Show filters
7 Total Results
Displaying 1-7 of 7
Sort by:
Attacker Value
Unknown
CVE-2018-20815
Disclosure Date: May 31, 2019 (last updated November 08, 2023)
In QEMU 3.1.0, load_device_tree in device_tree.c calls the deprecated load_image function, which has a buffer overflow risk.
0
Attacker Value
Unknown
CVE-2018-19489
Disclosure Date: December 13, 2018 (last updated November 08, 2023)
v9fs_wstat in hw/9pfs/9p.c in QEMU allows guest OS users to cause a denial of service (crash) because of a race condition during file renaming.
0
Attacker Value
Unknown
CVE-2018-19364
Disclosure Date: December 13, 2018 (last updated November 08, 2023)
hw/9pfs/cofile.c and hw/9pfs/9p.c in QEMU can modify an fid path while it is being accessed by a second thread, leading to (for example) a use-after-free outcome.
0
Attacker Value
Unknown
CVE-2018-16867
Disclosure Date: December 12, 2018 (last updated November 08, 2023)
A flaw was found in qemu Media Transfer Protocol (MTP) before version 3.1.0. A path traversal in the in usb_mtp_write_data function in hw/usb/dev-mtp.c due to an improper filename sanitization. When the guest device is mounted in read-write mode, this allows to read/write arbitrary files which may lead do DoS scenario OR possibly lead to code execution on the host.
0
Attacker Value
Unknown
CVE-2018-19665
Disclosure Date: December 06, 2018 (last updated November 27, 2024)
The Bluetooth subsystem in QEMU mishandles negative values for length variables, leading to memory corruption.
0
Attacker Value
Unknown
CVE-2018-16847
Disclosure Date: November 02, 2018 (last updated November 27, 2024)
An OOB heap buffer r/w access issue was found in the NVM Express Controller emulation in QEMU. It could occur in nvme_cmb_ops routines in nvme device. A guest user/process could use this flaw to crash the QEMU process resulting in DoS or potentially run arbitrary code with privileges of the QEMU process.
0
Attacker Value
Unknown
CVE-2018-17963
Disclosure Date: October 09, 2018 (last updated November 27, 2024)
qemu_deliver_packet_iov in net/net.c in Qemu accepts packet sizes greater than INT_MAX, which allows attackers to cause a denial of service or possibly have unspecified other impact.
0