ALT-PU-2017-2202-1
Closed vulnerabilities
BDU:2017-01782
Уязвимость компонента audio.c эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-01313
Уязвимость эмулятора аппаратного обеспечения QEMU, связанная с разыменованием нулевого указателя, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03352
Уязвимость функции disas_insn компонента target/i386/translate.c эмулятора аппаратного обеспечения QEMU, связанная с недостатком механизма управления генерацией кода, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2015-8345
The eepro100 emulator in QEMU qemu-kvm blank allows local guest users to cause a denial of service (application crash and infinite loop) via vectors involving the command block list.
- DSA-3469
- DSA-3469
- DSA-3470
- DSA-3470
- DSA-3471
- DSA-3471
- [oss-security] 20151125 Re: CVE request Qemu: net: eepro100: infinite loop in processing command block list
- [oss-security] 20151125 Re: CVE request Qemu: net: eepro100: infinite loop in processing command block list
- 77985
- 77985
- [qemu-devel] 20151016 [Qemu-devel] [PATCH] eepro100: prevent an infinite loop over same comman
- [qemu-devel] 20151016 [Qemu-devel] [PATCH] eepro100: prevent an infinite loop over same comman
- GLSA-201602-01
- GLSA-201602-01
Modified: 2024-11-21
CVE-2017-7718
hw/display/cirrus_vga_rop.h in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) via vectors related to copying VGA data via the cirrus_bitblt_rop_fwd_transp_ and cirrus_bitblt_rop_fwd_ functions.
- http://git.qemu-project.org/?p=qemu.git%3Ba=commit%3Bh=215902d7b6fb50c6fc216fc74f770858278ed904
- http://git.qemu-project.org/?p=qemu.git%3Ba=commit%3Bh=215902d7b6fb50c6fc216fc74f770858278ed904
- [oss-security] 20170419 CVE-2017-7718 Qemu: display: cirrus: OOB read access issue
- [oss-security] 20170419 CVE-2017-7718 Qemu: display: cirrus: OOB read access issue
- 97957
- 97957
- RHSA-2017:0980
- RHSA-2017:0980
- RHSA-2017:0981
- RHSA-2017:0981
- RHSA-2017:0982
- RHSA-2017:0982
- RHSA-2017:0983
- RHSA-2017:0983
- RHSA-2017:0984
- RHSA-2017:0984
- RHSA-2017:0988
- RHSA-2017:0988
- RHSA-2017:1205
- RHSA-2017:1205
- RHSA-2017:1206
- RHSA-2017:1206
- RHSA-2017:1430
- RHSA-2017:1430
- RHSA-2017:1431
- RHSA-2017:1431
- RHSA-2017:1441
- RHSA-2017:1441
- https://bugzilla.redhat.com/show_bug.cgi?id=1443441
- https://bugzilla.redhat.com/show_bug.cgi?id=1443441
- [debian-lts-announce] 20180906 [SECURITY] [DLA 1497-1] qemu security update
- [debian-lts-announce] 20180906 [SECURITY] [DLA 1497-1] qemu security update
- GLSA-201706-03
- GLSA-201706-03
Modified: 2024-11-21
CVE-2017-8112
hw/scsi/vmw_pvscsi.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (infinite loop and CPU consumption) via the message ring page count.
- [oss-security] 20170426 CVE-2017-8112 Qemu: scsi: vmw_pvscsi: infinite loop in pvscsi_log2
- [oss-security] 20170426 CVE-2017-8112 Qemu: scsi: vmw_pvscsi: infinite loop in pvscsi_log2
- 98015
- 98015
- https://bugzilla.redhat.com/show_bug.cgi?id=1445621
- https://bugzilla.redhat.com/show_bug.cgi?id=1445621
- [debian-lts-announce] 20180906 [SECURITY] [DLA 1497-1] qemu security update
- [debian-lts-announce] 20180906 [SECURITY] [DLA 1497-1] qemu security update
- [qemu-devel] 20170425 Re: [PATCH] vmw_pvscsi: check message ring page count at initialisation
- [qemu-devel] 20170425 Re: [PATCH] vmw_pvscsi: check message ring page count at initialisation
- GLSA-201706-03
- GLSA-201706-03
Modified: 2024-11-21
CVE-2017-8284
The disas_insn function in target/i386/translate.c in QEMU before 2.9.0, when TCG mode without hardware acceleration is used, does not limit the instruction size, which allows local users to gain privileges by creating a modified basic block that injects code into a setuid program, as demonstrated by procmail. NOTE: the vendor has stated "this bug does not violate any security guarantees QEMU makes.
