Show filters
6 Total Results
Displaying 1-6 of 6
Sort by:
Attacker Value
Unknown
CVE-2020-13765
Disclosure Date: June 04, 2020 (last updated February 21, 2025)
rom_copy() in hw/core/loader.c in QEMU 4.0 and 4.1.0 does not validate the relationship between two addresses, which allows attackers to trigger an invalid memory copy operation.
0
Attacker Value
Unknown
CVE-2019-15034
Disclosure Date: March 10, 2020 (last updated February 21, 2025)
hw/display/bochs-display.c in QEMU 4.0.0 does not ensure a sufficient PCI config space allocation, leading to a buffer overflow involving the PCIe extended config space.
0
Attacker Value
Unknown
CVE-2019-13164
Disclosure Date: October 10, 2019 (last updated November 27, 2024)
qemu-bridge-helper.c in QEMU 3.1 and 4.0.0 does not ensure that a network interface name (obtained from bridge.conf or a --br=bridge option) is limited to the IFNAMSIZ size, which can lead to an ACL bypass.
0
Attacker Value
Unknown
CVE-2019-15890
Disclosure Date: September 06, 2019 (last updated November 27, 2024)
libslirp 4.0.0, as used in QEMU 4.1.0, has a use-after-free in ip_reass in ip_input.c.
0
Attacker Value
Unknown
CVE-2019-12155
Disclosure Date: May 24, 2019 (last updated November 08, 2023)
interface_release_resource in hw/display/qxl.c in QEMU 3.1.x through 4.0.0 has a NULL pointer dereference.
0
Attacker Value
Unknown
CVE-2012-3515
Disclosure Date: November 23, 2012 (last updated October 05, 2023)
Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space."
0