ALT-PU-2017-1043-1
Closed vulnerabilities
BDU:2016-02069
Уязвимость эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2016-02070
Уязвимость эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2016-02071
Уязвимость эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю читать память хоста
BDU:2016-02072
Уязвимость эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2017-00068
Уязвимость эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2017-00069
Уязвимость эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2017-00070
Уязвимость эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2017-00071
Уязвимость эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2017-00073
Уязвимость эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю нарушить конфиденциальность, целостность и доступность данных
BDU:2017-00075
Уязвимость эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю нарушить конфиденциальность, целостность и доступность данных
BDU:2017-00076
Уязвимость эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать аварийное завершение работы приложения
BDU:2017-00077
Уязвимость эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании или оказать иное воздействие на систему
Modified: 2025-04-20
CVE-2016-10029
The virtio_gpu_set_scanout function in QEMU (aka Quick Emulator) built with Virtio GPU Device emulator support allows local guest OS users to cause a denial of service (out-of-bounds read and process crash) via a scanout id in a VIRTIO_GPU_CMD_SET_SCANOUT command larger than num_scanouts.
- http://git.qemu-project.org/?p=qemu.git%3Ba=commit%3Bh=2fe760554eb3769d70f608a158474f
- http://git.qemu-project.org/?p=qemu.git%3Ba=commit%3Bh=acfc4846508a02cc4c83aa27799fd7
- http://www.openwall.com/lists/oss-security/2016/12/20/2
- http://www.openwall.com/lists/oss-security/2016/12/22/15
- http://www.securityfocus.com/bid/94978
- http://www.securitytracker.com/id/1037526
- http://git.qemu-project.org/?p=qemu.git%3Ba=commit%3Bh=2fe760554eb3769d70f608a158474f
- http://git.qemu-project.org/?p=qemu.git%3Ba=commit%3Bh=acfc4846508a02cc4c83aa27799fd7
- http://www.openwall.com/lists/oss-security/2016/12/20/2
- http://www.openwall.com/lists/oss-security/2016/12/22/15
- http://www.securityfocus.com/bid/94978
- http://www.securitytracker.com/id/1037526
Modified: 2025-04-12
CVE-2016-4002
Buffer overflow in the mipsnet_receive function in hw/net/mipsnet.c in QEMU, when the guest NIC is configured to accept large packets, allows remote attackers to cause a denial of service (memory corruption and QEMU crash) or possibly execute arbitrary code via a packet larger than 1514 bytes.
- http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183275.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183350.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184209.html
- http://www.openwall.com/lists/oss-security/2016/04/11/6
- http://www.openwall.com/lists/oss-security/2016/04/12/7
- http://www.securityfocus.com/bid/85992
- http://www.ubuntu.com/usn/USN-2974-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1326082
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-04/msg01131.html
- https://security.gentoo.org/glsa/201609-01
- http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183275.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183350.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184209.html
- http://www.openwall.com/lists/oss-security/2016/04/11/6
- http://www.openwall.com/lists/oss-security/2016/04/12/7
- http://www.securityfocus.com/bid/85992
- http://www.ubuntu.com/usn/USN-2974-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1326082
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-04/msg01131.html
- https://security.gentoo.org/glsa/201609-01
Modified: 2025-04-12
CVE-2016-4020
The patch_instruction function in hw/i386/kvmvapic.c in QEMU does not initialize the imm32 variable, which allows local guest OS administrators to obtain sensitive information from host stack memory by accessing the Task Priority Register (TPR).
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=691a02e2ce0c413236a78dee6f2651c937b09fb0
- http://www.securityfocus.com/bid/86067
- http://www.ubuntu.com/usn/USN-2974-1
- https://access.redhat.com/errata/RHSA-2017:1856
- https://access.redhat.com/errata/RHSA-2017:2392
- https://access.redhat.com/errata/RHSA-2017:2408
- https://bugzilla.redhat.com/show_bug.cgi?id=1313686
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-04/msg01106.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-04/msg01118.html
- https://security.gentoo.org/glsa/201609-01
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=691a02e2ce0c413236a78dee6f2651c937b09fb0
- http://www.securityfocus.com/bid/86067
- http://www.ubuntu.com/usn/USN-2974-1
- https://access.redhat.com/errata/RHSA-2017:1856
- https://access.redhat.com/errata/RHSA-2017:2392
- https://access.redhat.com/errata/RHSA-2017:2408
- https://bugzilla.redhat.com/show_bug.cgi?id=1313686
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-04/msg01106.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-04/msg01118.html
- https://security.gentoo.org/glsa/201609-01
Modified: 2025-04-12
CVE-2016-4952
QEMU (aka Quick Emulator), when built with VMWARE PVSCSI paravirtual SCSI bus emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds array access) via vectors related to the (1) PVSCSI_CMD_SETUP_RINGS or (2) PVSCSI_CMD_SETUP_MSG_RING SCSI command.
- http://www.openwall.com/lists/oss-security/2016/05/23/1
- http://www.openwall.com/lists/oss-security/2016/05/23/4
- http://www.ubuntu.com/usn/USN-3047-1
- http://www.ubuntu.com/usn/USN-3047-2
- https://bugzilla.redhat.com/show_bug.cgi?id=1334384
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg03774.html
- http://www.openwall.com/lists/oss-security/2016/05/23/1
- http://www.openwall.com/lists/oss-security/2016/05/23/4
- http://www.ubuntu.com/usn/USN-3047-1
- http://www.ubuntu.com/usn/USN-3047-2
- https://bugzilla.redhat.com/show_bug.cgi?id=1334384
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg03774.html
Modified: 2025-04-12
CVE-2016-4964
The mptsas_fetch_requests function in hw/scsi/mptsas.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop, and CPU consumption or QEMU process crash) via vectors involving s->state.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=06630554ccbdd25780aa03c3548aaff1eb56dffd
- http://www.openwall.com/lists/oss-security/2016/05/24/4
- http://www.openwall.com/lists/oss-security/2016/05/24/7
- https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg04027.html
- https://security.gentoo.org/glsa/201609-01
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=06630554ccbdd25780aa03c3548aaff1eb56dffd
- http://www.openwall.com/lists/oss-security/2016/05/24/4
- http://www.openwall.com/lists/oss-security/2016/05/24/7
- https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg04027.html
- https://security.gentoo.org/glsa/201609-01
Modified: 2025-04-12
CVE-2016-5105
The megasas_dcmd_cfg_read function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, uses an uninitialized variable, which allows local guest administrators to read host memory via vectors involving a MegaRAID Firmware Interface (MFI) command.
- http://www.openwall.com/lists/oss-security/2016/05/25/5
- http://www.openwall.com/lists/oss-security/2016/05/26/7
- http://www.ubuntu.com/usn/USN-3047-1
- http://www.ubuntu.com/usn/USN-3047-2
- https://bugzilla.redhat.com/show_bug.cgi?id=1339583
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg04419.html
- http://www.openwall.com/lists/oss-security/2016/05/25/5
- http://www.openwall.com/lists/oss-security/2016/05/26/7
- http://www.ubuntu.com/usn/USN-3047-1
- http://www.ubuntu.com/usn/USN-3047-2
- https://bugzilla.redhat.com/show_bug.cgi?id=1339583
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg04419.html
Modified: 2025-04-12
CVE-2016-5106
The megasas_dcmd_set_properties function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allows local guest administrators to cause a denial of service (out-of-bounds write access) via vectors involving a MegaRAID Firmware Interface (MFI) command.
- http://www.openwall.com/lists/oss-security/2016/05/25/6
- http://www.openwall.com/lists/oss-security/2016/05/26/8
- http://www.ubuntu.com/usn/USN-3047-1
- http://www.ubuntu.com/usn/USN-3047-2
- https://bugzilla.redhat.com/show_bug.cgi?id=1339578
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg04340.html
- https://security.gentoo.org/glsa/201609-01
- http://www.openwall.com/lists/oss-security/2016/05/25/6
- http://www.openwall.com/lists/oss-security/2016/05/26/8
- http://www.ubuntu.com/usn/USN-3047-1
- http://www.ubuntu.com/usn/USN-3047-2
- https://bugzilla.redhat.com/show_bug.cgi?id=1339578
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg04340.html
- https://security.gentoo.org/glsa/201609-01
Modified: 2025-04-12
CVE-2016-5107
The megasas_lookup_frame function in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds read and crash) via unspecified vectors.
- http://www.openwall.com/lists/oss-security/2016/05/25/7
- http://www.openwall.com/lists/oss-security/2016/05/26/9
- http://www.securityfocus.com/bid/90874
- http://www.ubuntu.com/usn/USN-3047-1
- http://www.ubuntu.com/usn/USN-3047-2
- https://bugzilla.redhat.com/show_bug.cgi?id=1336461
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg04424.html
- https://security.gentoo.org/glsa/201609-01
- http://www.openwall.com/lists/oss-security/2016/05/25/7
- http://www.openwall.com/lists/oss-security/2016/05/26/9
- http://www.securityfocus.com/bid/90874
- http://www.ubuntu.com/usn/USN-3047-1
- http://www.ubuntu.com/usn/USN-3047-2
- https://bugzilla.redhat.com/show_bug.cgi?id=1336461
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg04424.html
- https://security.gentoo.org/glsa/201609-01
Modified: 2025-04-12
CVE-2016-5126
Heap-based buffer overflow in the iscsi_aio_ioctl function in block/iscsi.c in QEMU allows local guest OS users to cause a denial of service (QEMU process crash) or possibly execute arbitrary code via a crafted iSCSI asynchronous I/O ioctl call.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=a6b3167fa0e825aebb5a7cd8b437b6d41584a196
- http://rhn.redhat.com/errata/RHSA-2016-1606.html
- http://rhn.redhat.com/errata/RHSA-2016-1607.html
- http://rhn.redhat.com/errata/RHSA-2016-1653.html
- http://rhn.redhat.com/errata/RHSA-2016-1654.html
- http://rhn.redhat.com/errata/RHSA-2016-1655.html
- http://rhn.redhat.com/errata/RHSA-2016-1756.html
- http://rhn.redhat.com/errata/RHSA-2016-1763.html
- http://www.openwall.com/lists/oss-security/2016/05/30/6
- http://www.openwall.com/lists/oss-security/2016/05/30/7
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.securityfocus.com/bid/90948
- http://www.ubuntu.com/usn/USN-3047-1
- http://www.ubuntu.com/usn/USN-3047-2
- https://bugzilla.redhat.com/show_bug.cgi?id=1340924
- https://lists.debian.org/debian-lts-announce/2019/09/msg00021.html
- https://lists.gnu.org/archive/html/qemu-block/2016-05/msg00779.html
- https://security.gentoo.org/glsa/201609-01
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=a6b3167fa0e825aebb5a7cd8b437b6d41584a196
- http://rhn.redhat.com/errata/RHSA-2016-1606.html
- http://rhn.redhat.com/errata/RHSA-2016-1607.html
- http://rhn.redhat.com/errata/RHSA-2016-1653.html
- http://rhn.redhat.com/errata/RHSA-2016-1654.html
- http://rhn.redhat.com/errata/RHSA-2016-1655.html
- http://rhn.redhat.com/errata/RHSA-2016-1756.html
- http://rhn.redhat.com/errata/RHSA-2016-1763.html
- http://www.openwall.com/lists/oss-security/2016/05/30/6
- http://www.openwall.com/lists/oss-security/2016/05/30/7
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.securityfocus.com/bid/90948
- http://www.ubuntu.com/usn/USN-3047-1
- http://www.ubuntu.com/usn/USN-3047-2
- https://bugzilla.redhat.com/show_bug.cgi?id=1340924
- https://lists.debian.org/debian-lts-announce/2019/09/msg00021.html
- https://lists.gnu.org/archive/html/qemu-block/2016-05/msg00779.html
- https://security.gentoo.org/glsa/201609-01
Modified: 2025-04-12
CVE-2016-5238
The get_cmd function in hw/scsi/esp.c in QEMU might allow local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to reading from the information transfer buffer in non-DMA mode.
- http://www.openwall.com/lists/oss-security/2016/06/02/2
- http://www.openwall.com/lists/oss-security/2016/06/02/9
- http://www.securityfocus.com/bid/90995
- http://www.ubuntu.com/usn/USN-3047-1
- http://www.ubuntu.com/usn/USN-3047-2
- https://bugzilla.redhat.com/show_bug.cgi?id=1341931
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg05691.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-06/msg00150.html
- https://security.gentoo.org/glsa/201609-01
- http://www.openwall.com/lists/oss-security/2016/06/02/2
- http://www.openwall.com/lists/oss-security/2016/06/02/9
- http://www.securityfocus.com/bid/90995
- http://www.ubuntu.com/usn/USN-3047-1
- http://www.ubuntu.com/usn/USN-3047-2
- https://bugzilla.redhat.com/show_bug.cgi?id=1341931
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg05691.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-06/msg00150.html
- https://security.gentoo.org/glsa/201609-01
Modified: 2025-04-12
CVE-2016-5337
The megasas_ctrl_get_info function in hw/scsi/megasas.c in QEMU allows local guest OS administrators to obtain sensitive host memory information via vectors related to reading device control information.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=844864fbae66935951529408831c2f22367a57b6
- http://www.openwall.com/lists/oss-security/2016/06/08/13
- http://www.openwall.com/lists/oss-security/2016/06/08/3
- http://www.securityfocus.com/bid/91097
- http://www.ubuntu.com/usn/USN-3047-1
- http://www.ubuntu.com/usn/USN-3047-2
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-06/msg01969.html
- https://security.gentoo.org/glsa/201609-01
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=844864fbae66935951529408831c2f22367a57b6
- http://www.openwall.com/lists/oss-security/2016/06/08/13
- http://www.openwall.com/lists/oss-security/2016/06/08/3
- http://www.securityfocus.com/bid/91097
- http://www.ubuntu.com/usn/USN-3047-1
- http://www.ubuntu.com/usn/USN-3047-2
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-06/msg01969.html
- https://security.gentoo.org/glsa/201609-01
Modified: 2025-04-12
CVE-2016-5338
The (1) esp_reg_read and (2) esp_reg_write functions in hw/scsi/esp.c in QEMU allow local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the QEMU host via vectors related to the information transfer buffer.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=ff589551c8e8e9e95e211b9d8daafb4ed39f1aec
- http://www.openwall.com/lists/oss-security/2016/06/07/3
- http://www.openwall.com/lists/oss-security/2016/06/08/14
- http://www.securityfocus.com/bid/91079
- http://www.ubuntu.com/usn/USN-3047-1
- http://www.ubuntu.com/usn/USN-3047-2
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-06/msg01507.html
- https://security.gentoo.org/glsa/201609-01
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=ff589551c8e8e9e95e211b9d8daafb4ed39f1aec
- http://www.openwall.com/lists/oss-security/2016/06/07/3
- http://www.openwall.com/lists/oss-security/2016/06/08/14
- http://www.securityfocus.com/bid/91079
- http://www.ubuntu.com/usn/USN-3047-1
- http://www.ubuntu.com/usn/USN-3047-2
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-06/msg01507.html
- https://security.gentoo.org/glsa/201609-01
Modified: 2025-04-12
CVE-2016-6351
The esp_do_dma function in hw/scsi/esp.c in QEMU (aka Quick Emulator), when built with ESP/NCR53C9x controller emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or execute arbitrary code on the QEMU host via vectors involving DMA read into ESP command buffer.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=926cde5f3e4d2504ed161ed0cb771ac7cad6fd11
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=cc96677469388bad3d66479379735cf75db069e3
- http://www.openwall.com/lists/oss-security/2016/07/25/14
- http://www.openwall.com/lists/oss-security/2016/07/26/7
- http://www.securityfocus.com/bid/92119
- http://www.ubuntu.com/usn/USN-3047-1
- http://www.ubuntu.com/usn/USN-3047-2
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=926cde5f3e4d2504ed161ed0cb771ac7cad6fd11
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=cc96677469388bad3d66479379735cf75db069e3
- http://www.openwall.com/lists/oss-security/2016/07/25/14
- http://www.openwall.com/lists/oss-security/2016/07/26/7
- http://www.securityfocus.com/bid/92119
- http://www.ubuntu.com/usn/USN-3047-1
- http://www.ubuntu.com/usn/USN-3047-2
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
Modified: 2025-04-12
CVE-2016-6490
