CVE-2020-12829
- EPSS 0.12%
- Veröffentlicht 31.08.2020 15:15:10
- Zuletzt bearbeitet 21.11.2024 05:00:21
In QEMU through 5.0.0, an integer overflow was found in the SM501 display driver implementation. This flaw occurs in the COPY_AREA macro while handling MMIO write operations through the sm501_2d_engine_write() callback. A local attacker could abuse t...
CVE-2020-14415
- EPSS 0.05%
- Veröffentlicht 27.08.2020 16:15:10
- Zuletzt bearbeitet 21.11.2024 05:03:13
oss_write in audio/ossaudio.c in QEMU before 5.0.0 mishandles a buffer position.
CVE-2020-16092
- EPSS 0.04%
- Veröffentlicht 11.08.2020 16:15:12
- Zuletzt bearbeitet 21.11.2024 05:06:45
In QEMU through 5.0.0, an assertion failure can occur in the network packet processing. This issue affects the e1000e and vmxnet3 network devices. A malicious guest user/process could use this flaw to abort the QEMU process on the host, resulting in ...
CVE-2020-15863
- EPSS 0.05%
- Veröffentlicht 28.07.2020 16:15:12
- Zuletzt bearbeitet 21.11.2024 05:06:20
hw/net/xgmac.c in the XGMAC Ethernet controller in QEMU before 07-20-2020 has a buffer overflow. This occurs during packet transmission and affects the highbank and midway emulated machines. A guest user or process could use this flaw to crash the QE...
CVE-2020-15859
- EPSS 0.03%
- Veröffentlicht 21.07.2020 16:15:11
- Zuletzt bearbeitet 21.11.2024 05:06:19
QEMU 4.2.0 has a use-after-free in hw/net/e1000e_core.c because a guest OS user can trigger an e1000e packet with the data's address set to the e1000e's MMIO address.
CVE-2020-15469
- EPSS 0.04%
- Veröffentlicht 02.07.2020 20:15:11
- Zuletzt bearbeitet 21.11.2024 05:05:34
In QEMU 4.2.0, a MemoryRegionOps object may lack read/write callback methods, leading to a NULL pointer dereference.
- EPSS 0.84%
- Veröffentlicht 09.06.2020 13:15:10
- Zuletzt bearbeitet 21.11.2024 04:56:01
An assertion failure issue was found in the Network Block Device(NBD) Server in all QEMU versions before QEMU 5.0.1. This flaw occurs when an nbd-client sends a spec-compliant request that is near the boundary of maximum permitted request length. A r...
CVE-2020-10702
- EPSS 0.04%
- Veröffentlicht 04.06.2020 18:15:14
- Zuletzt bearbeitet 21.11.2024 04:55:53
A flaw was found in QEMU in the implementation of the Pointer Authentication (PAuth) support for ARM introduced in version 4.0 and fixed in version 5.0.0. A general failure of the signature generation process caused every PAuth-enforced pointer to be...
CVE-2020-13765
- EPSS 0.37%
- Veröffentlicht 04.06.2020 16:15:12
- Zuletzt bearbeitet 21.11.2024 05:01:48
rom_copy() in hw/core/loader.c in QEMU 4.0 and 4.1.0 does not validate the relationship between two addresses, which allows attackers to trigger an invalid memory copy operation.
CVE-2020-13791
- EPSS 0.17%
- Veröffentlicht 04.06.2020 16:15:12
- Zuletzt bearbeitet 21.11.2024 05:01:51
hw/pci/pci.c in QEMU 4.2.0 allows guest OS users to trigger an out-of-bounds access by providing an address near the end of the PCI configuration space.