CVE-2019-20175
- EPSS 0.54%
- Veröffentlicht 31.12.2019 04:15:10
- Zuletzt bearbeitet 21.11.2024 04:38:09
An issue was discovered in ide_dma_cb() in hw/ide/core.c in QEMU 2.4.0 through 4.2.0. The guest system can crash the QEMU process in the host system via a special SCSI_IOCTL_SEND_COMMAND. It hits an assertion that implies that the size of successful ...
CVE-2013-2016
- EPSS 0.07%
- Veröffentlicht 30.12.2019 22:15:11
- Zuletzt bearbeitet 21.11.2024 01:50:52
A flaw was found in the way qemu v1.3.0 and later (virtio-rng) validates addresses when guest accesses the config space of a virtio device. If the virtio device has zero/small sized config space, such as virtio-rng, a privileged guest user could use ...
CVE-2019-12068
- EPSS 0.09%
- Veröffentlicht 24.09.2019 20:15:11
- Zuletzt bearbeitet 21.11.2024 04:22:10
In QEMU 1:4.1-1, 1:2.1+dfsg-12+deb8u6, 1:2.8+dfsg-6+deb9u8, 1:3.1+dfsg-8~deb10u1, 1:3.1+dfsg-8+deb10u2, and 1:2.1+dfsg-12+deb8u12 (fixed), when executing script in lsi_execute_script(), the LSI scsi adapter emulator advances 's->dsp' index to read ne...
CVE-2019-15890
- EPSS 0.59%
- Veröffentlicht 06.09.2019 17:15:11
- Zuletzt bearbeitet 21.11.2024 04:29:40
libslirp 4.0.0, as used in QEMU 4.1.0, has a use-after-free in ip_reass in ip_input.c.
CVE-2019-13164
- EPSS 0.02%
- Veröffentlicht 03.07.2019 14:15:10
- Zuletzt bearbeitet 21.11.2024 04:24:20
qemu-bridge-helper.c in QEMU 3.1 and 4.0.0 does not ensure that a network interface name (obtained from bridge.conf or a --br=bridge option) is limited to the IFNAMSIZ size, which can lead to an ACL bypass.
- EPSS 54.09%
- Veröffentlicht 24.06.2019 11:15:09
- Zuletzt bearbeitet 21.11.2024 04:23:50
The QMP migrate command in QEMU version 4.0.0 and earlier is vulnerable to OS command injection, which allows the remote attacker to achieve code execution, denial of service, or information disclosure by sending a crafted QMP command to the listenin...
- EPSS 3.42%
- Veröffentlicht 24.06.2019 11:15:09
- Zuletzt bearbeitet 21.11.2024 04:23:50
The QMP guest_exec command in QEMU 4.0.0 and earlier is prone to OS command injection, which allows the attacker to achieve code execution, denial of service, or information disclosure by sending a crafted QMP command to the listening server. Note: T...
CVE-2019-9824
- EPSS 0.1%
- Veröffentlicht 03.06.2019 21:29:00
- Zuletzt bearbeitet 21.11.2024 04:52:22
tcp_emu in slirp/tcp_subr.c (aka slirp/src/tcp_subr.c) in QEMU 3.0.0 uses uninitialized data in an snprintf call, leading to Information disclosure.
CVE-2018-20815
- EPSS 3.86%
- Veröffentlicht 31.05.2019 22:29:00
- Zuletzt bearbeitet 21.11.2024 04:02:14
In QEMU 3.1.0, load_device_tree in device_tree.c calls the deprecated load_image function, which has a buffer overflow risk.
CVE-2019-12155
- EPSS 1.15%
- Veröffentlicht 24.05.2019 16:29:00
- Zuletzt bearbeitet 21.11.2024 04:22:19
interface_release_resource in hw/display/qxl.c in QEMU 3.1.x through 4.0.0 has a NULL pointer dereference.