rpm package
suse/qemu&distro=SUSE Enterprise Storage 6
pkg:rpm/suse/qemu&distro=SUSE%20Enterprise%20Storage%206
Vulnerabilities (53)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2021-3527 | — | < 3.1.1.1-80.40.1 | 3.1.1.1-80.40.1 | May 26, 2021 | A flaw was found in the USB redirector device (usb-redir) of QEMU. Small USB packets are combined into a single, large transfer request, to reduce the overhead and improve performance. The combined size of the bulk transfer is used to dynamically allocate a variable length array | ||
| CVE-2021-20221 | — | < 3.1.1.1-9.24.3 | 3.1.1.1-9.24.3 | May 13, 2021 | An out-of-bounds heap buffer access issue was found in the ARM Generic Interrupt Controller emulator of QEMU up to and including qemu 4.2.0on aarch64 platform. The issue occurs because while writing an interrupt ID to the controller memory area, it is not masked to be 4 bits wide | ||
| CVE-2021-20181 | — | < 3.1.1.1-9.24.3 | 3.1.1.1-9.24.3 | May 13, 2021 | A race condition flaw was found in the 9pfs server implementation of QEMU up to and including 5.2.0. This flaw allows a malicious 9p client to cause a use-after-free error, potentially escalating their privileges on the system. The highest threat from this vulnerability is to con | ||
| CVE-2021-3507 | — | < 3.1.1.1-150100.80.43.2 | 3.1.1.1-150100.80.43.2 | May 6, 2021 | A heap buffer overflow was found in the floppy disk emulator of QEMU up to 6.0.0 (including). It could occur in fdctrl_transfer_handler() in hw/block/fdc.c while processing DMA read data transfers from the floppy drive to the guest system. A privileged guest user could use this f | ||
| CVE-2021-3409 | — | < 3.1.1.1-150100.80.43.2 | 3.1.1.1-150100.80.43.2 | Mar 23, 2021 | The patch for CVE-2020-17380/CVE-2020-25085 was found to be ineffective, thus making QEMU vulnerable to the out-of-bounds read/write access issues previously found in the SDHCI controller emulation code. This flaw allows a malicious privileged guest to crash the QEMU process on t | ||
| CVE-2021-3416 | — | < 3.1.1.1-9.24.3 | 3.1.1.1-9.24.3 | Mar 18, 2021 | A potential stack overflow via infinite loop issue was found in various NIC emulators of QEMU in versions up to and including 5.2.0. The issue occurs in loopback mode of a NIC wherein reentrant DMA checks get bypassed. A guest user/process may use this flaw to consume CPU cycles | ||
| CVE-2021-20255 | — | < 3.1.1.1-80.40.1 | 3.1.1.1-80.40.1 | Mar 9, 2021 | A stack overflow via an infinite recursion vulnerability was found in the eepro100 i8255x device emulator of QEMU. This issue occurs while processing controller commands due to a DMA reentry issue. This flaw allows a guest user or process to consume CPU cycles or crash the QEMU p | ||
| CVE-2021-20203 | — | < 3.1.1.1-9.24.3 | 3.1.1.1-9.24.3 | Feb 25, 2021 | An integer overflow issue was found in the vmxnet3 NIC emulator of the QEMU for versions up to v5.2.0. It may occur if a guest was to supply invalid values for rx/tx queue size or other NIC parameters. A privileged guest user may use this flaw to crash the QEMU process on the hos | ||
| CVE-2020-17380 | — | < 3.1.1.1-150100.80.43.2 | 3.1.1.1-150100.80.43.2 | Jan 30, 2021 | A heap-based buffer overflow was found in QEMU through 5.0.0 in the SDHCI device emulation support. It could occur while doing a multi block SDMA transfer via the sdhci_sdma_transfer_multi_blocks() routine in hw/sd/sdhci.c. A guest user or process could use this flaw to crash the | ||
| CVE-2020-29443 | — | < 3.1.1.1-9.24.3 | 3.1.1.1-9.24.3 | Jan 22, 2021 | ide_atapi_cmd_reply_end in hw/ide/atapi.c in QEMU 5.1.0 allows out-of-bounds read access because a buffer index is not validated. | ||
| CVE-2020-11947 | — | < 3.1.1.1-9.24.3 | 3.1.1.1-9.24.3 | Dec 31, 2020 | iscsi_aio_ioctl_cb in block/iscsi.c in QEMU 4.1.0 has a heap-based buffer over-read that may disclose unrelated information from process memory to an attacker. | ||
