Qemu

Qemu

425 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 03.11.2023 14:15:08
  • Zuletzt bearbeitet 03.11.2025 20:16:06

A bug in QEMU could cause a guest I/O operation otherwise addressed to an arbitrary disk offset to be targeted to offset 0 instead (potentially overwriting the VM's boot code). This could be used, for example, by L2 guests with a virtual disk (vdiskL...

  • EPSS 0.01%
  • Veröffentlicht 13.09.2023 17:15:10
  • Zuletzt bearbeitet 21.11.2024 08:16:57

A flaw was found in QEMU. The async nature of hot-unplug enables a race scenario where the net device backend is cleared before the virtio-net pci frontend has been unplugged. A malicious guest could use this time window to trigger an assertion and c...

  • EPSS 0.03%
  • Veröffentlicht 13.09.2023 17:15:09
  • Zuletzt bearbeitet 21.11.2024 07:59:04

This CVE exists because of an incomplete fix for CVE-2021-3750. More specifically, the qemu-kvm package as released for Red Hat Enterprise Linux 9.1 via RHSA-2022:7967 included a version of qemu-kvm that was actually missing the fix for CVE-2021-3750...

  • EPSS 0.12%
  • Veröffentlicht 13.09.2023 17:15:09
  • Zuletzt bearbeitet 21.11.2024 08:16:48

A flaw was found in the QEMU built-in VNC server while processing ClientCutText messages. A wrong exit condition may lead to an infinite loop when inflating an attacker controlled zlib buffer in the `inflate_buffer` function. This could allow a remot...

Exploit
  • EPSS 0.01%
  • Veröffentlicht 11.09.2023 04:15:10
  • Zuletzt bearbeitet 21.11.2024 08:22:36

QEMU through 8.0.0 could trigger a division by zero in scsi_disk_reset in hw/scsi/scsi-disk.c because scsi_disk_emulate_mode_select does not prevent s->qdev.blocksize from being 256. This stops QEMU and the guest immediately.

  • EPSS 0.43%
  • Veröffentlicht 28.08.2023 21:15:07
  • Zuletzt bearbeitet 21.11.2024 05:14:27

An issue was discovered in TCG Accelerator in QEMU 4.2.0, allows local attackers to execute arbitrary code, escalate privileges, and cause a denial of service (DoS). Note: This is disputed as a bug and not a valid security issue by multiple third par...

  • EPSS 1.24%
  • Veröffentlicht 22.08.2023 19:16:23
  • Zuletzt bearbeitet 21.11.2024 07:13:27

The hardware emulation in the of_dpa_cmd_add_l2_flood of rocker device model in QEMU, as used in 7.0.0 and earlier, allows remote attackers to crash the host qemu and potentially execute code on the host via execute a malformed program in the guest O...

Exploit
  • EPSS 0.04%
  • Veröffentlicht 14.08.2023 18:15:11
  • Zuletzt bearbeitet 21.11.2024 08:19:17

QEMU through 8.0.4 accesses a NULL pointer in nvme_directive_receive in hw/nvme/ctrl.c because there is no check for whether an endurance group is configured before checking whether Flexible Data Placement is enabled.

  • EPSS 0.02%
  • Veröffentlicht 04.08.2023 14:15:12
  • Zuletzt bearbeitet 21.11.2024 08:34:27

A heap out-of-bounds memory read flaw was found in the virtual nvme device in QEMU. The QEMU process does not validate an offset provided by the guest before computing a host heap pointer, which is used for copying data back to the guest. Arbitrary h...

  • EPSS 0.01%
  • Veröffentlicht 03.08.2023 15:15:29
  • Zuletzt bearbeitet 21.11.2024 08:16:38

A flaw was found in the QEMU virtual crypto device while handling data encryption/decryption requests in virtio_crypto_handle_sym_req. There is no check for the value of `src_len` and `dst_len` in virtio_crypto_sym_op_helper, potentially leading to a...