Qemu

Qemu

422 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.13%
  • Published 13.09.2023 17:15:09
  • Last modified 21.11.2024 08:16:48

A flaw was found in the QEMU built-in VNC server while processing ClientCutText messages. A wrong exit condition may lead to an infinite loop when inflating an attacker controlled zlib buffer in the `inflate_buffer` function. This could allow a remot...

Exploit
  • EPSS 0.01%
  • Published 11.09.2023 04:15:10
  • Last modified 21.11.2024 08:22:36

QEMU through 8.0.0 could trigger a division by zero in scsi_disk_reset in hw/scsi/scsi-disk.c because scsi_disk_emulate_mode_select does not prevent s->qdev.blocksize from being 256. This stops QEMU and the guest immediately.

  • EPSS 0.45%
  • Published 28.08.2023 21:15:07
  • Last modified 21.11.2024 05:14:27

An issue was discovered in TCG Accelerator in QEMU 4.2.0, allows local attackers to execute arbitrary code, escalate privileges, and cause a denial of service (DoS). Note: This is disputed as a bug and not a valid security issue by multiple third par...

  • EPSS 0.99%
  • Published 22.08.2023 19:16:23
  • Last modified 21.11.2024 07:13:27

The hardware emulation in the of_dpa_cmd_add_l2_flood of rocker device model in QEMU, as used in 7.0.0 and earlier, allows remote attackers to crash the host qemu and potentially execute code on the host via execute a malformed program in the guest O...

Exploit
  • EPSS 0.03%
  • Published 14.08.2023 18:15:11
  • Last modified 21.11.2024 08:19:17

QEMU through 8.0.4 accesses a NULL pointer in nvme_directive_receive in hw/nvme/ctrl.c because there is no check for whether an endurance group is configured before checking whether Flexible Data Placement is enabled.

  • EPSS 0.01%
  • Published 04.08.2023 14:15:12
  • Last modified 21.11.2024 08:34:27

A heap out-of-bounds memory read flaw was found in the virtual nvme device in QEMU. The QEMU process does not validate an offset provided by the guest before computing a host heap pointer, which is used for copying data back to the guest. Arbitrary h...

  • EPSS 0.01%
  • Published 03.08.2023 15:15:29
  • Last modified 21.11.2024 08:16:38

A flaw was found in the QEMU virtual crypto device while handling data encryption/decryption requests in virtio_crypto_handle_sym_req. There is no check for the value of `src_len` and `dst_len` in virtio_crypto_sym_op_helper, potentially leading to a...

  • EPSS 0.01%
  • Published 24.07.2023 16:15:12
  • Last modified 21.11.2024 08:16:15

A DMA reentrancy issue leading to a use-after-free error was found in the e1000e NIC emulation code in QEMU. This issue could allow a privileged guest user to crash the QEMU process on the host, resulting in a denial of service.

  • EPSS 0.02%
  • Published 24.07.2023 16:15:11
  • Last modified 21.11.2024 07:39:05

A flaw was found in the 9p passthrough filesystem (9pfs) implementation in QEMU. When a local user in the guest writes an executable file with SUID or SGID, none of these privileged bits are correctly dropped. As a result, in rare circumstances, this...

  • EPSS 0.07%
  • Published 11.07.2023 17:15:13
  • Last modified 21.11.2024 08:17:05

A flaw was found in the QEMU built-in VNC server. When a client connects to the VNC server, QEMU checks whether the current number of connections crosses a certain threshold and if so, cleans up the previous connection. If the previous connection hap...