Show filters
17 Total Results
Displaying 1-10 of 17
Sort by:
Attacker Value
Unknown

CVE-2019-13164

Disclosure Date: October 10, 2019 (last updated November 27, 2024)
qemu-bridge-helper.c in QEMU 3.1 and 4.0.0 does not ensure that a network interface name (obtained from bridge.conf or a --br=bridge option) is limited to the IFNAMSIZ size, which can lead to an ACL bypass.
Attacker Value
Unknown

CVE-2019-12068

Disclosure Date: September 24, 2019 (last updated November 08, 2023)
In QEMU 1:4.1-1, 1:2.1+dfsg-12+deb8u6, 1:2.8+dfsg-6+deb9u8, 1:3.1+dfsg-8~deb10u1, 1:3.1+dfsg-8+deb10u2, and 1:2.1+dfsg-12+deb8u12 (fixed), when executing script in lsi_execute_script(), the LSI scsi adapter emulator advances 's->dsp' index to read next opcode. This can lead to an infinite loop if the next opcode is empty. Move the existing loop exit after 10k iterations so that it covers no-op opcodes as well.
Attacker Value
Unknown

CVE-2018-20815

Disclosure Date: May 31, 2019 (last updated November 08, 2023)
In QEMU 3.1.0, load_device_tree in device_tree.c calls the deprecated load_image function, which has a buffer overflow risk.
0
Attacker Value
Unknown

CVE-2019-5008

Disclosure Date: April 19, 2019 (last updated November 08, 2023)
hw/sparc64/sun4u.c in QEMU 3.1.50 is vulnerable to a NULL pointer dereference, which allows the attacker to cause a denial of service via a device driver.
0
Attacker Value
Unknown

CVE-2019-6501

Disclosure Date: March 21, 2019 (last updated November 08, 2023)
In QEMU 3.1, scsi_handle_inquiry_reply in hw/scsi/scsi-generic.c allows out-of-bounds write and read operations.
0
Attacker Value
Unknown

CVE-2018-19364

Disclosure Date: December 13, 2018 (last updated November 08, 2023)
hw/9pfs/cofile.c and hw/9pfs/9p.c in QEMU can modify an fid path while it is being accessed by a second thread, leading to (for example) a use-after-free outcome.
Attacker Value
Unknown

CVE-2018-19489

Disclosure Date: December 13, 2018 (last updated November 08, 2023)
v9fs_wstat in hw/9pfs/9p.c in QEMU allows guest OS users to cause a denial of service (crash) because of a race condition during file renaming.
Attacker Value
Unknown

CVE-2018-16867

Disclosure Date: December 12, 2018 (last updated November 08, 2023)
A flaw was found in qemu Media Transfer Protocol (MTP) before version 3.1.0. A path traversal in the in usb_mtp_write_data function in hw/usb/dev-mtp.c due to an improper filename sanitization. When the guest device is mounted in read-write mode, this allows to read/write arbitrary files which may lead do DoS scenario OR possibly lead to code execution on the host.
Attacker Value
Unknown

CVE-2018-19665

Disclosure Date: December 06, 2018 (last updated November 27, 2024)
The Bluetooth subsystem in QEMU mishandles negative values for length variables, leading to memory corruption.
Attacker Value
Unknown

CVE-2018-16847

Disclosure Date: November 02, 2018 (last updated November 27, 2024)
An OOB heap buffer r/w access issue was found in the NVM Express Controller emulation in QEMU. It could occur in nvme_cmb_ops routines in nvme device. A guest user/process could use this flaw to crash the QEMU process resulting in DoS or potentially run arbitrary code with privileges of the QEMU process.