The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of QEMU

QEMU: memory corruption via iSCSI Block Driver
An attacker, inside a guest system, can trigger a memory corruption via iSCSI Block Driver of QEMU, in order to trigger a denial of service, and possibly to run code on the host system...
CVE-2020-1711, DLA-2144-1, DSA-4616-1, RHSA-2020:0669-01, USN-4283-1, VIGILANCE-VUL-31422
QEMU: directory traversal via SLiRP TFTP Server
An attacker can traverse directories via SLiRP TFTP Server of QEMU, in order to read a file outside the service root path...
CVE-2020-7211, SUSE-SU-2020:0334-1, SUSE-SU-2020:0388-1, VIGILANCE-VUL-31355
SLiRP: buffer overflow via tcp_emu
An attacker, inside a guest system, can trigger a buffer overflow via tcp_emu() of SLiRP, in order to trigger a denial of service, and possibly to run code on the host system...
CVE-2020-7039, DLA-2076-1, DLA-2090-1, DSA-4616-1, RHSA-2020:0348-01, RHSA-2020:0775-01, RHSA-2020:0889-01, USN-4283-1, VIGILANCE-VUL-31350
QEMU: vulnerability via SCSI
A vulnerability via SCSI of QEMU was announced...
CVE-2019-12068, DLA-1927-1, openSUSE-SU-2019:2505-1, openSUSE-SU-2019:2510-1, SUSE-SU-2019:2783-1, SUSE-SU-2019:2954-1, SUSE-SU-2019:2955-1, SUSE-SU-2019:2956-1, SUSE-SU-2020:0388-1, USN-4191-1, USN-4191-2, VIGILANCE-VUL-30380
QEMU: use after free via SLiRP Packet Reassembly
An attacker can force the usage of a freed memory area via SLiRP Packet Reassembly of QEMU, in order to trigger a denial of service, and possibly to run code...
CVE-2019-15890, DLA-1927-1, DSA-4616-1, openSUSE-SU-2019:2510-1, RHSA-2020:0775-01, RHSA-2020:0889-01, SUSE-SU-2019:2783-1, SUSE-SU-2019:2955-1, SUSE-SU-2020:0388-1, USN-4191-1, USN-4191-2, VIGILANCE-VUL-30265
QEMU: information disclosure via qemu-bridge-helper ACL Bypass
An attacker can bypass access restrictions to data via qemu-bridge-helper ACL Bypass of QEMU, in order to obtain sensitive information...
CVE-2019-13164, DLA-1927-1, DSA-4506-1, DSA-4512-1, openSUSE-SU-2019:2041-1, openSUSE-SU-2019:2059-1, SUSE-SU-2019:14151-1, SUSE-SU-2019:2157-1, SUSE-SU-2019:2192-1, SUSE-SU-2019:2221-1, SUSE-SU-2019:2246-1, SUSE-SU-2019:2353-1, USN-4191-1, USN-4191-2, VIGILANCE-VUL-29678
QEMU: code execution via QMP guest-exec
An attacker can use a vulnerability via QMP guest-exec of QEMU, in order to run code...
CVE-2019-12929, VIGILANCE-VUL-29617
QEMU: code execution via QMP Migrate
An attacker can use a vulnerability via QMP Migrate of QEMU, in order to run code...
CVE-2019-12928, VIGILANCE-VUL-29616
qemu-guest-agent: integer overflow in the guest-exec command
An attacker, inside a guest system, can trigger an integer overflow via guest-exec of qemu-guest-agent, in order to trigger a denial of service, and possibly to run code on the host system...
CVE-2019-12247, VIGILANCE-VUL-29385
QEMU: NULL pointer dereference in the QXL device driver
An attacker, inside a guest system, can force a NULL pointer to be dereferenced via QXL of QEMU, in order to trigger a denial of service on the host system...
CVE-2019-12155, DLA-1927-1, DSA-4454-1, DSA-4454-2, openSUSE-SU-2019:2041-1, openSUSE-SU-2019:2059-1, RHSA-2019:2607-01, RHSA-2019:2892-01, RHSA-2019:3345-01, SUSE-SU-2019:14151-1, SUSE-SU-2019:2157-1, SUSE-SU-2019:2192-1, SUSE-SU-2019:2221-1, SUSE-SU-2019:2246-1, SUSE-SU-2019:2353-1, SUSE-SU-2020:0388-1, USN-4191-1, USN-4191-2, VIGILANCE-VUL-29384
Our database contains other pages. You can request a free trial to read them.

Display information about QEMU: