Qemu

Qemu

425 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.03%
  • Veröffentlicht 25.02.2021 20:15:11
  • Zuletzt bearbeitet 21.11.2024 05:46:07

An integer overflow issue was found in the vmxnet3 NIC emulator of the QEMU for versions up to v5.2.0. It may occur if a guest was to supply invalid values for rx/tx queue size or other NIC parameters. A privileged guest user may use this flaw to cra...

  • EPSS 0.27%
  • Veröffentlicht 30.01.2021 06:15:12
  • Zuletzt bearbeitet 21.11.2024 05:07:58

A heap-based buffer overflow was found in QEMU through 5.0.0 in the SDHCI device emulation support. It could occur while doing a multi block SDMA transfer via the sdhci_sdma_transfer_multi_blocks() routine in hw/sd/sdhci.c. A guest user or process co...

Exploit
  • EPSS 0.08%
  • Veröffentlicht 28.01.2021 20:15:12
  • Zuletzt bearbeitet 21.11.2024 05:27:28

A flaw was found in qemu. A host privilege escalation issue was found in the virtio-fs shared file system daemon where a privileged guest user is able to create a device special file in the shared directory and use it to r/w access host devices.

  • EPSS 0.08%
  • Veröffentlicht 26.01.2021 18:15:51
  • Zuletzt bearbeitet 21.11.2024 05:24:00

ide_atapi_cmd_reply_end in hw/ide/atapi.c in QEMU 5.1.0 allows out-of-bounds read access because a buffer index is not validated.

  • EPSS 0.12%
  • Veröffentlicht 31.12.2020 01:15:12
  • Zuletzt bearbeitet 21.11.2024 04:39:24

In QEMU 4.1.0, an out-of-bounds read flaw was found in the ATI VGA implementation. It occurs in the ati_cursor_define() routine while handling MMIO write operations through the ati_mm_write() callback. A malicious guest could abuse this flaw to crash...

  • EPSS 0.05%
  • Veröffentlicht 31.12.2020 01:15:12
  • Zuletzt bearbeitet 21.11.2024 04:58:57

iscsi_aio_ioctl_cb in block/iscsi.c in QEMU 4.1.0 has a heap-based buffer over-read that may disclose unrelated information from process memory to an attacker.

  • EPSS 0.04%
  • Veröffentlicht 08.12.2020 22:15:18
  • Zuletzt bearbeitet 21.11.2024 05:21:52

A flaw was found in the memory management API of QEMU during the initialization of a memory region cache. This issue could lead to an out-of-bounds write access to the MSI-X table while performing MMIO operations. A guest user may abuse this flaw to ...

Exploit
  • EPSS 0.05%
  • Veröffentlicht 04.12.2020 07:15:10
  • Zuletzt bearbeitet 21.11.2024 05:23:17

hw/net/e1000e_core.c in QEMU 5.0.0 has an infinite loop via an RX descriptor with a NULL buffer address.

  • EPSS 0.04%
  • Veröffentlicht 02.12.2020 01:15:12
  • Zuletzt bearbeitet 21.11.2024 05:18:34

A reachable assertion issue was found in the USB EHCI emulation code of QEMU. It could occur while processing USB requests due to missing handling of DMA memory map failure. A malicious privileged user within the guest may abuse this flaw to send bog...

Exploit
  • EPSS 0.03%
  • Veröffentlicht 30.11.2020 07:15:11
  • Zuletzt bearbeitet 21.11.2024 05:18:16

hw/usb/hcd-ohci.c in QEMU 5.0.0 has a stack-based buffer over-read via values obtained from the host controller driver.