Qemu

Qemu

422 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Published 13.05.2021 16:15:07
  • Last modified 21.11.2024 05:46:09

An out-of-bounds heap buffer access issue was found in the ARM Generic Interrupt Controller emulator of QEMU up to and including qemu 4.2.0on aarch64 platform. The issue occurs because while writing an interrupt ID to the controller memory area, it i...

Exploit
  • EPSS 0.02%
  • Published 06.05.2021 16:15:07
  • Last modified 21.11.2024 06:21:42

A heap buffer overflow was found in the floppy disk emulator of QEMU up to 6.0.0 (including). It could occur in fdctrl_transfer_handler() in hw/block/fdc.c while processing DMA read data transfers from the floppy drive to the guest system. A privileg...

  • EPSS 0.04%
  • Published 23.03.2021 21:15:14
  • Last modified 21.11.2024 06:21:26

The patch for CVE-2020-17380/CVE-2020-25085 was found to be ineffective, thus making QEMU vulnerable to the out-of-bounds read/write access issues previously found in the SDHCI controller emulation code. This flaw allows a malicious privileged guest ...

Exploit
  • EPSS 0.11%
  • Published 23.03.2021 20:15:13
  • Last modified 21.11.2024 06:21:24

A use-after-free flaw was found in the MegaRAID emulator of QEMU. This issue occurs while processing SCSI I/O requests in the case of an error mptsas_free_request() that does not dequeue the request object 'req' from a pending requests queue. This fl...

  • EPSS 0%
  • Published 18.03.2021 20:15:13
  • Last modified 21.11.2024 06:21:27

A potential stack overflow via infinite loop issue was found in various NIC emulators of QEMU in versions up to and including 5.2.0. The issue occurs in loopback mode of a NIC wherein reentrant DMA checks get bypassed. A guest user/process may use th...

  • EPSS 0.04%
  • Published 09.03.2021 20:15:13
  • Last modified 21.11.2024 05:46:13

A stack overflow via an infinite recursion vulnerability was found in the eepro100 i8255x device emulator of QEMU. This issue occurs while processing controller commands due to a DMA reentry issue. This flaw allows a guest user or process to consume ...

  • EPSS 0.13%
  • Published 09.03.2021 18:15:15
  • Last modified 21.11.2024 05:46:14

A flaw was found in the virtio-fs shared file system daemon (virtiofsd) of QEMU. The new 'xattrmap' option may cause the 'security.capability' xattr in the guest to not drop on file write, potentially leading to a modified, privileged executable in t...

Exploit
  • EPSS 0.02%
  • Published 25.02.2021 20:15:11
  • Last modified 21.11.2024 05:46:07

An integer overflow issue was found in the vmxnet3 NIC emulator of the QEMU for versions up to v5.2.0. It may occur if a guest was to supply invalid values for rx/tx queue size or other NIC parameters. A privileged guest user may use this flaw to cra...

  • EPSS 0.08%
  • Published 30.01.2021 06:15:12
  • Last modified 21.11.2024 05:07:58

A heap-based buffer overflow was found in QEMU through 5.0.0 in the SDHCI device emulation support. It could occur while doing a multi block SDMA transfer via the sdhci_sdma_transfer_multi_blocks() routine in hw/sd/sdhci.c. A guest user or process co...

Exploit
  • EPSS 0.09%
  • Published 28.01.2021 20:15:12
  • Last modified 21.11.2024 05:27:28

A flaw was found in qemu. A host privilege escalation issue was found in the virtio-fs shared file system daemon where a privileged guest user is able to create a device special file in the shared directory and use it to r/w access host devices.