VYPR

rpm package

almalinux/qemu-kvm-core

pkg:rpm/almalinux/qemu-kvm-core

Vulnerabilities (67)

  • CVE-2025-11234HigOct 3, 2025
    affected < 18:10.0.0-14.el10_1.5.alma.1fixed 18:10.0.0-14.el10_1.5.alma.1

    A flaw was found in QEMU. If the QIOChannelWebsock object is freed while it is waiting to complete a handshake, a GSource is leaked. This can lead to the callback firing later on and triggering a use-after-free in the use of the channel. This can be abused by a malicious client w

  • CVE-2025-49133Jun 10, 2025
    affected < 15:6.2.0-53.module_el8.10.0+4031+06966654.4fixed 15:6.2.0-53.module_el8.10.0+4031+06966654.4

    Libtpms is a library that targets the integration of TPM functionality into hypervisors, primarily into Qemu. Libtpms, which is derived from the TPM 2.0 reference implementation code published by the Trusted Computing Group, is prone to a potential out of bounds (OOB) read vulner

  • CVE-2024-7409HigAug 5, 2024
    affected < 15:6.2.0-53.module_el8.10.0+3897+eb84924dfixed 15:6.2.0-53.module_el8.10.0+3897+eb84924d

    A flaw was found in the QEMU NBD Server. This vulnerability allows a denial of service (DoS) attack via improper synchronization during socket closure when a client keeps a socket open as the server is taken offline.

  • CVE-2024-7383HigAug 5, 2024
    affected < 15:6.2.0-53.module_el8.10.0+3897+eb84924dfixed 15:6.2.0-53.module_el8.10.0+3897+eb84924d

    A flaw was found in libnbd. The client did not always correctly verify the NBD server's certificate when using TLS to connect to an NBD server. This issue allows a man-in-the-middle attack on NBD traffic.

  • CVE-2024-4467HigJul 2, 2024
    affected < 17:8.2.0-11.el9_4.4fixed 17:8.2.0-11.el9_4.4

    A flaw was found in the QEMU disk image utility (qemu-img) 'info' command. A specially crafted image file containing a `json:{}` value describing block devices in QMP could cause the qemu-img process on the host to consume large amounts of memory or CPU time, leading to denial of

  • CVE-2024-4418MedMay 8, 2024
    affected < 15:6.2.0-49.module_el8.10.0+3839+c94ce74bfixed 15:6.2.0-49.module_el8.10.0+3839+c94ce74b

    A race condition leading to a stack use-after-free flaw was found in libvirt. Due to a bad assumption in the virNetClientIOEventLoop() method, the `data` pointer to a stack-allocated virNetClientIOEventData structure ended up being used in the virNetClientIOEventFD callback while

  • CVE-2024-3446HigApr 9, 2024
    affected < 15:6.2.0-53.module_el8.10.0+3897+eb84924dfixed 15:6.2.0-53.module_el8.10.0+3897+eb84924d

    A double free vulnerability was found in QEMU virtio devices (virtio-gpu, virtio-serial-bus, virtio-crypto), where the mem_reentrancy_guard flag insufficiently protects against DMA reentrancy issues. This issue could allow a malicious privileged guest user to crash the QEMU proce

  • CVE-2024-26327Feb 19, 2024
    affected < 17:9.0.0-10.el9_5fixed 17:9.0.0-10.el9_5

    An issue was discovered in QEMU 7.1.0 through 8.2.1. register_vfs in hw/pci/pcie_sriov.c mishandles the situation where a guest writes NumVFs greater than TotalVFs, leading to a buffer overflow in VF implementations.

  • CVE-2023-6683Jan 12, 2024
    affected < 17:8.2.0-11.el9_4fixed 17:8.2.0-11.el9_4

    A flaw was found in the QEMU built-in VNC server while processing ClientCutText messages. The qemu_clipboard_request() function can be reached before vnc_server_cut_text_caps() was called and had the chance to initialize the clipboard peer, leading to a NULL pointer dereference.

