- EPSS 0.01%
- Veröffentlicht 03.11.2023 14:15:08
- Zuletzt bearbeitet 03.11.2025 20:16:06
A bug in QEMU could cause a guest I/O operation otherwise addressed to an arbitrary disk offset to be targeted to offset 0 instead (potentially overwriting the VM's boot code). This could be used, for example, by L2 guests with a virtual disk (vdiskL...
CVE-2023-3301
- EPSS 0.01%
- Veröffentlicht 13.09.2023 17:15:10
- Zuletzt bearbeitet 21.11.2024 08:16:57
A flaw was found in QEMU. The async nature of hot-unplug enables a race scenario where the net device backend is cleared before the virtio-net pci frontend has been unplugged. A malicious guest could use this time window to trigger an assertion and c...
CVE-2023-2680
- EPSS 0.03%
- Veröffentlicht 13.09.2023 17:15:09
- Zuletzt bearbeitet 21.11.2024 07:59:04
This CVE exists because of an incomplete fix for CVE-2021-3750. More specifically, the qemu-kvm package as released for Red Hat Enterprise Linux 9.1 via RHSA-2022:7967 included a version of qemu-kvm that was actually missing the fix for CVE-2021-3750...
CVE-2023-3255
- EPSS 0.12%
- Veröffentlicht 13.09.2023 17:15:09
- Zuletzt bearbeitet 21.11.2024 08:16:48
A flaw was found in the QEMU built-in VNC server while processing ClientCutText messages. A wrong exit condition may lead to an infinite loop when inflating an attacker controlled zlib buffer in the `inflate_buffer` function. This could allow a remot...
CVE-2023-42467
- EPSS 0.01%
- Veröffentlicht 11.09.2023 04:15:10
- Zuletzt bearbeitet 21.11.2024 08:22:36
QEMU through 8.0.0 could trigger a division by zero in scsi_disk_reset in hw/scsi/scsi-disk.c because scsi_disk_emulate_mode_select does not prevent s->qdev.blocksize from being 256. This stops QEMU and the guest immediately.
CVE-2020-24165
- EPSS 0.43%
- Veröffentlicht 28.08.2023 21:15:07
- Zuletzt bearbeitet 21.11.2024 05:14:27
An issue was discovered in TCG Accelerator in QEMU 4.2.0, allows local attackers to execute arbitrary code, escalate privileges, and cause a denial of service (DoS). Note: This is disputed as a bug and not a valid security issue by multiple third par...
- EPSS 1.24%
- Veröffentlicht 22.08.2023 19:16:23
- Zuletzt bearbeitet 21.11.2024 07:13:27
The hardware emulation in the of_dpa_cmd_add_l2_flood of rocker device model in QEMU, as used in 7.0.0 and earlier, allows remote attackers to crash the host qemu and potentially execute code on the host via execute a malformed program in the guest O...
CVE-2023-40360
- EPSS 0.04%
- Veröffentlicht 14.08.2023 18:15:11
- Zuletzt bearbeitet 21.11.2024 08:19:17
QEMU through 8.0.4 accesses a NULL pointer in nvme_directive_receive in hw/nvme/ctrl.c because there is no check for whether an endurance group is configured before checking whether Flexible Data Placement is enabled.
CVE-2023-4135
- EPSS 0.02%
- Veröffentlicht 04.08.2023 14:15:12
- Zuletzt bearbeitet 21.11.2024 08:34:27
A heap out-of-bounds memory read flaw was found in the virtual nvme device in QEMU. The QEMU process does not validate an offset provided by the guest before computing a host heap pointer, which is used for copying data back to the guest. Arbitrary h...
CVE-2023-3180
- EPSS 0.01%
- Veröffentlicht 03.08.2023 15:15:29
- Zuletzt bearbeitet 21.11.2024 08:16:38
A flaw was found in the QEMU virtual crypto device while handling data encryption/decryption requests in virtio_crypto_handle_sym_req. There is no check for the value of `src_len` and `dst_len` in virtio_crypto_sym_op_helper, potentially leading to a...