Qemu

Qemu

422 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.11%
  • Veröffentlicht 26.01.2021 18:15:51
  • Zuletzt bearbeitet 21.11.2024 05:24:00

ide_atapi_cmd_reply_end in hw/ide/atapi.c in QEMU 5.1.0 allows out-of-bounds read access because a buffer index is not validated.

  • EPSS 0.04%
  • Veröffentlicht 31.12.2020 01:15:12
  • Zuletzt bearbeitet 21.11.2024 04:39:24

In QEMU 4.1.0, an out-of-bounds read flaw was found in the ATI VGA implementation. It occurs in the ati_cursor_define() routine while handling MMIO write operations through the ati_mm_write() callback. A malicious guest could abuse this flaw to crash...

  • EPSS 0.11%
  • Veröffentlicht 31.12.2020 01:15:12
  • Zuletzt bearbeitet 21.11.2024 04:58:57

iscsi_aio_ioctl_cb in block/iscsi.c in QEMU 4.1.0 has a heap-based buffer over-read that may disclose unrelated information from process memory to an attacker.

  • EPSS 0.08%
  • Veröffentlicht 08.12.2020 22:15:18
  • Zuletzt bearbeitet 21.11.2024 05:21:52

A flaw was found in the memory management API of QEMU during the initialization of a memory region cache. This issue could lead to an out-of-bounds write access to the MSI-X table while performing MMIO operations. A guest user may abuse this flaw to ...

Exploit
  • EPSS 0.07%
  • Veröffentlicht 04.12.2020 07:15:10
  • Zuletzt bearbeitet 21.11.2024 05:23:17

hw/net/e1000e_core.c in QEMU 5.0.0 has an infinite loop via an RX descriptor with a NULL buffer address.

  • EPSS 0.06%
  • Veröffentlicht 02.12.2020 01:15:12
  • Zuletzt bearbeitet 21.11.2024 05:18:34

A reachable assertion issue was found in the USB EHCI emulation code of QEMU. It could occur while processing USB requests due to missing handling of DMA memory map failure. A malicious privileged user within the guest may abuse this flaw to send bog...

Exploit
  • EPSS 0.03%
  • Veröffentlicht 30.11.2020 07:15:11
  • Zuletzt bearbeitet 21.11.2024 05:18:16

hw/usb/hcd-ohci.c in QEMU 5.0.0 has a stack-based buffer over-read via values obtained from the host controller driver.

  • EPSS 0.35%
  • Veröffentlicht 06.11.2020 08:15:13
  • Zuletzt bearbeitet 21.11.2024 05:21:28

ati_2d_blt in hw/display/ati_2d.c in QEMU 4.2.1 can encounter an outside-limits situation in a calculation. A guest can crash the QEMU process.

  • EPSS 0.14%
  • Veröffentlicht 06.11.2020 08:15:13
  • Zuletzt bearbeitet 21.11.2024 05:21:29

eth_get_gso_type in net/eth.c in QEMU 4.2.1 allows guest OS users to trigger an assertion failure. A guest can crash the QEMU process via packet data that lacks a valid Layer 3 protocol.

  • EPSS 0.14%
  • Veröffentlicht 16.10.2020 06:15:12
  • Zuletzt bearbeitet 21.11.2024 05:14:38

An issue was discovered in QEMU through 5.1.0. An out-of-bounds memory access was found in the ATI VGA device implementation. This flaw occurs in the ati_2d_blt() routine in hw/display/ati_2d.c while handling MMIO write operations through the ati_mm_...