/model system attributes with a guest.