Show filters
414 Total Results
Displaying 111-120 of 414
Sort by:
Attacker Value
Unknown
CVE-2020-13361
Disclosure Date: May 28, 2020 (last updated February 21, 2025)
In QEMU 5.0.0 and earlier, es1370_transfer_audio in hw/audio/es1370.c does not properly validate the frame count, which allows guest OS users to trigger an out-of-bounds access during an es1370_write() operation.
0
Attacker Value
Unknown
CVE-2020-13253
Disclosure Date: May 27, 2020 (last updated February 21, 2025)
sd_wp_addr in hw/sd/sd.c in QEMU 4.2.0 uses an unvalidated address, which leads to an out-of-bounds read during sdhci_write() operations. A guest OS user can crash the QEMU process.
0
Attacker Value
Unknown
CVE-2020-10717
Disclosure Date: May 04, 2020 (last updated February 21, 2025)
A potential DoS flaw was found in the virtio-fs shared file system daemon (virtiofsd) implementation of the QEMU version >= v5.0. Virtio-fs is meant to share a host file system directory with a guest via virtio-fs device. If the guest opens the maximum number of file descriptors under the shared directory, a denial of service may occur. This flaw allows a guest user/process to cause this denial of service on the host.
0
Attacker Value
Unknown
CVE-2020-11869
Disclosure Date: April 27, 2020 (last updated February 21, 2025)
An integer overflow was found in QEMU 4.0.1 through 4.2.0 in the way it implemented ATI VGA emulation. This flaw occurs in the ati_2d_blt() routine in hw/display/ati-2d.c while handling MMIO write operations through the ati_mm_write() callback. A malicious guest could abuse this flaw to crash the QEMU process, resulting in a denial of service.
0
Attacker Value
Unknown
CVE-2020-11102
Disclosure Date: April 06, 2020 (last updated February 21, 2025)
hw/net/tulip.c in QEMU 4.2.0 has a buffer overflow during the copying of tx/rx buffers because the frame size is not validated against the r/w data length.
0
Attacker Value
Unknown
CVE-2019-15034
Disclosure Date: March 10, 2020 (last updated February 21, 2025)
hw/display/bochs-display.c in QEMU 4.0.0 does not ensure a sufficient PCI config space allocation, leading to a buffer overflow involving the PCIe extended config space.
0
Attacker Value
Unknown
CVE-2019-20382
Disclosure Date: March 05, 2020 (last updated February 21, 2025)
QEMU 4.1.0 has a memory leak in zrle_compress_data in ui/vnc-enc-zrle.c during a VNC disconnect operation because libz is misused, resulting in a situation where memory allocated in deflateInit2 is not freed in deflateEnd.
0
Attacker Value
Unknown
CVE-2020-1711
Disclosure Date: February 11, 2020 (last updated February 21, 2025)
An out-of-bounds heap buffer access flaw was found in the way the iSCSI Block driver in QEMU versions 2.12.0 before 4.2.1 handled a response coming from an iSCSI server while checking the status of a Logical Address Block (LBA) in an iscsi_co_block_status() routine. A remote user could use this flaw to crash the QEMU process, resulting in a denial of service or potential execution of arbitrary code with privileges of the QEMU process on the host.
0
Attacker Value
Unknown
CVE-2013-4535
Disclosure Date: February 11, 2020 (last updated February 21, 2025)
The virtqueue_map_sg function in hw/virtio/virtio.c in QEMU before 1.7.2 allows remote attackers to execute arbitrary files via a crafted savevm image, related to virtio-block or virtio-serial read.
0
Attacker Value
Unknown
CVE-2015-6815
Disclosure Date: January 31, 2020 (last updated February 21, 2025)
The process_tx_desc function in hw/net/e1000.c in QEMU before 2.4.0.1 does not properly process transmit descriptor data when sending a network packet, which allows attackers to cause a denial of service (infinite loop and guest crash) via unspecified vectors.
0