The virtqueue_map_desc function in hw/virtio/virtio.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a zero length for the descriptor buffer.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=1e7aed70144b4673fc26e73062064b6724795e5f
- http://www.openwall.com/lists/oss-security/2016/07/28/4
- http://www.openwall.com/lists/oss-security/2016/07/28/9
- https://lists.gnu.org/archive/html/qemu-devel/2016-07/msg06246.html
- https://security.gentoo.org/glsa/201609-01
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=1e7aed70144b4673fc26e73062064b6724795e5f
- http://www.openwall.com/lists/oss-security/2016/07/28/4
- http://www.openwall.com/lists/oss-security/2016/07/28/9
- https://lists.gnu.org/archive/html/qemu-devel/2016-07/msg06246.html
- https://security.gentoo.org/glsa/201609-01
Modified: 2025-04-12
CVE-2016-6833
Use-after-free vulnerability in the vmxnet3_io_bar0_write function in hw/net/vmxnet3.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (QEMU instance crash) by leveraging failure to check if the device is active.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=6c352ca9b4ee3e1e286ea9e8434bd8e69ac7d0d8
- http://www.openwall.com/lists/oss-security/2016/08/12/1
- http://www.openwall.com/lists/oss-security/2016/08/18/3
- http://www.securityfocus.com/bid/93255
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg01602.html
- https://security.gentoo.org/glsa/201609-01
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=6c352ca9b4ee3e1e286ea9e8434bd8e69ac7d0d8
- http://www.openwall.com/lists/oss-security/2016/08/12/1
- http://www.openwall.com/lists/oss-security/2016/08/18/3
- http://www.securityfocus.com/bid/93255
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg01602.html
- https://security.gentoo.org/glsa/201609-01
Modified: 2025-04-12
CVE-2016-6834
The net_tx_pkt_do_sw_fragmentation function in hw/net/net_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a zero length for the current fragment length.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=ead315e43ea0c2ca3491209c6c8db8ce3f2bbe05
- http://www.openwall.com/lists/oss-security/2016/08/11/8
- http://www.openwall.com/lists/oss-security/2016/08/18/7
- http://www.securityfocus.com/bid/92446
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg01601.html
- https://security.gentoo.org/glsa/201609-01
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=ead315e43ea0c2ca3491209c6c8db8ce3f2bbe05
- http://www.openwall.com/lists/oss-security/2016/08/11/8
- http://www.openwall.com/lists/oss-security/2016/08/18/7
- http://www.securityfocus.com/bid/92446
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg01601.html
- https://security.gentoo.org/glsa/201609-01
Modified: 2025-04-12
CVE-2016-6836
The vmxnet3_complete_packet function in hw/net/vmxnet3.c in QEMU (aka Quick Emulator) allows local guest OS administrators to obtain sensitive host memory information by leveraging failure to initialize the txcq_descr object.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=fdda170e50b8af062cf5741e12c4fb5e57a2eacf
- http://www.openwall.com/lists/oss-security/2016/08/11/5
- http://www.openwall.com/lists/oss-security/2016/08/18/5
- http://www.securityfocus.com/bid/92444
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg02108.html
- https://security.gentoo.org/glsa/201609-01
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=fdda170e50b8af062cf5741e12c4fb5e57a2eacf
- http://www.openwall.com/lists/oss-security/2016/08/11/5
- http://www.openwall.com/lists/oss-security/2016/08/18/5
- http://www.securityfocus.com/bid/92444
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg02108.html
- https://security.gentoo.org/glsa/201609-01
Modified: 2025-04-12
CVE-2016-6888
Integer overflow in the net_tx_pkt_init function in hw/net/net_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (QEMU process crash) via the maximum fragmentation count, which triggers an unchecked multiplication and NULL pointer dereference.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=47882fa4975bf0b58dd74474329fdd7154e8f04c
- http://www.openwall.com/lists/oss-security/2016/08/19/10
- http://www.openwall.com/lists/oss-security/2016/08/19/6
- http://www.securityfocus.com/bid/92556
- https://access.redhat.com/errata/RHSA-2017:2392
- https://access.redhat.com/errata/RHSA-2017:2408
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg03176.html
- https://security.gentoo.org/glsa/201609-01
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=47882fa4975bf0b58dd74474329fdd7154e8f04c
- http://www.openwall.com/lists/oss-security/2016/08/19/10
- http://www.openwall.com/lists/oss-security/2016/08/19/6
- http://www.securityfocus.com/bid/92556
- https://access.redhat.com/errata/RHSA-2017:2392
- https://access.redhat.com/errata/RHSA-2017:2408
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg03176.html
- https://security.gentoo.org/glsa/201609-01
Modified: 2025-04-12
CVE-2016-7116
Directory traversal vulnerability in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to access host files outside the export path via a .. (dot dot) in an unspecified string.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=56f101ecce0eafd09e2daf1c4eeb1377d6959261
- http://www.openwall.com/lists/oss-security/2016/08/30/1
- http://www.openwall.com/lists/oss-security/2016/08/30/3
- http://www.securityfocus.com/bid/92680
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg03917.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg04231.html
- https://security.gentoo.org/glsa/201609-01
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=56f101ecce0eafd09e2daf1c4eeb1377d6959261
- http://www.openwall.com/lists/oss-security/2016/08/30/1
- http://www.openwall.com/lists/oss-security/2016/08/30/3
- http://www.securityfocus.com/bid/92680
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg03917.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg04231.html
- https://security.gentoo.org/glsa/201609-01
Modified: 2025-04-12
CVE-2016-7155
hw/scsi/vmw_pvscsi.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (out-of-bounds access or infinite loop, and QEMU process crash) via a crafted page count for descriptor rings.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=7f61f4690dd153be98900a2a508b88989e692753
- http://www.openwall.com/lists/oss-security/2016/09/06/2
- http://www.openwall.com/lists/oss-security/2016/09/07/1
- http://www.securityfocus.com/bid/92772
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-09/msg00050.html
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=7f61f4690dd153be98900a2a508b88989e692753
- http://www.openwall.com/lists/oss-security/2016/09/06/2
- http://www.openwall.com/lists/oss-security/2016/09/07/1
- http://www.securityfocus.com/bid/92772
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-09/msg00050.html
Modified: 2025-04-12
CVE-2016-7156
The pvscsi_convert_sglist function in hw/scsi/vmw_pvscsi.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by leveraging an incorrect cast.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=49adc5d3f8c6bb75e55ebfeab109c5c37dea65e8
- http://www.openwall.com/lists/oss-security/2016/09/06/3
- http://www.openwall.com/lists/oss-security/2016/09/07/2
- http://www.securityfocus.com/bid/92774
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-09/msg00772.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-09/msg01246.html
- https://security.gentoo.org/glsa/201609-01
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=49adc5d3f8c6bb75e55ebfeab109c5c37dea65e8
- http://www.openwall.com/lists/oss-security/2016/09/06/3
- http://www.openwall.com/lists/oss-security/2016/09/07/2
- http://www.securityfocus.com/bid/92774
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-09/msg00772.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-09/msg01246.html
- https://security.gentoo.org/glsa/201609-01
Modified: 2025-04-12
CVE-2016-7157
The (1) mptsas_config_manufacturing_1 and (2) mptsas_config_ioc_0 functions in hw/scsi/mptconfig.c in QEMU (aka Quick Emulator) allow local guest OS administrators to cause a denial of service (QEMU process crash) via vectors involving MPTSAS_CONFIG_PACK.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=65a8e1f6413a0f6f79894da710b5d6d43361d27d
- http://www.openwall.com/lists/oss-security/2016/09/06/4
- http://www.openwall.com/lists/oss-security/2016/09/07/3
- http://www.securityfocus.com/bid/92775
- https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg04295.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg04296.html
- https://security.gentoo.org/glsa/201609-01
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=65a8e1f6413a0f6f79894da710b5d6d43361d27d