| CVE-2020-27821 | — | < 3.1.1.1-9.24.3 | 3.1.1.1-9.24.3 | Dec 8, 2020 | A flaw was found in the memory management API of QEMU during the initialization of a memory region cache. This issue could lead to an out-of-bounds write access to the MSI-X table while performing MMIO operations. A guest user may abuse this flaw to crash the QEMU process on the | ||
| CVE-2020-28916 | — | < 3.1.1.1-9.24.3 | 3.1.1.1-9.24.3 | Dec 4, 2020 | hw/net/e1000e_core.c in QEMU 5.0.0 has an infinite loop via an RX descriptor with a NULL buffer address. | ||
| CVE-2020-25723 | — | < 3.1.1.1-9.24.3 | 3.1.1.1-9.24.3 | Dec 2, 2020 | A reachable assertion issue was found in the USB EHCI emulation code of QEMU. It could occur while processing USB requests due to missing handling of DMA memory map failure. A malicious privileged user within the guest may abuse this flaw to send bogus USB requests and crash the | ||
| CVE-2020-25624 | — | < 3.1.1.1-9.24.3 | 3.1.1.1-9.24.3 | Nov 30, 2020 | hw/usb/hcd-ohci.c in QEMU 5.0.0 has a stack-based buffer over-read via values obtained from the host controller driver. | ||
| CVE-2020-29129 | — | < 3.1.1.1-9.24.3 | 3.1.1.1-9.24.3 | Nov 26, 2020 | ncsi.c in libslirp through 4.3.1 has a buffer over-read because it tries to read a certain amount of header data even if that exceeds the total packet length. | ||
| CVE-2020-29130 | — | < 3.1.1.1-9.24.3 | 3.1.1.1-9.24.3 | Nov 26, 2020 | slirp.c in libslirp through 4.3.1 has a buffer over-read because it tries to read a certain amount of header data even if that exceeds the total packet length. | ||
| CVE-2020-27617 | — | < 3.1.1.1-9.24.3 | 3.1.1.1-9.24.3 | Nov 6, 2020 | eth_get_gso_type in net/eth.c in QEMU 4.2.1 allows guest OS users to trigger an assertion failure. A guest can crash the QEMU process via packet data that lacks a valid Layer 3 protocol. | ||
| CVE-2020-25625 | — | < 3.1.1.1-9.24.3 | 3.1.1.1-9.24.3 | Sep 25, 2020 | hw/usb/hcd-ohci.c in QEMU 5.0.0 has an infinite loop when a TD list has a loop. | ||
| CVE-2020-25085 | — | < 3.1.1.1-9.30.2 | 3.1.1.1-9.30.2 | Sep 25, 2020 | QEMU 5.0.0 has a heap-based Buffer Overflow in flatview_read_continue in exec.c because hw/sd/sdhci.c mishandles a write operation in the SDHC_BLKSIZE case. |
- CVE-2021-3527May 26, 2021affected < 3.1.1.1-80.40.1fixed 3.1.1.1-80.40.1
A flaw was found in the USB redirector device (usb-redir) of QEMU. Small USB packets are combined into a single, large transfer request, to reduce the overhead and improve performance. The combined size of the bulk transfer is used to dynamically allocate a variable length array
- CVE-2021-20221May 13, 2021affected < 3.1.1.1-9.24.3fixed 3.1.1.1-9.24.3
An out-of-bounds heap buffer access issue was found in the ARM Generic Interrupt Controller emulator of QEMU up to and including qemu 4.2.0on aarch64 platform. The issue occurs because while writing an interrupt ID to the controller memory area, it is not masked to be 4 bits wide
- CVE-2021-20181May 13, 2021affected < 3.1.1.1-9.24.3fixed 3.1.1.1-9.24.3
A race condition flaw was found in the 9pfs server implementation of QEMU up to and including 5.2.0. This flaw allows a malicious 9p client to cause a use-after-free error, potentially escalating their privileges on the system. The highest threat from this vulnerability is to con
- CVE-2021-3507May 6, 2021affected < 3.1.1.1-150100.80.43.2fixed 3.1.1.1-150100.80.43.2
A heap buffer overflow was found in the floppy disk emulator of QEMU up to 6.0.0 (including). It could occur in fdctrl_transfer_handler() in hw/block/fdc.c while processing DMA read data transfers from the floppy drive to the guest system. A privileged guest user could use this f
- CVE-2021-3409Mar 23, 2021affected < 3.1.1.1-150100.80.43.2fixed 3.1.1.1-150100.80.43.2
The patch for CVE-2020-17380/CVE-2020-25085 was found to be ineffective, thus making QEMU vulnerable to the out-of-bounds read/write access issues previously found in the SDHCI controller emulation code. This flaw allows a malicious privileged guest to crash the QEMU process on t
- CVE-2021-3416Mar 18, 2021affected < 3.1.1.1-9.24.3fixed 3.1.1.1-9.24.3
