Qemu

Qemu

422 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.09%
  • Published 24.02.2022 19:15:09
  • Last modified 21.11.2024 06:21:57

An integer overflow was found in the QEMU implementation of VMWare's paravirtual RDMA device in versions prior to 6.1.0. The issue occurs while handling a "PVRDMA_REG_DSRHIGH" write from the guest due to improper input validation. This flaw allows a ...

  • EPSS 0.08%
  • Published 24.02.2022 19:15:09
  • Last modified 21.11.2024 06:21:58

A flaw was found in the QEMU implementation of VMWare's paravirtual RDMA device in versions prior to 6.1.0. The issue occurs while handling a "PVRDMA_REG_DSRHIGH" write from the guest and may result in a crash of QEMU or cause undefined behavior due ...

  • EPSS 0.04%
  • Published 18.02.2022 18:15:09
  • Last modified 21.11.2024 06:22:47

An off-by-one error was found in the SCSI device emulation in QEMU. It could occur while processing MODE SELECT commands in mode_sense_page() if the 'page' argument was set to MODE_PAGE_ALLS (0x3f). A malicious guest could use this flaw to potentiall...

  • EPSS 0.04%
  • Published 18.02.2022 18:15:09
  • Last modified 21.11.2024 06:23:13

A stack-buffer-overflow was found in QEMU in the NVME component. The flaw lies in nvme_changed_nslist() where a malicious guest controlling certain input can read out of bounds memory. A malicious user could use this flaw leading to disclosure of sen...

  • EPSS 0.13%
  • Published 25.01.2022 20:15:08
  • Last modified 21.11.2024 06:36:59

A NULL pointer dereference issue was found in the block mirror layer of QEMU in versions prior to 6.2.0. The `self` pointer is dereferenced in mirror_wait_on_conflicts() without ensuring that it's not NULL. A malicious unprivileged user within the gu...

  • EPSS 0.03%
  • Published 25.08.2021 19:15:15
  • Last modified 21.11.2024 06:22:13

An out-of-bounds write flaw was found in the UAS (USB Attached SCSI) device emulation of QEMU in versions prior to 6.2.0-rc0. The device uses the guest supplied stream number unchecked, which can lead to out-of-bounds access to the UASDevice->data3 a...

  • EPSS 0.31%
  • Published 05.08.2021 20:15:09
  • Last modified 21.11.2024 06:22:09

A flaw was found in the USB redirector device emulation of QEMU in versions prior to 6.1.0-rc2. It occurs when dropping packets during a bulk transfer from a SPICE client due to the packet queue being full. A malicious SPICE client could use this fla...

  • EPSS 0.12%
  • Published 02.06.2021 16:15:08
  • Last modified 21.11.2024 05:21:37

A divide-by-zero issue was found in dwc2_handle_packet in hw/usb/hcd-dwc2.c in the hcd-dwc2 USB host controller emulation of QEMU. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service.

  • EPSS 0.14%
  • Published 02.06.2021 15:15:07
  • Last modified 21.11.2024 04:22:10

The ahci_commit_buf function in ide/ahci.c in QEMU allows attackers to cause a denial of service (NULL dereference) when the command header 'ad->cur_cmd' is null.

  • EPSS 0.07%
  • Published 02.06.2021 14:15:11
  • Last modified 21.11.2024 06:21:48

An out-of-bounds write vulnerability was found in the virtio vhost-user GPU device (vhost-user-gpu) of QEMU in versions up to and including 6.0. The flaw occurs while processing the 'VIRTIO_GPU_CMD_GET_CAPSET' command from the guest. It could allow a...