- http://www.openwall.com/lists/oss-security/2016/09/06/4
- http://www.openwall.com/lists/oss-security/2016/09/07/3
- http://www.securityfocus.com/bid/92775
- https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg04295.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg04296.html
- https://security.gentoo.org/glsa/201609-01
Modified: 2025-04-12
CVE-2016-7161
Heap-based buffer overflow in the .receive callback of xlnx.xps-ethernetlite in QEMU (aka Quick Emulator) allows attackers to execute arbitrary code on the QEMU host via a large ethlite packet.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=a0d1cbdacff5df4ded16b753b38fdd9da6092968
- http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html
- http://www.openwall.com/lists/oss-security/2016/09/23/6
- http://www.openwall.com/lists/oss-security/2016/09/23/8
- http://www.securityfocus.com/bid/93141
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg01598.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg01877.html
- https://security.gentoo.org/glsa/201611-11
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=a0d1cbdacff5df4ded16b753b38fdd9da6092968
- http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html
- http://www.openwall.com/lists/oss-security/2016/09/23/6
- http://www.openwall.com/lists/oss-security/2016/09/23/8
- http://www.securityfocus.com/bid/93141
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg01598.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg01877.html
- https://security.gentoo.org/glsa/201611-11
Modified: 2025-04-12
CVE-2016-7170
The vmsvga_fifo_run function in hw/display/vmware_vga.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to cursor.mask[] and cursor.image[] array sizes when processing a DEFINE_CURSOR svga command.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=167d97a3def77ee2dbf6e908b0ecbfe2103977db
- http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html
- http://www.openwall.com/lists/oss-security/2016/09/09/4
- http://www.openwall.com/lists/oss-security/2016/09/09/7
- http://www.securityfocus.com/bid/92904
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-09/msg01764.html
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=167d97a3def77ee2dbf6e908b0ecbfe2103977db
- http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html
- http://www.openwall.com/lists/oss-security/2016/09/09/4
- http://www.openwall.com/lists/oss-security/2016/09/09/7
- http://www.securityfocus.com/bid/92904
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-09/msg01764.html
Modified: 2025-04-12
CVE-2016-7421
The pvscsi_ring_pop_req_descr function in hw/scsi/vmw_pvscsi.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by leveraging failure to limit process IO loop to the ring size.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=d251157ac1928191af851d199a9ff255d330bec9
- http://www.openwall.com/lists/oss-security/2016/09/16/3
- http://www.openwall.com/lists/oss-security/2016/09/16/9
- http://www.securityfocus.com/bid/92998
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-09/msg03609.html
- https://security.gentoo.org/glsa/201609-01
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=d251157ac1928191af851d199a9ff255d330bec9
- http://www.openwall.com/lists/oss-security/2016/09/16/3
- http://www.openwall.com/lists/oss-security/2016/09/16/9
- http://www.securityfocus.com/bid/92998
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-09/msg03609.html
- https://security.gentoo.org/glsa/201609-01
Modified: 2025-04-12
CVE-2016-7422
The virtqueue_map_desc function in hw/virtio/virtio.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via a large I/O descriptor buffer length value.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=973e7170dddefb491a48df5cba33b2ae151013a0
- http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html
- http://www.openwall.com/lists/oss-security/2016/09/16/10
- http://www.openwall.com/lists/oss-security/2016/09/16/4
- http://www.securityfocus.com/bid/92996
- https://access.redhat.com/errata/RHSA-2017:2392
- https://access.redhat.com/errata/RHSA-2017:2408
- https://lists.gnu.org/archive/html/qemu-devel/2016-09/msg03546.html
- https://security.gentoo.org/glsa/201609-01
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=973e7170dddefb491a48df5cba33b2ae151013a0
- http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html
- http://www.openwall.com/lists/oss-security/2016/09/16/10
- http://www.openwall.com/lists/oss-security/2016/09/16/4
- http://www.securityfocus.com/bid/92996
- https://access.redhat.com/errata/RHSA-2017:2392
- https://access.redhat.com/errata/RHSA-2017:2408
- https://lists.gnu.org/archive/html/qemu-devel/2016-09/msg03546.html
- https://security.gentoo.org/glsa/201609-01
Modified: 2025-04-12
CVE-2016-7423
The mptsas_process_scsi_io_request function in QEMU (aka Quick Emulator), when built with LSI SAS1068 Host Bus emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors involving MPTSASRequest objects.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=670e56d3ed2918b3861d9216f2c0540d9e9ae0d5
- http://www.openwall.com/lists/oss-security/2016/09/16/11
- http://www.openwall.com/lists/oss-security/2016/09/16/5
- http://www.securityfocus.com/bid/92997
- https://bugzilla.redhat.com/show_bug.cgi?id=1376776
- https://lists.gnu.org/archive/html/qemu-devel/2016-09/msg03604.html
- https://security.gentoo.org/glsa/201611-11
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=670e56d3ed2918b3861d9216f2c0540d9e9ae0d5
- http://www.openwall.com/lists/oss-security/2016/09/16/11
- http://www.openwall.com/lists/oss-security/2016/09/16/5
- http://www.securityfocus.com/bid/92997
- https://bugzilla.redhat.com/show_bug.cgi?id=1376776
- https://lists.gnu.org/archive/html/qemu-devel/2016-09/msg03604.html
- https://security.gentoo.org/glsa/201611-11
Modified: 2025-04-12
CVE-2016-7466
Memory leak in the usb_xhci_exit function in hw/usb/hcd-xhci.c in QEMU (aka Quick Emulator), when the xhci uses msix, allows local guest OS administrators to cause a denial of service (memory consumption and possibly QEMU process crash) by repeatedly unplugging a USB device.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=b53dd4495ced2432a0b652ea895e651d07336f7e
- http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html
- http://www.openwall.com/lists/oss-security/2016/09/19/8
- http://www.openwall.com/lists/oss-security/2016/09/20/3
- http://www.securityfocus.com/bid/93029
- https://access.redhat.com/errata/RHSA-2017:2392
- https://access.redhat.com/errata/RHSA-2017:2408
- https://lists.gnu.org/archive/html/qemu-devel/2016-09/msg02773.html
- https://security.gentoo.org/glsa/201611-11
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=b53dd4495ced2432a0b652ea895e651d07336f7e
- http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html
- http://www.openwall.com/lists/oss-security/2016/09/19/8
- http://www.openwall.com/lists/oss-security/2016/09/20/3
- http://www.securityfocus.com/bid/93029
- https://access.redhat.com/errata/RHSA-2017:2392
- https://access.redhat.com/errata/RHSA-2017:2408
- https://lists.gnu.org/archive/html/qemu-devel/2016-09/msg02773.html
- https://security.gentoo.org/glsa/201611-11
Modified: 2025-04-12
CVE-2016-7908
The mcf_fec_do_tx function in hw/net/mcf_fec.c in QEMU (aka Quick Emulator) does not properly limit the buffer descriptor count when transmitting packets, which allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via vectors involving a buffer descriptor with a length of 0 and crafted values in bd.flags.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=070c4b92b8cd5390889716677a0b92444d6e087a
- http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html
- http://www.openwall.com/lists/oss-security/2016/10/03/2
- http://www.openwall.com/lists/oss-security/2016/10/03/5
- http://www.securityfocus.com/bid/93273
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-09/msg05557.html
- https://security.gentoo.org/glsa/201611-11
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=070c4b92b8cd5390889716677a0b92444d6e087a
- http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html
- http://www.openwall.com/lists/oss-security/2016/10/03/2
- http://www.openwall.com/lists/oss-security/2016/10/03/5
- http://www.securityfocus.com/bid/93273
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-09/msg05557.html
- https://security.gentoo.org/glsa/201611-11
Modified: 2025-04-12
CVE-2016-7909
The pcnet_rdra_addr function in hw/net/pcnet.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by setting the (1) receive or (2) transmit descriptor ring length to 0.
- http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html
- http://www.openwall.com/lists/oss-security/2016/10/03/3
- http://www.openwall.com/lists/oss-security/2016/10/03/6
- http://www.securityfocus.com/bid/93275
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-09/msg07942.html
- https://security.gentoo.org/glsa/201611-11
- http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html
- http://www.openwall.com/lists/oss-security/2016/10/03/3
- http://www.openwall.com/lists/oss-security/2016/10/03/6
- http://www.securityfocus.com/bid/93275
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-09/msg07942.html
- https://security.gentoo.org/glsa/201611-11
Modified: 2025-04-12
CVE-2016-7994
Memory leak in the virtio_gpu_resource_create_2d function in hw/display/virtio-gpu.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via a large number of VIRTIO_GPU_CMD_RESOURCE_CREATE_2D commands.
- http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html
- http://www.openwall.com/lists/oss-security/2016/10/07/2
- http://www.openwall.com/lists/oss-security/2016/10/08/3
- http://www.securityfocus.com/bid/93453
- https://lists.gnu.org/archive/html/qemu-devel/2016-09/msg04083.html
- https://security.gentoo.org/glsa/201611-11
- http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html
- http://www.openwall.com/lists/oss-security/2016/10/07/2
- http://www.openwall.com/lists/oss-security/2016/10/08/3
- http://www.securityfocus.com/bid/93453
- https://lists.gnu.org/archive/html/qemu-devel/2016-09/msg04083.html
- https://security.gentoo.org/glsa/201611-11
Modified: 2025-04-12
CVE-2016-7995
Memory leak in the ehci_process_itd function in hw/usb/hcd-ehci.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via a large number of crafted buffer page select (PG) indexes.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=b16c129daf0fed91febbb88de23dae8271c8898a
- http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html
- http://www.openwall.com/lists/oss-security/2016/10/07/3
- http://www.openwall.com/lists/oss-security/2016/10/08/4
- http://www.securityfocus.com/bid/93454
- https://lists.gnu.org/archive/html/qemu-devel/2016-09/msg06609.html
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=b16c129daf0fed91febbb88de23dae8271c8898a
- http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html
- http://www.openwall.com/lists/oss-security/2016/10/07/3
- http://www.openwall.com/lists/oss-security/2016/10/08/4
- http://www.securityfocus.com/bid/93454
- https://lists.gnu.org/archive/html/qemu-devel/2016-09/msg06609.html
Modified: 2025-04-12
CVE-2016-8576
The xhci_ring_fetch function in hw/usb/hcd-xhci.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by leveraging failure to limit the number of link Transfer Request Blocks (TRB) to process.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=05f43d44e4bc26611ce25fd7d726e483f73363ce
- http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html
- http://www.openwall.com/lists/oss-security/2016/10/10/12
- http://www.openwall.com/lists/oss-security/2016/10/10/6
- http://www.securityfocus.com/bid/93469
- https://access.redhat.com/errata/RHSA-2017:2392
- https://access.redhat.com/errata/RHSA-2017:2408
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-10/msg01265.html
- https://security.gentoo.org/glsa/201611-11
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=05f43d44e4bc26611ce25fd7d726e483f73363ce
- http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html
- http://www.openwall.com/lists/oss-security/2016/10/10/12
- http://www.openwall.com/lists/oss-security/2016/10/10/6
- http://www.securityfocus.com/bid/93469
- https://access.redhat.com/errata/RHSA-2017:2392
- https://access.redhat.com/errata/RHSA-2017:2408
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-10/msg01265.html
- https://security.gentoo.org/glsa/201611-11
Modified: 2025-04-12
CVE-2016-8577
Memory leak in the v9fs_read function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via vectors related to an I/O read operation.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=e95c9a493a5a8d6f969e86c9f19f80ffe6587e19
- http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html
- http://www.openwall.com/lists/oss-security/2016/10/10/13
- http://www.openwall.com/lists/oss-security/2016/10/10/7
- http://www.securityfocus.com/bid/93473
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://security.gentoo.org/glsa/201611-11
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=e95c9a493a5a8d6f969e86c9f19f80ffe6587e19
- http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html
- http://www.openwall.com/lists/oss-security/2016/10/10/13
- http://www.openwall.com/lists/oss-security/2016/10/10/7
- http://www.securityfocus.com/bid/93473
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://security.gentoo.org/glsa/201611-11
Modified: 2025-04-12
CVE-2016-8578
The v9fs_iov_vunmarshal function in fsdev/9p-iov-marshal.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) by sending an empty string parameter to a 9P operation.
- http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html
- http://www.openwall.com/lists/oss-security/2016/10/10/14
- http://www.openwall.com/lists/oss-security/2016/10/10/8
- http://www.securityfocus.com/bid/93474
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-09/msg07143.html
- https://security.gentoo.org/glsa/201611-11
- http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html
- http://www.openwall.com/lists/oss-security/2016/10/10/14
- http://www.openwall.com/lists/oss-security/2016/10/10/8
- http://www.securityfocus.com/bid/93474
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-09/msg07143.html
- https://security.gentoo.org/glsa/201611-11
Modified: 2025-04-12
CVE-2016-8668
The rocker_io_writel function in hw/net/rocker/rocker.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (out-of-bounds read and QEMU process crash) by leveraging failure to limit DMA buffer size.
- http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html
- http://www.openwall.com/lists/oss-security/2016/10/14/8
- http://www.openwall.com/lists/oss-security/2016/10/15/9
- http://www.securityfocus.com/bid/93566
- https://lists.gnu.org/archive/html/qemu-devel/2016-10/msg02501.html
- https://security.gentoo.org/glsa/201611-11
- http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html
- http://www.openwall.com/lists/oss-security/2016/10/14/8
- http://www.openwall.com/lists/oss-security/2016/10/15/9
- http://www.securityfocus.com/bid/93566
- https://lists.gnu.org/archive/html/qemu-devel/2016-10/msg02501.html
- https://security.gentoo.org/glsa/201611-11
Modified: 2025-04-12
CVE-2016-8669
The serial_update_parameters function in hw/char/serial.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via vectors involving a value of divider greater than baud base.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=3592fe0c919cf27a81d8e9f9b4f269553418bb01
- http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html
- http://www.openwall.com/lists/oss-security/2016/10/14/9
- http://www.openwall.com/lists/oss-security/2016/10/15/5
- http://www.securityfocus.com/bid/93563
- https://access.redhat.com/errata/RHSA-2017:2392
- https://access.redhat.com/errata/RHSA-2017:2408
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
- https://security.gentoo.org/glsa/201611-11
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=3592fe0c919cf27a81d8e9f9b4f269553418bb01
- http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html
- http://www.openwall.com/lists/oss-security/2016/10/14/9
- http://www.openwall.com/lists/oss-security/2016/10/15/5
- http://www.securityfocus.com/bid/93563
- https://access.redhat.com/errata/RHSA-2017:2392
- https://access.redhat.com/errata/RHSA-2017:2408
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
- https://security.gentoo.org/glsa/201611-11
Modified: 2025-04-12
CVE-2016-8909
The intel_hda_xfer function in hw/audio/intel-hda.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via an entry with the same value for buffer length and pointer position.
