Qemu

Qemu

422 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Published 29.03.2023 20:15:07
  • Last modified 18.02.2025 20:15:16

A flaw was found in the QEMU Guest Agent service for Windows. A local unprivileged user may be able to manipulate the QEMU Guest Agent's Windows installer via repair custom actions to elevate their privileges on the system.

  • EPSS 0.05%
  • Published 23.03.2023 20:15:14
  • Last modified 21.11.2024 07:39:24

A flaw was found in the QEMU implementation of VMWare's paravirtual RDMA device. This flaw allows a crafted guest driver to allocate and initialize a huge number of page tables to be used as a ring of descriptors for CQ and async events, potentially ...

  • EPSS 0.02%
  • Published 06.03.2023 23:15:11
  • Last modified 21.11.2024 07:36:59

A vulnerability in the lsi53c895a device affects the latest version of qemu. A DMA-MMIO reentrancy problem may lead to memory corruption bugs like stack overflow or use-after-free.

  • EPSS 0.01%
  • Published 29.11.2022 18:15:10
  • Last modified 14.04.2025 18:15:24

An out-of-bounds read flaw was found in the QXL display device emulation in QEMU. The qxl_phys2virt() function does not check the size of the structure pointed to by the guest physical address, potentially reading past the end of the bar space into a...

Exploit
  • EPSS 0.03%
  • Published 29.11.2022 18:15:10
  • Last modified 14.04.2025 18:15:25

An integer overflow and buffer overflow issues were found in the ACPI Error Record Serialization Table (ERST) device of QEMU in the read_erst_record() and write_erst_record() functions. Both issues may allow the guest to overrun the host buffer alloc...

  • EPSS 0.04%
  • Published 07.11.2022 21:15:09
  • Last modified 05.05.2025 21:15:46

An off-by-one read/write issue was found in the SDHCI device of QEMU. It occurs when reading/writing the Buffer Data Port Register in sdhci_read_dataport and sdhci_write_dataport, respectively, if data_count == block_size. A malicious guest could use...

  • EPSS 0.1%
  • Published 17.10.2022 16:15:22
  • Last modified 14.05.2025 21:15:52

An integer underflow issue was found in the QEMU VNC server while processing ClientCutText messages in the extended format. A malicious client could use this flaw to make QEMU unresponsive by sending a specially crafted payload message, resulting in ...

  • EPSS 0.41%
  • Published 29.09.2022 03:15:11
  • Last modified 21.11.2024 02:01:28

QEMU before 2.0.0 block drivers for CLOOP, QCOW2 version 2 and various other image formats are vulnerable to potential memory corruptions, integer/buffer overflows or crash caused by missing input validations which could allow a remote user to execut...

  • EPSS 0.08%
  • Published 29.09.2022 03:15:11
  • Last modified 21.11.2024 02:01:28

Qemu before 1.6.2 block diver for the various disk image formats used by Bochs and for the QCOW version 2 format, are vulnerable to a possible crash caused by signed data types or a logic error while creating QCOW2 snapshots, which leads to incorrect...

  • EPSS 0.08%
  • Published 29.09.2022 03:15:11
  • Last modified 21.11.2024 02:01:28

Qemu before 2.0 block driver for Hyper-V VHDX Images is vulnerable to infinite loops and other potential issues when calculating BAT entries, due to missing bounds checks for block_size and logical_sector_size variables. These are used to derive othe...