
CVE-2016-5107 – Ubuntu Security Notice USN-3047-1
https://notcve.org/view.php?id=CVE-2016-5107
05 Aug 2016 — The megasas_lookup_frame function in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds read and crash) via unspecified vectors. La función megasas_lookup_frame en QEMU, cuando está construido con soporte de emulación MegaRAID SAS 8708EM2 Host Bus Adapter, permite a administradores locales del SO invitado provocar una denegación de servicio (lectura fuera de límites y caída) a través de vectores no e... • http://www.openwall.com/lists/oss-security/2016/05/25/7 • CWE-125: Out-of-bounds Read •

CVE-2016-5105 – Ubuntu Security Notice USN-3047-1
https://notcve.org/view.php?id=CVE-2016-5105
05 Aug 2016 — The megasas_dcmd_cfg_read function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, uses an uninitialized variable, which allows local guest administrators to read host memory via vectors involving a MegaRAID Firmware Interface (MFI) command. La función megasas_dcmd_cfg_read en hw/scsi/megasas.c en QEMU, cuando está construido con el soporte de emulación MegaRAID SAS 8708EM2 Host Bus Adapter, utiliza una variable sin inicializar, lo que permite a adminis... • http://www.openwall.com/lists/oss-security/2016/05/25/5 • CWE-908: Use of Uninitialized Resource •

CVE-2016-5106 – Ubuntu Security Notice USN-3047-1
https://notcve.org/view.php?id=CVE-2016-5106
05 Aug 2016 — The megasas_dcmd_set_properties function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allows local guest administrators to cause a denial of service (out-of-bounds write access) via vectors involving a MegaRAID Firmware Interface (MFI) command. La función megasas_dcmd_set_properties en hw/scsi/megasas.c en QEMU, cuando está construido con soporte de emulación MegaRAID SAS 8708EM2 Host Bus Adapter, permite a administradores locales invitados provocar ... • http://www.openwall.com/lists/oss-security/2016/05/25/6 • CWE-787: Out-of-bounds Write •

CVE-2016-5403 – Qemu: virtio: unbounded memory allocation on host via guest leading to DoS
https://notcve.org/view.php?id=CVE-2016-5403
02 Aug 2016 — The virtqueue_pop function in hw/virtio/virtio.c in QEMU allows local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by submitting requests without waiting for completion. La función virtqueue_pop en hw/virtio/virtio.c en QEMU permite a administradores locales del SO invitado provocar una denegación de servicio (consumo de memoria y caida del proceso QUEMU) mediante la presentación de solicitudes sin esperar la finalización. Quick Emulator (QEMU) built with ... • http://rhn.redhat.com/errata/RHSA-2016-1585.html • CWE-400: Uncontrolled Resource Consumption •

CVE-2016-5238 – Ubuntu Security Notice USN-3047-1
https://notcve.org/view.php?id=CVE-2016-5238
14 Jun 2016 — The get_cmd function in hw/scsi/esp.c in QEMU might allow local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to reading from the information transfer buffer in non-DMA mode. La función get_cmd en hw/scsi/esp.c en QEMU podría permitir a administradores locales del SO invitado provocar una denegación de servicio (escritura fuera de límites y caída del proceso QEMU) a través de vectores relacionados con la lectura del buffer de transferen... • http://www.openwall.com/lists/oss-security/2016/06/02/2 • CWE-787: Out-of-bounds Write •

CVE-2016-5338 – Ubuntu Security Notice USN-3047-1
https://notcve.org/view.php?id=CVE-2016-5338
14 Jun 2016 — The (1) esp_reg_read and (2) esp_reg_write functions in hw/scsi/esp.c in QEMU allow local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the QEMU host via vectors related to the information transfer buffer. Las funciones (1) esp_reg_read y (2) esp_reg_write en hw/scsi/esp.c en QEMU permite a administradores locales del SO invitado provocar una denegación de servicio (caída del proceso QEMU) o ejecutar código arbitrario en el anfitrión QEMU a través de ... • http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=ff589551c8e8e9e95e211b9d8daafb4ed39f1aec •

CVE-2016-5337 – Ubuntu Security Notice USN-3047-1
https://notcve.org/view.php?id=CVE-2016-5337
14 Jun 2016 — The megasas_ctrl_get_info function in hw/scsi/megasas.c in QEMU allows local guest OS administrators to obtain sensitive host memory information via vectors related to reading device control information. La función megasas_ctrl_get_info en hw/scsi/megasas.c en QEMU permite a administradores locales del SO invitado obtener información sensible de la memoria del anfitrión a través de vectores relacionados con la lectura de información de control del dispositivo. Li Qiang discovered that QEMU incorrectly handl... • http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=844864fbae66935951529408831c2f22367a57b6 •

CVE-2016-4454 – Ubuntu Security Notice USN-3047-1
https://notcve.org/view.php?id=CVE-2016-4454
01 Jun 2016 — The vmsvga_fifo_read_raw function in hw/display/vmware_vga.c in QEMU allows local guest OS administrators to obtain sensitive host memory information or cause a denial of service (QEMU process crash) by changing FIFO registers and issuing a VGA command, which triggers an out-of-bounds read. La función vmsvga_fifo_read_raw en hw/display/vmware_vga.c en QEMU permite a administradores locales del SO invitado obtener información sensible de la memoria del anfitrión o provocar una denegación de servicio (caída d... • http://www.openwall.com/lists/oss-security/2016/05/30/3 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2016-4453 – Ubuntu Security Notice USN-3047-1
https://notcve.org/view.php?id=CVE-2016-4453
01 Jun 2016 — The vmsvga_fifo_run function in hw/display/vmware_vga.c in QEMU allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a VGA command. La función vmsvga_fifo_run en hw/display/vmware_vga.c en QEMU permite a administradores locales del SO invitado provocar una denegación de servicio (bucle infinito y caída de proceso QEMU) a través de un comando VGA. Li Qiang discovered that QEMU incorrectly handled 53C9X Fast SCSI controller emulation. A privileged attack... • http://www.openwall.com/lists/oss-security/2016/05/30/2 • CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •

CVE-2016-5126 – Qemu: block: iscsi: buffer overflow in iscsi_aio_ioctl
https://notcve.org/view.php?id=CVE-2016-5126
01 Jun 2016 — Heap-based buffer overflow in the iscsi_aio_ioctl function in block/iscsi.c in QEMU allows local guest OS users to cause a denial of service (QEMU process crash) or possibly execute arbitrary code via a crafted iSCSI asynchronous I/O ioctl call. Desbordamiento de buffer basado en memoria dinámica en la función iscsi_aio_ioctl en block/iscsi.c en QEMU permite a usuarios locales del SO invitado provocar una denegación de servicio (caída del proceso QEMU) o posiblemente ejecutar código arbitrario a través de u... • http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=a6b3167fa0e825aebb5a7cd8b437b6d41584a196 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') CWE-787: Out-of-bounds Write •