- http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html
- http://www.openwall.com/lists/oss-security/2016/10/24/1
- http://www.openwall.com/lists/oss-security/2016/10/24/4
- http://www.securityfocus.com/bid/93842
- https://access.redhat.com/errata/RHSA-2017:2392
- https://access.redhat.com/errata/RHSA-2017:2408
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-10/msg04682.html
- https://security.gentoo.org/glsa/201611-11
- http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html
- http://www.openwall.com/lists/oss-security/2016/10/24/1
- http://www.openwall.com/lists/oss-security/2016/10/24/4
- http://www.securityfocus.com/bid/93842
- https://access.redhat.com/errata/RHSA-2017:2392
- https://access.redhat.com/errata/RHSA-2017:2408
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-10/msg04682.html
- https://security.gentoo.org/glsa/201611-11
Modified: 2025-04-12
CVE-2016-8910
The rtl8139_cplus_transmit function in hw/net/rtl8139.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) by leveraging failure to limit the ring descriptor count.
- http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html
- http://www.openwall.com/lists/oss-security/2016/10/24/2
- http://www.openwall.com/lists/oss-security/2016/10/24/5
- http://www.securityfocus.com/bid/93844
- https://access.redhat.com/errata/RHSA-2017:2392
- https://access.redhat.com/errata/RHSA-2017:2408
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-10/msg05495.html
- https://security.gentoo.org/glsa/201611-11
- http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html
- http://www.openwall.com/lists/oss-security/2016/10/24/2
- http://www.openwall.com/lists/oss-security/2016/10/24/5
- http://www.securityfocus.com/bid/93844
- https://access.redhat.com/errata/RHSA-2017:2392
- https://access.redhat.com/errata/RHSA-2017:2408
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-10/msg05495.html
- https://security.gentoo.org/glsa/201611-11
Modified: 2025-04-12
CVE-2016-9101
Memory leak in hw/net/eepro100.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by repeatedly unplugging an i8255x (PRO100) NIC device.
- http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html
- http://www.openwall.com/lists/oss-security/2016/10/27/14
- http://www.openwall.com/lists/oss-security/2016/10/30/5
- http://www.securityfocus.com/bid/93957
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-10/msg03024.html
- https://security.gentoo.org/glsa/201701-49
- http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html
- http://www.openwall.com/lists/oss-security/2016/10/27/14
- http://www.openwall.com/lists/oss-security/2016/10/30/5
- http://www.securityfocus.com/bid/93957
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-10/msg03024.html
- https://security.gentoo.org/glsa/201701-49
Modified: 2025-04-12
CVE-2016-9102
Memory leak in the v9fs_xattrcreate function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) via a large number of Txattrcreate messages with the same fid number.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=ff55e94d23ae94c8628b0115320157c763eb3e06
- http://www.openwall.com/lists/oss-security/2016/10/27/15
- http://www.openwall.com/lists/oss-security/2016/10/30/6
- http://www.securityfocus.com/bid/93962
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-10/msg01861.html
- https://security.gentoo.org/glsa/201611-11
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=ff55e94d23ae94c8628b0115320157c763eb3e06
- http://www.openwall.com/lists/oss-security/2016/10/27/15
- http://www.openwall.com/lists/oss-security/2016/10/30/6
- http://www.securityfocus.com/bid/93962
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-10/msg01861.html
- https://security.gentoo.org/glsa/201611-11
Modified: 2025-04-12
CVE-2016-9103
The v9fs_xattrcreate function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to obtain sensitive host heap memory information by reading xattribute values before writing to them.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=eb687602853b4ae656e9236ee4222609f3a6887d
- http://www.openwall.com/lists/oss-security/2016/10/28/1
- http://www.openwall.com/lists/oss-security/2016/10/30/7
- http://www.securityfocus.com/bid/93955
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-10/msg01790.html
- https://security.gentoo.org/glsa/201611-11
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=eb687602853b4ae656e9236ee4222609f3a6887d
- http://www.openwall.com/lists/oss-security/2016/10/28/1
- http://www.openwall.com/lists/oss-security/2016/10/30/7
- http://www.securityfocus.com/bid/93955
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-10/msg01790.html
- https://security.gentoo.org/glsa/201611-11
Modified: 2025-04-12
CVE-2016-9104
Multiple integer overflows in the (1) v9fs_xattr_read and (2) v9fs_xattr_write functions in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allow local guest OS administrators to cause a denial of service (QEMU process crash) via a crafted offset, which triggers an out-of-bounds access.
- http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html
- http://www.openwall.com/lists/oss-security/2016/10/28/2
- http://www.openwall.com/lists/oss-security/2016/10/30/8
- http://www.securityfocus.com/bid/93956
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-10/msg02942.html
- https://security.gentoo.org/glsa/201611-11
- http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html
- http://www.openwall.com/lists/oss-security/2016/10/28/2
- http://www.openwall.com/lists/oss-security/2016/10/30/8
- http://www.securityfocus.com/bid/93956
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-10/msg02942.html
- https://security.gentoo.org/glsa/201611-11
Modified: 2025-04-12
CVE-2016-9105
Memory leak in the v9fs_link function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via vectors involving a reference to the source fid object.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=4c1586787ff43c9acd18a56c12d720e3e6be9f7c
- http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html
- http://www.openwall.com/lists/oss-security/2016/10/28/3
- http://www.openwall.com/lists/oss-security/2016/10/30/9
- http://www.securityfocus.com/bid/93965
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-10/msg02608.html
- https://security.gentoo.org/glsa/201611-11
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=4c1586787ff43c9acd18a56c12d720e3e6be9f7c
- http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html
- http://www.openwall.com/lists/oss-security/2016/10/28/3
- http://www.openwall.com/lists/oss-security/2016/10/30/9
- http://www.securityfocus.com/bid/93965
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-10/msg02608.html
- https://security.gentoo.org/glsa/201611-11
Modified: 2025-04-12
CVE-2016-9106
Memory leak in the v9fs_write function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) by leveraging failure to free an IO vector.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=fdfcc9aeea1492f4b819a24c94dfb678145b1bf9
- http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html
- http://www.openwall.com/lists/oss-security/2016/10/28/4
- http://www.openwall.com/lists/oss-security/2016/10/30/10
- http://www.securityfocus.com/bid/93964
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-10/msg02623.html
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=fdfcc9aeea1492f4b819a24c94dfb678145b1bf9
- http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html
- http://www.openwall.com/lists/oss-security/2016/10/28/4
- http://www.openwall.com/lists/oss-security/2016/10/30/10
- http://www.securityfocus.com/bid/93964
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-10/msg02623.html
Modified: 2025-04-20
CVE-2016-9381
Race condition in QEMU in Xen allows local x86 HVM guest OS administrators to gain privileges by changing certain data on shared rings, aka a "double fetch" vulnerability.
- http://www.securityfocus.com/bid/94476
- http://www.securitytracker.com/id/1037344
- http://xenbits.xen.org/xsa/advisory-197.html
- https://security.gentoo.org/glsa/201612-56
- https://support.citrix.com/article/CTX218775
- http://www.securityfocus.com/bid/94476
- http://www.securitytracker.com/id/1037344
- http://xenbits.xen.org/xsa/advisory-197.html
- https://security.gentoo.org/glsa/201612-56
- https://support.citrix.com/article/CTX218775
Modified: 2025-04-12
CVE-2016-9776
QEMU (aka Quick Emulator) built with the ColdFire Fast Ethernet Controller emulator support is vulnerable to an infinite loop issue. It could occur while receiving packets in 'mcf_fec_receive'. A privileged user/process inside guest could use this issue to crash the QEMU process on the host leading to DoS.
