Page 32 of 344 results (0.009 seconds)

CVSS: 6.5EPSS: 0%CPEs: 4EXPL: 0

Memory leak in hw/9pfs/9p-handle.c in QEMU (aka Quick Emulator) allows local privileged guest OS users to cause a denial of service (host memory consumption and possibly QEMU process crash) by leveraging a missing cleanup operation in the handle backend. Fuga de memoria en hw/9pfs/9p-handle.c en QEMU (también conocido como Quick Emulator) permite a usuarios privilegiados locales del SO huésped provocar una denegación de servicio (consumo de memoria del host y posiblemente caída del proceso QEMU) aprovechando una operación de limpieza perdida en la backend manejada. • http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=971f406b77a6eb84e0ad27dcc416b663765aee30 http://www.openwall.com/lists/oss-security/2016/12/06/11 http://www.openwall.com/lists/oss-security/2016/12/08/7 http://www.securityfocus.com/bid/94729 https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html https://lists.gnu.org/archive/html/qemu-devel/2016-11/msg03278.html https://security.gentoo.org/glsa/201701-49 • CWE-401: Missing Release of Memory after Effective Lifetime •

CVSS: 6.5EPSS: 0%CPEs: 4EXPL: 0

QEMU (aka Quick Emulator) built with the Virtio GPU Device emulator support is vulnerable to a memory leakage issue. It could occur while updating the cursor data in update_cursor_data_virgl. A guest user/process could use this flaw to leak host memory bytes, resulting in DoS for a host. QEMU (vulnerabilidad también conocido como Quick Emulator) construido con el soporte de emulador Virtio GPU Device es vulnerable a un problema de fuga de memoria. Podría ocurrir mientras se actualizan los datos de cursor en update_cursor_data_virgl. • http://www.openwall.com/lists/oss-security/2016/12/05/18 http://www.openwall.com/lists/oss-security/2016/12/05/23 http://www.securityfocus.com/bid/94765 https://lists.gnu.org/archive/html/qemu-devel/2016-11/msg00029.html https://security.gentoo.org/glsa/201701-49 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 6.5EPSS: 0%CPEs: 4EXPL: 0

QEMU (aka Quick Emulator) built with the Virtio GPU Device emulator support is vulnerable to an information leakage issue. It could occur while processing 'VIRTIO_GPU_CMD_GET_CAPSET_INFO' command. A guest user/process could use this flaw to leak contents of the host memory bytes. QEMU (vulnerabilidad también conocido como Quick Emulator) construida con el soporte de emulador Virtio GPU Device es vulnerable a un problema de fuga de información. Podría ocurrir mientras se procesa el comando 'VIRTIO_GPU_CMD_GET_CAPSET_INFO'. • http://www.openwall.com/lists/oss-security/2016/12/05/15 http://www.openwall.com/lists/oss-security/2016/12/05/22 http://www.securityfocus.com/bid/94763 https://lists.nongnu.org/archive/html/qemu-devel/2016-11/msg00019.html https://security.gentoo.org/glsa/201701-49 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 6.5EPSS: 0%CPEs: 4EXPL: 0

Memory leak in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local privileged guest OS users to cause a denial of service (host memory consumption and possibly QEMU process crash) by leveraging a missing cleanup operation in FileOperations. Fuga de memoria en hw/9pfs/9p.c en QEMU (también conocido como Quick Emulator) permite a usuarios locales privilegiados del SO huésped provocar una denegación de servicio (consumo de memoria del host y posiblemente caída de proceso QEMU) aprovechando una operación de limpieza perdida en FileOperations. • http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=702dbcc274e2ca43be20ba64c758c0ca57dab91d http://www.openwall.com/lists/oss-security/2016/12/06/11 http://www.openwall.com/lists/oss-security/2016/12/08/7 http://www.securityfocus.com/bid/94729 https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html https://lists.gnu.org/archive/html/qemu-devel/2016-11/msg03278.html https://security.gentoo.org/glsa/201701-49 • CWE-401: Missing Release of Memory after Effective Lifetime •

CVSS: 6.5EPSS: 0%CPEs: 3EXPL: 0

Memory leak in the v9fs_device_unrealize_common function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local privileged guest OS users to cause a denial of service (host memory consumption and possibly QEMU process crash) via vectors involving the order of resource cleanup. Fuga de memoria en la función v9fs_device_unrealize_common en hw/9pfs/9p.c en QEMU (también conocido como Quick Emulator) permite a usuarios privilegiados locales del SO huésped provocar una denegación de servicio (consumo de memoria del host y posiblemente caída de proceso QEMU) a través de vectores que implican el orden de limpieza del recurso. • http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=4774718e5c194026ba5ee7a28d9be49be3080e42 http://www.openwall.com/lists/oss-security/2016/12/06/11 http://www.openwall.com/lists/oss-security/2016/12/08/7 http://www.securityfocus.com/bid/94729 https://lists.gnu.org/archive/html/qemu-devel/2016-11/msg03278.html https://security.gentoo.org/glsa/201701-49 • CWE-401: Missing Release of Memory after Effective Lifetime •