Qemu

Qemu

425 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.3%
  • Veröffentlicht 11.07.2022 02:15:07
  • Zuletzt bearbeitet 21.11.2024 07:11:07

softmmu/physmem.c in QEMU through 7.0.0 can perform an uninitialized read on the translate_fail path, leading to an io_readx or io_writex crash. NOTE: a third party states that the Non-virtualization Use Case in the qemu.org reference applies here, i...

Exploit
  • EPSS 0.03%
  • Veröffentlicht 11.05.2022 16:15:08
  • Zuletzt bearbeitet 21.11.2024 06:21:58

A stack overflow vulnerability was found in the Intel HD Audio device (intel-hda) of QEMU. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition. The highest threat from this vulnerabi...

Exploit
  • EPSS 0.03%
  • Veröffentlicht 02.05.2022 19:15:08
  • Zuletzt bearbeitet 21.11.2024 06:22:20

A DMA reentrancy issue was found in the USB EHCI controller emulation of QEMU. EHCI does not verify if the Buffer Pointer overlaps with its MMIO region when it transfers the USB packets. Crafted content may be written to the controller's registers an...

Exploit
  • EPSS 0.16%
  • Veröffentlicht 29.04.2022 17:15:20
  • Zuletzt bearbeitet 21.03.2025 18:15:27

A flaw was found in the QXL display device emulation in QEMU. An integer overflow in the cursor_alloc() function can lead to the allocation of a small cursor object followed by a subsequent heap-based buffer overflow. This flaw allows a malicious pri...

Exploit
  • EPSS 0.05%
  • Veröffentlicht 29.04.2022 17:15:20
  • Zuletzt bearbeitet 21.03.2025 18:15:28

A flaw was found in the QXL display device emulation in QEMU. A double fetch of guest controlled values `cursor->header.width` and `cursor->header.height` can lead to the allocation of a small cursor object followed by a subsequent heap-based buffer ...

  • EPSS 0.15%
  • Veröffentlicht 01.04.2022 23:15:08
  • Zuletzt bearbeitet 21.11.2024 05:46:18

It was discovered that the update for the virt:rhel module in the RHSA-2020:4676 (https://access.redhat.com/errata/RHSA-2020:4676) erratum released as part of Red Hat Enterprise Linux 8.3 failed to include the fix for the qemu-kvm component issue CVE...

  • EPSS 0.03%
  • Veröffentlicht 29.03.2022 17:15:15
  • Zuletzt bearbeitet 21.11.2024 06:39:56

A flaw was found in the QEMU implementation of VMWare's paravirtual RDMA device. This flaw allows a crafted guest driver to execute HW commands when shared buffers are not yet allocated, potentially leading to a use-after-free condition.

Exploit
  • EPSS 0.16%
  • Veröffentlicht 25.03.2022 19:15:09
  • Zuletzt bearbeitet 21.11.2024 06:21:54

A flaw was found in the QEMU implementation of VMWare's paravirtual RDMA device. The issue occurs while handling a "PVRDMA_CMD_CREATE_MR" command due to improper memory remapping (mremap). This flaw allows a malicious guest to crash the QEMU process ...

  • EPSS 0.04%
  • Veröffentlicht 23.03.2022 20:15:09
  • Zuletzt bearbeitet 21.11.2024 06:22:19

A use-after-free vulnerability was found in the virtio-net device of QEMU. It could occur when the descriptor's address belongs to the non direct access region, due to num_buffers being set after the virtqueue elem has been unmapped. A malicious gues...

  • EPSS 0.24%
  • Veröffentlicht 16.03.2022 15:15:16
  • Zuletzt bearbeitet 21.11.2024 06:53:48

A flaw was found in the virtio-net device of QEMU. This flaw was inadvertently introduced with the fix for CVE-2021-3748, which forgot to unmap the cached virtqueue elements on error, leading to memory leakage and other unexpected results. Affected Q...