Show filters
414 Total Results
Displaying 111-120 of 414
Sort by:
Attacker Value
Unknown

CVE-2020-13361

Disclosure Date: May 28, 2020 (last updated February 21, 2025)
In QEMU 5.0.0 and earlier, es1370_transfer_audio in hw/audio/es1370.c does not properly validate the frame count, which allows guest OS users to trigger an out-of-bounds access during an es1370_write() operation.
Attacker Value
Unknown

CVE-2020-13253

Disclosure Date: May 27, 2020 (last updated February 21, 2025)
sd_wp_addr in hw/sd/sd.c in QEMU 4.2.0 uses an unvalidated address, which leads to an out-of-bounds read during sdhci_write() operations. A guest OS user can crash the QEMU process.
Attacker Value
Unknown

CVE-2020-10717

Disclosure Date: May 04, 2020 (last updated February 21, 2025)
A potential DoS flaw was found in the virtio-fs shared file system daemon (virtiofsd) implementation of the QEMU version >= v5.0. Virtio-fs is meant to share a host file system directory with a guest via virtio-fs device. If the guest opens the maximum number of file descriptors under the shared directory, a denial of service may occur. This flaw allows a guest user/process to cause this denial of service on the host.
Attacker Value
Unknown

CVE-2020-11869

Disclosure Date: April 27, 2020 (last updated February 21, 2025)
An integer overflow was found in QEMU 4.0.1 through 4.2.0 in the way it implemented ATI VGA emulation. This flaw occurs in the ati_2d_blt() routine in hw/display/ati-2d.c while handling MMIO write operations through the ati_mm_write() callback. A malicious guest could abuse this flaw to crash the QEMU process, resulting in a denial of service.
Attacker Value
Unknown

CVE-2020-11102

Disclosure Date: April 06, 2020 (last updated February 21, 2025)
hw/net/tulip.c in QEMU 4.2.0 has a buffer overflow during the copying of tx/rx buffers because the frame size is not validated against the r/w data length.
Attacker Value
Unknown

CVE-2019-15034

Disclosure Date: March 10, 2020 (last updated February 21, 2025)
hw/display/bochs-display.c in QEMU 4.0.0 does not ensure a sufficient PCI config space allocation, leading to a buffer overflow involving the PCIe extended config space.
Attacker Value
Unknown

CVE-2019-20382

Disclosure Date: March 05, 2020 (last updated February 21, 2025)
QEMU 4.1.0 has a memory leak in zrle_compress_data in ui/vnc-enc-zrle.c during a VNC disconnect operation because libz is misused, resulting in a situation where memory allocated in deflateInit2 is not freed in deflateEnd.
Attacker Value
Unknown

CVE-2020-1711

Disclosure Date: February 11, 2020 (last updated February 21, 2025)
An out-of-bounds heap buffer access flaw was found in the way the iSCSI Block driver in QEMU versions 2.12.0 before 4.2.1 handled a response coming from an iSCSI server while checking the status of a Logical Address Block (LBA) in an iscsi_co_block_status() routine. A remote user could use this flaw to crash the QEMU process, resulting in a denial of service or potential execution of arbitrary code with privileges of the QEMU process on the host.
Attacker Value
Unknown

CVE-2013-4535

Disclosure Date: February 11, 2020 (last updated February 21, 2025)
The virtqueue_map_sg function in hw/virtio/virtio.c in QEMU before 1.7.2 allows remote attackers to execute arbitrary files via a crafted savevm image, related to virtio-block or virtio-serial read.
Attacker Value
Unknown

CVE-2015-6815

Disclosure Date: January 31, 2020 (last updated February 21, 2025)
The process_tx_desc function in hw/net/e1000.c in QEMU before 2.4.0.1 does not properly process transmit descriptor data when sending a network packet, which allows attackers to cause a denial of service (infinite loop and guest crash) via unspecified vectors.