A potential stack overflow via infinite loop issue was found in various NIC emulators of QEMU in versions up to and including 5.2.0. The issue occurs in loopback mode of a NIC wherein reentrant DMA checks get bypassed. A guest user/process may use this flaw to consume CPU cycles
- CVE-2021-20255Mar 9, 2021affected < 3.1.1.1-80.40.1fixed 3.1.1.1-80.40.1
A stack overflow via an infinite recursion vulnerability was found in the eepro100 i8255x device emulator of QEMU. This issue occurs while processing controller commands due to a DMA reentry issue. This flaw allows a guest user or process to consume CPU cycles or crash the QEMU p
- CVE-2021-20203Feb 25, 2021affected < 3.1.1.1-9.24.3fixed 3.1.1.1-9.24.3
An integer overflow issue was found in the vmxnet3 NIC emulator of the QEMU for versions up to v5.2.0. It may occur if a guest was to supply invalid values for rx/tx queue size or other NIC parameters. A privileged guest user may use this flaw to crash the QEMU process on the hos
- CVE-2020-17380Jan 30, 2021affected < 3.1.1.1-150100.80.43.2fixed 3.1.1.1-150100.80.43.2
A heap-based buffer overflow was found in QEMU through 5.0.0 in the SDHCI device emulation support. It could occur while doing a multi block SDMA transfer via the sdhci_sdma_transfer_multi_blocks() routine in hw/sd/sdhci.c. A guest user or process could use this flaw to crash the
- CVE-2020-29443Jan 22, 2021affected < 3.1.1.1-9.24.3fixed 3.1.1.1-9.24.3
ide_atapi_cmd_reply_end in hw/ide/atapi.c in QEMU 5.1.0 allows out-of-bounds read access because a buffer index is not validated.
- CVE-2020-11947Dec 31, 2020affected < 3.1.1.1-9.24.3fixed 3.1.1.1-9.24.3
iscsi_aio_ioctl_cb in block/iscsi.c in QEMU 4.1.0 has a heap-based buffer over-read that may disclose unrelated information from process memory to an attacker.
- CVE-2020-27821Dec 8, 2020affected < 3.1.1.1-9.24.3fixed 3.1.1.1-9.24.3
A flaw was found in the memory management API of QEMU during the initialization of a memory region cache. This issue could lead to an out-of-bounds write access to the MSI-X table while performing MMIO operations. A guest user may abuse this flaw to crash the QEMU process on the
- CVE-2020-28916Dec 4, 2020affected < 3.1.1.1-9.24.3fixed 3.1.1.1-9.24.3
hw/net/e1000e_core.c in QEMU 5.0.0 has an infinite loop via an RX descriptor with a NULL buffer address.
- CVE-2020-25723Dec 2, 2020affected < 3.1.1.1-9.24.3fixed 3.1.1.1-9.24.3
A reachable assertion issue was found in the USB EHCI emulation code of QEMU. It could occur while processing USB requests due to missing handling of DMA memory map failure. A malicious privileged user within the guest may abuse this flaw to send bogus USB requests and crash the
- CVE-2020-25624Nov 30, 2020affected < 3.1.1.1-9.24.3fixed 3.1.1.1-9.24.3
hw/usb/hcd-ohci.c in QEMU 5.0.0 has a stack-based buffer over-read via values obtained from the host controller driver.
- CVE-2020-29129Nov 26, 2020affected < 3.1.1.1-9.24.3fixed 3.1.1.1-9.24.3
ncsi.c in libslirp through 4.3.1 has a buffer over-read because it tries to read a certain amount of header data even if that exceeds the total packet length.
- CVE-2020-29130Nov 26, 2020affected < 3.1.1.1-9.24.3fixed 3.1.1.1-9.24.3
slirp.c in libslirp through 4.3.1 has a buffer over-read because it tries to read a certain amount of header data even if that exceeds the total packet length.
- CVE-2020-27617Nov 6, 2020affected < 3.1.1.1-9.24.3fixed 3.1.1.1-9.24.3
eth_get_gso_type in net/eth.c in QEMU 4.2.1 allows guest OS users to trigger an assertion failure. A guest can crash the QEMU process via packet data that lacks a valid Layer 3 protocol.
- CVE-2020-25625Sep 25, 2020affected < 3.1.1.1-9.24.3fixed 3.1.1.1-9.24.3
hw/usb/hcd-ohci.c in QEMU 5.0.0 has an infinite loop when a TD list has a loop.
- CVE-2020-25085Sep 25, 2020affected < 3.1.1.1-9.30.2fixed 3.1.1.1-9.30.2
QEMU 5.0.0 has a heap-based Buffer Overflow in flatview_read_continue in exec.c because hw/sd/sdhci.c mishandles a write operation in the SDHC_BLKSIZE case.
Page 2 of 3