- http://www.openwall.com/lists/oss-security/2016/12/02/3
- http://www.openwall.com/lists/oss-security/2016/12/02/8
- http://www.securityfocus.com/bid/94638
- https://bugzilla.redhat.com/show_bug.cgi?id=1400829
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-11/msg05324.html
- https://security.gentoo.org/glsa/201701-49
- http://www.openwall.com/lists/oss-security/2016/12/02/3
- http://www.openwall.com/lists/oss-security/2016/12/02/8
- http://www.securityfocus.com/bid/94638
- https://bugzilla.redhat.com/show_bug.cgi?id=1400829
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-11/msg05324.html
- https://security.gentoo.org/glsa/201701-49
Modified: 2025-04-12
CVE-2016-9845
QEMU (aka Quick Emulator) built with the Virtio GPU Device emulator support is vulnerable to an information leakage issue. It could occur while processing 'VIRTIO_GPU_CMD_GET_CAPSET_INFO' command. A guest user/process could use this flaw to leak contents of the host memory bytes.
- http://www.openwall.com/lists/oss-security/2016/12/05/15
- http://www.openwall.com/lists/oss-security/2016/12/05/22
- http://www.securityfocus.com/bid/94763
- https://lists.nongnu.org/archive/html/qemu-devel/2016-11/msg00019.html
- https://security.gentoo.org/glsa/201701-49
- http://www.openwall.com/lists/oss-security/2016/12/05/15
- http://www.openwall.com/lists/oss-security/2016/12/05/22
- http://www.securityfocus.com/bid/94763
- https://lists.nongnu.org/archive/html/qemu-devel/2016-11/msg00019.html
- https://security.gentoo.org/glsa/201701-49
Modified: 2025-04-12
CVE-2016-9846
QEMU (aka Quick Emulator) built with the Virtio GPU Device emulator support is vulnerable to a memory leakage issue. It could occur while updating the cursor data in update_cursor_data_virgl. A guest user/process could use this flaw to leak host memory bytes, resulting in DoS for a host.
- http://www.openwall.com/lists/oss-security/2016/12/05/18
- http://www.openwall.com/lists/oss-security/2016/12/05/23
- http://www.securityfocus.com/bid/94765
- https://lists.gnu.org/archive/html/qemu-devel/2016-11/msg00029.html
- https://security.gentoo.org/glsa/201701-49
- http://www.openwall.com/lists/oss-security/2016/12/05/18
- http://www.openwall.com/lists/oss-security/2016/12/05/23
- http://www.securityfocus.com/bid/94765
- https://lists.gnu.org/archive/html/qemu-devel/2016-11/msg00029.html
- https://security.gentoo.org/glsa/201701-49
Modified: 2025-04-12
CVE-2016-9907
Quick Emulator (Qemu) built with the USB redirector usb-guest support is vulnerable to a memory leakage flaw. It could occur while destroying the USB redirector in 'usbredir_handle_destroy'. A guest user/process could use this issue to leak host memory, resulting in DoS for a host.
- http://www.openwall.com/lists/oss-security/2016/12/08/3
- http://www.securityfocus.com/bid/94759
- https://access.redhat.com/errata/RHSA-2017:2392
- https://access.redhat.com/errata/RHSA-2017:2408
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
- https://security.gentoo.org/glsa/201701-49
- http://www.openwall.com/lists/oss-security/2016/12/08/3
- http://www.securityfocus.com/bid/94759
- https://access.redhat.com/errata/RHSA-2017:2392
- https://access.redhat.com/errata/RHSA-2017:2408
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
- https://security.gentoo.org/glsa/201701-49
Modified: 2025-04-12
CVE-2016-9911
Quick Emulator (Qemu) built with the USB EHCI Emulation support is vulnerable to a memory leakage issue. It could occur while processing packet data in 'ehci_init_transfer'. A guest user/process could use this issue to leak host memory, resulting in DoS for a host.
- http://www.openwall.com/lists/oss-security/2016/12/08/5
- http://www.securityfocus.com/bid/94762
- https://access.redhat.com/errata/RHSA-2017:2392
- https://access.redhat.com/errata/RHSA-2017:2408
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
- https://security.gentoo.org/glsa/201701-49
- http://www.openwall.com/lists/oss-security/2016/12/08/5
- http://www.securityfocus.com/bid/94762
- https://access.redhat.com/errata/RHSA-2017:2392
- https://access.redhat.com/errata/RHSA-2017:2408
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
- https://security.gentoo.org/glsa/201701-49
Modified: 2025-04-12
CVE-2016-9913
Memory leak in the v9fs_device_unrealize_common function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local privileged guest OS users to cause a denial of service (host memory consumption and possibly QEMU process crash) via vectors involving the order of resource cleanup.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=4774718e5c194026ba5ee7a28d9be49be3080e42
- http://www.openwall.com/lists/oss-security/2016/12/06/11
- http://www.openwall.com/lists/oss-security/2016/12/08/7
- http://www.securityfocus.com/bid/94729
- https://lists.gnu.org/archive/html/qemu-devel/2016-11/msg03278.html
- https://security.gentoo.org/glsa/201701-49
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=4774718e5c194026ba5ee7a28d9be49be3080e42
- http://www.openwall.com/lists/oss-security/2016/12/06/11
- http://www.openwall.com/lists/oss-security/2016/12/08/7
- http://www.securityfocus.com/bid/94729
- https://lists.gnu.org/archive/html/qemu-devel/2016-11/msg03278.html
- https://security.gentoo.org/glsa/201701-49
Modified: 2025-04-12
CVE-2016-9914
Memory leak in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local privileged guest OS users to cause a denial of service (host memory consumption and possibly QEMU process crash) by leveraging a missing cleanup operation in FileOperations.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=702dbcc274e2ca43be20ba64c758c0ca57dab91d
- http://www.openwall.com/lists/oss-security/2016/12/06/11
- http://www.openwall.com/lists/oss-security/2016/12/08/7
- http://www.securityfocus.com/bid/94729
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-11/msg03278.html
- https://security.gentoo.org/glsa/201701-49
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=702dbcc274e2ca43be20ba64c758c0ca57dab91d
- http://www.openwall.com/lists/oss-security/2016/12/06/11
- http://www.openwall.com/lists/oss-security/2016/12/08/7
- http://www.securityfocus.com/bid/94729
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-11/msg03278.html
- https://security.gentoo.org/glsa/201701-49
Modified: 2025-04-12
CVE-2016-9915
Memory leak in hw/9pfs/9p-handle.c in QEMU (aka Quick Emulator) allows local privileged guest OS users to cause a denial of service (host memory consumption and possibly QEMU process crash) by leveraging a missing cleanup operation in the handle backend.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=971f406b77a6eb84e0ad27dcc416b663765aee30
- http://www.openwall.com/lists/oss-security/2016/12/06/11
- http://www.openwall.com/lists/oss-security/2016/12/08/7
- http://www.securityfocus.com/bid/94729
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-11/msg03278.html
- https://security.gentoo.org/glsa/201701-49
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=971f406b77a6eb84e0ad27dcc416b663765aee30
- http://www.openwall.com/lists/oss-security/2016/12/06/11
- http://www.openwall.com/lists/oss-security/2016/12/08/7
- http://www.securityfocus.com/bid/94729
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-11/msg03278.html
- https://security.gentoo.org/glsa/201701-49
Modified: 2025-04-12
CVE-2016-9916
Memory leak in hw/9pfs/9p-proxy.c in QEMU (aka Quick Emulator) allows local privileged guest OS users to cause a denial of service (host memory consumption and possibly QEMU process crash) by leveraging a missing cleanup operation in the proxy backend.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=898ae90a44551d25b8e956fd87372d303c82fe68
- http://www.openwall.com/lists/oss-security/2016/12/06/11
- http://www.openwall.com/lists/oss-security/2016/12/08/7
- http://www.securityfocus.com/bid/94729
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-11/msg03278.html
- https://security.gentoo.org/glsa/201701-49
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=898ae90a44551d25b8e956fd87372d303c82fe68
- http://www.openwall.com/lists/oss-security/2016/12/06/11
- http://www.openwall.com/lists/oss-security/2016/12/08/7
- http://www.securityfocus.com/bid/94729
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-11/msg03278.html
- https://security.gentoo.org/glsa/201701-49
Modified: 2025-04-12
CVE-2016-9921
Quick emulator (Qemu) built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to a divide by zero issue. It could occur while copying VGA data when cirrus graphics mode was set to be VGA. A privileged user inside guest could use this flaw to crash the Qemu process instance on the host, resulting in DoS.