  • CVE-2023-5088Nov 3, 2023
    affected < 17:8.2.0-11.el9_4fixed 17:8.2.0-11.el9_4

    A bug in QEMU could cause a guest I/O operation otherwise addressed to an arbitrary disk offset to be targeted to offset 0 instead (potentially overwriting the VM's boot code). This could be used, for example, by L2 guests with a virtual disk (vdiskL2) stored on a virtual disk of

  • CVE-2023-2680Sep 13, 2023
    affected < 17:8.0.0-16.el9_3.alma.1fixed 17:8.0.0-16.el9_3.alma.1

    This CVE exists because of an incomplete fix for CVE-2021-3750. More specifically, the qemu-kvm package as released for Red Hat Enterprise Linux 9.1 via RHSA-2022:7967 included a version of qemu-kvm that was actually missing the fix for CVE-2021-3750.

  • CVE-2023-3255Sep 13, 2023
    affected < 17:8.2.0-11.el9_4fixed 17:8.2.0-11.el9_4

    A flaw was found in the QEMU built-in VNC server while processing ClientCutText messages. A wrong exit condition may lead to an infinite loop when inflating an attacker controlled zlib buffer in the `inflate_buffer` function. This could allow a remote authenticated client who is

  • CVE-2023-3301Sep 13, 2023
    affected < 15:6.2.0-40.module_el8.9.0+3681+41cbbcc0.1.alma.1fixed 15:6.2.0-40.module_el8.9.0+3681+41cbbcc0.1.alma.1

    A flaw was found in QEMU. The async nature of hot-unplug enables a race scenario where the net device backend is cleared before the virtio-net pci frontend has been unplugged. A malicious guest could use this time window to trigger an assertion and cause a denial of service.

  • CVE-2023-42467Sep 11, 2023
    affected < 17:8.2.0-11.el9_4fixed 17:8.2.0-11.el9_4

    QEMU through 8.0.0 could trigger a division by zero in scsi_disk_reset in hw/scsi/scsi-disk.c because scsi_disk_emulate_mode_select does not prevent s->qdev.blocksize from being 256. This stops QEMU and the guest immediately.

  • CVE-2023-3019MedJul 24, 2023
    affected < 17:8.2.0-11.el9_4fixed 17:8.2.0-11.el9_4

    A DMA reentrancy issue leading to a use-after-free error was found in the e1000e NIC emulation code in QEMU. This issue could allow a privileged guest user to crash the QEMU process on the host, resulting in a denial of service.

  • CVE-2023-3354Jul 11, 2023
    affected < 17:7.2.0-14.el9_2.5.alma.1fixed 17:7.2.0-14.el9_2.5.alma.1

    A flaw was found in the QEMU built-in VNC server. When a client connects to the VNC server, QEMU checks whether the current number of connections crosses a certain threshold and if so, cleans up the previous connection. If the previous connection happens to be in the handshake ph

  • CVE-2023-2700May 15, 2023
    affected < 15:6.2.0-32.module_el8.8.0+3553+bd08596bfixed 15:6.2.0-32.module_el8.8.0+3553+bd08596b

    A vulnerability was found in libvirt. This security flaw ouccers due to repeatedly querying an SR-IOV PCI device's capabilities that exposes a memory leak caused by a failure to free the virPCIVirtualFunction array within the parent struct's g_autoptr cleanup.

  • CVE-2023-1018Feb 28, 2023
    affected < 15:6.2.0-32.module_el8.8.0+3553+bd08596bfixed 15:6.2.0-32.module_el8.8.0+3553+bd08596b

    An out-of-bounds read vulnerability exists in TPM2.0's Module Library allowing a 2-byte read past the end of a TPM2.0 command in the CryptParameterDecryption routine. An attacker who can successfully exploit this vulnerability can read or access sensitive data stored in the TPM.

  • CVE-2022-4172Nov 29, 2022
    affected < 17:7.2.0-14.el9_2fixed 17:7.2.0-14.el9_2

    An integer overflow and buffer overflow issues were found in the ACPI Error Record Serialization Table (ERST) device of QEMU in the read_erst_record() and write_erst_record() functions. Both issues may allow the guest to overrun the host buffer allocated for the ERST memory devic

  • CVE-2022-4144Nov 29, 2022
    affected < 15:6.2.0-21.module_el8.7.0+3387+571b583b.2fixed 15:6.2.0-21.module_el8.7.0+3387+571b583b.2

    An out-of-bounds read flaw was found in the QXL display device emulation in QEMU. The qxl_phys2virt() function does not check the size of the structure pointed to by the guest physical address, potentially reading past the end of the bar space into adjacent pages. A malicious gue

Page 1 of 4