Show filters
414 Total Results
Displaying 81-90 of 414
Sort by:
Attacker Value
Unknown

CVE-2019-20808

Disclosure Date: December 31, 2020 (last updated February 22, 2025)
In QEMU 4.1.0, an out-of-bounds read flaw was found in the ATI VGA implementation. It occurs in the ati_cursor_define() routine while handling MMIO write operations through the ati_mm_write() callback. A malicious guest could abuse this flaw to crash the QEMU process, resulting in a denial of service.
Attacker Value
Unknown

CVE-2020-11947

Disclosure Date: December 31, 2020 (last updated February 22, 2025)
iscsi_aio_ioctl_cb in block/iscsi.c in QEMU 4.1.0 has a heap-based buffer over-read that may disclose unrelated information from process memory to an attacker.
Attacker Value
Unknown

CVE-2020-27821

Disclosure Date: December 08, 2020 (last updated February 22, 2025)
A flaw was found in the memory management API of QEMU during the initialization of a memory region cache. This issue could lead to an out-of-bounds write access to the MSI-X table while performing MMIO operations. A guest user may abuse this flaw to crash the QEMU process on the host, resulting in a denial of service. This flaw affects QEMU versions prior to 5.2.0.
Attacker Value
Unknown

CVE-2020-28916

Disclosure Date: December 04, 2020 (last updated February 22, 2025)
hw/net/e1000e_core.c in QEMU 5.0.0 has an infinite loop via an RX descriptor with a NULL buffer address.
Attacker Value
Unknown

CVE-2020-25723

Disclosure Date: December 02, 2020 (last updated February 22, 2025)
A reachable assertion issue was found in the USB EHCI emulation code of QEMU. It could occur while processing USB requests due to missing handling of DMA memory map failure. A malicious privileged user within the guest may abuse this flaw to send bogus USB requests and crash the QEMU process on the host, resulting in a denial of service.
Attacker Value
Unknown

CVE-2020-25624

Disclosure Date: November 30, 2020 (last updated February 22, 2025)
hw/usb/hcd-ohci.c in QEMU 5.0.0 has a stack-based buffer over-read via values obtained from the host controller driver.
Attacker Value
Unknown

CVE-2020-27617

Disclosure Date: November 06, 2020 (last updated February 22, 2025)
eth_get_gso_type in net/eth.c in QEMU 4.2.1 allows guest OS users to trigger an assertion failure. A guest can crash the QEMU process via packet data that lacks a valid Layer 3 protocol.
Attacker Value
Unknown

CVE-2020-27616

Disclosure Date: November 06, 2020 (last updated February 22, 2025)
ati_2d_blt in hw/display/ati_2d.c in QEMU 4.2.1 can encounter an outside-limits situation in a calculation. A guest can crash the QEMU process.
Attacker Value
Unknown

CVE-2020-24352

Disclosure Date: October 16, 2020 (last updated February 22, 2025)
An issue was discovered in QEMU through 5.1.0. An out-of-bounds memory access was found in the ATI VGA device implementation. This flaw occurs in the ati_2d_blt() routine in hw/display/ati_2d.c while handling MMIO write operations through the ati_mm_write() callback. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service.
Attacker Value
Unknown

CVE-2020-25743

Disclosure Date: October 06, 2020 (last updated February 22, 2025)
hw/ide/pci.c in QEMU before 5.1.1 can trigger a NULL pointer dereference because it lacks a pointer check before an ide_cancel_dma_sync call.