Modified: 2024-11-21
CVE-2017-8309
Memory leak in the audio/audio.c in QEMU (aka Quick Emulator) allows remote attackers to cause a denial of service (memory consumption) by repeatedly starting and stopping audio capture.
- 98302
- 98302
- RHSA-2017:2408
- RHSA-2017:2408
- [debian-lts-announce] 20180906 [SECURITY] [DLA 1497-1] qemu security update
- [debian-lts-announce] 20180906 [SECURITY] [DLA 1497-1] qemu security update
- [qemu-devel] 20170428 [PATCH] audio: release capture buffers
- [qemu-devel] 20170428 [PATCH] audio: release capture buffers
- GLSA-201706-03
- GLSA-201706-03
Modified: 2024-11-21
CVE-2017-8379
Memory leak in the keyboard input event handlers support in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption) by rapidly generating large keyboard events.
- [oss-security] 20170503 CVE-2017-8379 Qemu: input: host memory lekage via keyboard
- [oss-security] 20170503 CVE-2017-8379 Qemu: input: host memory lekage via keyboard
- 98277
- 98277
- RHSA-2017:2408
- RHSA-2017:2408
- [debian-lts-announce] 20180906 [SECURITY] [DLA 1497-1] qemu security update
- [debian-lts-announce] 20180906 [SECURITY] [DLA 1497-1] qemu security update
- [qemu-devel] 20170428 [PATCH] input: limit kbd queue depth
- [qemu-devel] 20170428 [PATCH] input: limit kbd queue depth
- GLSA-201706-03
- GLSA-201706-03
Modified: 2024-11-21
CVE-2017-9330
QEMU (aka Quick Emulator) before 2.9.0, when built with the USB OHCI Emulation support, allows local guest OS users to cause a denial of service (infinite loop) by leveraging an incorrect return value, a different vulnerability than CVE-2017-6505.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=26f670a244982335cc08943fb1ec099a2c81e42d
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=26f670a244982335cc08943fb1ec099a2c81e42d
- DSA-3920
- DSA-3920
- [oss-security] 20170601 CVE-2017-9330 Qemu: usb: ohci: infinite loop due to incorrect return value
- [oss-security] 20170601 CVE-2017-9330 Qemu: usb: ohci: infinite loop due to incorrect return value
- 98779
- 98779
- https://bugzilla.redhat.com/show_bug.cgi?id=1457697
- https://bugzilla.redhat.com/show_bug.cgi?id=1457697
- [debian-lts-announce] 20180906 [SECURITY] [DLA 1497-1] qemu security update
- [debian-lts-announce] 20180906 [SECURITY] [DLA 1497-1] qemu security update
- GLSA-201706-03
- GLSA-201706-03
Modified: 2024-11-21
CVE-2017-9373
Memory leak in QEMU (aka Quick Emulator), when built with IDE AHCI Emulation support, allows local guest OS privileged users to cause a denial of service (memory consumption) by repeatedly hot-unplugging the AHCI device.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=d68f0f778e7f4fbd674627274267f269e40f0b04
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=d68f0f778e7f4fbd674627274267f269e40f0b04
- DSA-3920
- DSA-3920
- [oss-security] 20170605 CVE-2017-9373 Qemu: ide: ahci host memory leakage during hotunplug
- [oss-security] 20170605 CVE-2017-9373 Qemu: ide: ahci host memory leakage during hotunplug
- 98921
- 98921
- RHSA-2017:2392
- RHSA-2017:2392
- RHSA-2017:2408
- RHSA-2017:2408
- https://bugzilla.redhat.com/show_bug.cgi?id=1458270
- https://bugzilla.redhat.com/show_bug.cgi?id=1458270
- [debian-lts-announce] 20180906 [SECURITY] [DLA 1497-1] qemu security update
- [debian-lts-announce] 20180906 [SECURITY] [DLA 1497-1] qemu security update