- http://www.openwall.com/lists/oss-security/2016/12/09/1
- http://www.securityfocus.com/bid/94803
- https://access.redhat.com/errata/RHSA-2017:2392
- https://access.redhat.com/errata/RHSA-2017:2408
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
- https://security.gentoo.org/glsa/201701-49
- http://www.openwall.com/lists/oss-security/2016/12/09/1
- http://www.securityfocus.com/bid/94803
- https://access.redhat.com/errata/RHSA-2017:2392
- https://access.redhat.com/errata/RHSA-2017:2408
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
- https://security.gentoo.org/glsa/201701-49
Modified: 2025-04-20
CVE-2016-9922
The cirrus_do_copy function in hw/display/cirrus_vga.c in QEMU (aka Quick Emulator), when cirrus graphics mode is VGA, allows local guest OS privileged users to cause a denial of service (divide-by-zero error and QEMU process crash) via vectors involving blit pitch values.
- http://git.qemu-project.org/?p=qemu.git%3Ba=commit%3Bh=4299b90e9ba9ce5ca9024572804ba751aa1a7e70
- http://www.openwall.com/lists/oss-security/2016/12/09/1
- http://www.securityfocus.com/bid/94803
- https://access.redhat.com/errata/RHSA-2017:2392
- https://access.redhat.com/errata/RHSA-2017:2408
- https://bugzilla.redhat.com/show_bug.cgi?id=1334398
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-12/msg00442.html
- http://git.qemu-project.org/?p=qemu.git%3Ba=commit%3Bh=4299b90e9ba9ce5ca9024572804ba751aa1a7e70
- http://www.openwall.com/lists/oss-security/2016/12/09/1
- http://www.securityfocus.com/bid/94803
- https://access.redhat.com/errata/RHSA-2017:2392
- https://access.redhat.com/errata/RHSA-2017:2408
- https://bugzilla.redhat.com/show_bug.cgi?id=1334398
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-12/msg00442.html
Modified: 2025-04-12
CVE-2016-9923
Quick Emulator (Qemu) built with the 'chardev' backend support is vulnerable to a use after free issue. It could occur while hotplug and unplugging the device in the guest. A guest user/process could use this flaw to crash a Qemu process on the host resulting in DoS.
Modified: 2024-11-21
CVE-2017-2620
Quick emulator (QEMU) before 2.8 built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to an out-of-bounds access issue. The issue could occur while copying VGA data in cirrus_bitblt_cputovideo. A privileged user inside guest could use this flaw to crash the QEMU process OR potentially execute arbitrary code on host with privileges of the QEMU process.
- http://rhn.redhat.com/errata/RHSA-2017-0328.html
- http://rhn.redhat.com/errata/RHSA-2017-0329.html
- http://rhn.redhat.com/errata/RHSA-2017-0330.html
- http://rhn.redhat.com/errata/RHSA-2017-0331.html
- http://rhn.redhat.com/errata/RHSA-2017-0332.html
- http://rhn.redhat.com/errata/RHSA-2017-0333.html
- http://rhn.redhat.com/errata/RHSA-2017-0334.html
- http://rhn.redhat.com/errata/RHSA-2017-0350.html
- http://rhn.redhat.com/errata/RHSA-2017-0351.html
- http://rhn.redhat.com/errata/RHSA-2017-0352.html
- http://rhn.redhat.com/errata/RHSA-2017-0396.html
- http://rhn.redhat.com/errata/RHSA-2017-0454.html
- http://www.openwall.com/lists/oss-security/2017/02/21/1
- http://www.securityfocus.com/bid/96378
- http://www.securitytracker.com/id/1037870
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2620
- https://lists.debian.org/debian-lts-announce/2018/02/msg00005.html
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
- https://lists.gnu.org/archive/html/qemu-devel/2017-02/msg04700.html
- https://security.gentoo.org/glsa/201703-07
- https://security.gentoo.org/glsa/201704-01
- https://support.citrix.com/article/CTX220771
- https://xenbits.xen.org/xsa/advisory-209.html
- http://rhn.redhat.com/errata/RHSA-2017-0328.html
- http://rhn.redhat.com/errata/RHSA-2017-0329.html
- http://rhn.redhat.com/errata/RHSA-2017-0330.html
- http://rhn.redhat.com/errata/RHSA-2017-0331.html
- http://rhn.redhat.com/errata/RHSA-2017-0332.html
- http://rhn.redhat.com/errata/RHSA-2017-0333.html
- http://rhn.redhat.com/errata/RHSA-2017-0334.html
- http://rhn.redhat.com/errata/RHSA-2017-0350.html
- http://rhn.redhat.com/errata/RHSA-2017-0351.html
- http://rhn.redhat.com/errata/RHSA-2017-0352.html
- http://rhn.redhat.com/errata/RHSA-2017-0396.html
- http://rhn.redhat.com/errata/RHSA-2017-0454.html
- http://www.openwall.com/lists/oss-security/2017/02/21/1
- http://www.securityfocus.com/bid/96378
- http://www.securitytracker.com/id/1037870
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2620
- https://lists.debian.org/debian-lts-announce/2018/02/msg00005.html
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
- https://lists.gnu.org/archive/html/qemu-devel/2017-02/msg04700.html
- https://security.gentoo.org/glsa/201703-07
- https://security.gentoo.org/glsa/201704-01
- https://support.citrix.com/article/CTX220771
- https://xenbits.xen.org/xsa/advisory-209.html
Modified: 2025-04-20
CVE-2017-7980
Heap-based buffer overflow in Cirrus CLGD 54xx VGA Emulator in Quick Emulator (Qemu) 2.8 and earlier allows local guest OS users to execute arbitrary code or cause a denial of service (crash) via vectors related to a VNC client updating its display after a VGA operation.
- http://ubuntu.com/usn/usn-3289-1
- http://www.openwall.com/lists/oss-security/2017/04/21/1
- http://www.securityfocus.com/bid/102129
- http://www.securityfocus.com/bid/97955
- https://access.redhat.com/errata/RHSA-2017:0980
- https://access.redhat.com/errata/RHSA-2017:0981
- https://access.redhat.com/errata/RHSA-2017:0982
- https://access.redhat.com/errata/RHSA-2017:0983
- https://access.redhat.com/errata/RHSA-2017:0984
- https://access.redhat.com/errata/RHSA-2017:0988
- https://access.redhat.com/errata/RHSA-2017:1205
- https://access.redhat.com/errata/RHSA-2017:1206
- https://access.redhat.com/errata/RHSA-2017:1430
- https://access.redhat.com/errata/RHSA-2017:1441
- https://bugzilla.redhat.com/show_bug.cgi?id=1430056
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
- https://security.gentoo.org/glsa/201706-03
- https://support.citrix.com/article/CTX230138
- http://ubuntu.com/usn/usn-3289-1
- http://www.openwall.com/lists/oss-security/2017/04/21/1
- http://www.securityfocus.com/bid/102129
- http://www.securityfocus.com/bid/97955
- https://access.redhat.com/errata/RHSA-2017:0980
- https://access.redhat.com/errata/RHSA-2017:0981
- https://access.redhat.com/errata/RHSA-2017:0982
- https://access.redhat.com/errata/RHSA-2017:0983
- https://access.redhat.com/errata/RHSA-2017:0984
- https://access.redhat.com/errata/RHSA-2017:0988
- https://access.redhat.com/errata/RHSA-2017:1205
- https://access.redhat.com/errata/RHSA-2017:1206
- https://access.redhat.com/errata/RHSA-2017:1430
- https://access.redhat.com/errata/RHSA-2017:1441
- https://bugzilla.redhat.com/show_bug.cgi?id=1430056
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
- https://security.gentoo.org/glsa/201706-03
- https://support.citrix.com/article/CTX230138