Modified: 2024-11-21
CVE-2017-9374
Memory leak in QEMU (aka Quick Emulator), when built with USB EHCI Emulation support, allows local guest OS privileged users to cause a denial of service (memory consumption) by repeatedly hot-unplugging the device.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=d710e1e7bd3d5bfc26b631f02ae87901ebe646b0
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=d710e1e7bd3d5bfc26b631f02ae87901ebe646b0
- DSA-3920
- DSA-3920
- [oss-security] 20170606 CVE-2017-9374 Qemu: usb: ehci host memory leakage during hotunplug
- [oss-security] 20170606 CVE-2017-9374 Qemu: usb: ehci host memory leakage during hotunplug
- 98905
- 98905
- RHSA-2017:2392
- RHSA-2017:2392
- RHSA-2017:2408
- RHSA-2017:2408
- https://bugzilla.redhat.com/show_bug.cgi?id=1459132
- https://bugzilla.redhat.com/show_bug.cgi?id=1459132
- [debian-lts-announce] 20180906 [SECURITY] [DLA 1497-1] qemu security update
- [debian-lts-announce] 20180906 [SECURITY] [DLA 1497-1] qemu security update
Modified: 2024-11-21
CVE-2017-9375
QEMU (aka Quick Emulator), when built with USB xHCI controller emulator support, allows local guest OS privileged users to cause a denial of service (infinite recursive call) via vectors involving control transfer descriptors sequencing.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=96d87bdda3919bb16f754b3d3fd1227e1f38f13c
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=96d87bdda3919bb16f754b3d3fd1227e1f38f13c
- DSA-3991
- DSA-3991
- [oss-security] 20170605 CVE-2017-9375 Qemu: usb: xhci infinite recursive call via xhci_kick_ep
- [oss-security] 20170605 CVE-2017-9375 Qemu: usb: xhci infinite recursive call via xhci_kick_ep
- 98915
- 98915
- RHSA-2017:2392
- RHSA-2017:2392
- RHSA-2017:2408
- RHSA-2017:2408
- https://bugzilla.redhat.com/show_bug.cgi?id=1458744
- https://bugzilla.redhat.com/show_bug.cgi?id=1458744
- [debian-lts-announce] 20190920 [SECURITY] [DLA 1927-1] qemu security update
- [debian-lts-announce] 20190920 [SECURITY] [DLA 1927-1] qemu security update
Modified: 2024-11-21
CVE-2017-9503
QEMU (aka Quick Emulator), when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allows local guest OS privileged users to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors involving megasas command processing.
- [oss-security] 20170608 CVE-2017-9503 Qemu: scsi: null pointer dereference while processing megasas command
- [oss-security] 20170608 CVE-2017-9503 Qemu: scsi: null pointer dereference while processing megasas command
- 99010
- 99010
- https://bugzilla.redhat.com/show_bug.cgi?id=1459477
- https://bugzilla.redhat.com/show_bug.cgi?id=1459477
- [debian-lts-announce] 20180906 [SECURITY] [DLA 1497-1] qemu security update
- [debian-lts-announce] 20180906 [SECURITY] [DLA 1497-1] qemu security update
- [debian-lts-announce] 20200726 [SECURITY] [DLA 2288-1] qemu security update
- [debian-lts-announce] 20200726 [SECURITY] [DLA 2288-1] qemu security update
- [qemu-devel] 20170606 [PATCH 4/7] megasas: do not read DCMD opcode more than once
- [qemu-devel] 20170606 [PATCH 4/7] megasas: do not read DCMD opcode more than once
- [qemu-devel] 20170606 [PATCH 7/7] megasas: always store SCSIRequest* into Megasas
- [qemu-devel] 20170606 [PATCH 7/7] megasas: always store SCSIRequest* into Megasas