Page 34 of 306 results (0.006 seconds)

CVSS: 4.4EPSS: 0%CPEs: 3EXPL: 0

Multiple integer overflows in the (1) v9fs_xattr_read and (2) v9fs_xattr_write functions in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allow local guest OS administrators to cause a denial of service (QEMU process crash) via a crafted offset, which triggers an out-of-bounds access. Múltiples desbordamientos de entero en las funciones (1) v9fs_xattr_read y (2) v9fs_xattr_write en hw/9pfs/9p.c en QEMU (también conocido como Quick Emulator) permiten a administradores locales del SO invitado provocar una denegación de servicio (caída del proceso QEMU) mediante un desplazamiento manipulado, lo que desencadena un acceso fuera de los límites. • http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html http://www.openwall.com/lists/oss-security/2016/10/28/2 http://www.openwall.com/lists/oss-security/2016/10/30/8 http://www.securityfocus.com/bid/93956 https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html https://lists.gnu.org/archive/html/qemu-devel/2016-10/msg02942.html https://security.gentoo.org/glsa/201611-11 • CWE-190: Integer Overflow or Wraparound •

CVSS: 6.0EPSS: 0%CPEs: 2EXPL: 0

The v9fs_xattrcreate function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to obtain sensitive host heap memory information by reading xattribute values before writing to them. La función v9fs_xattrcreate en hw/9pfs/9p.c en QEMU (también conocido como Quick Emulator) permite a administradores locales del SO invitado obtener información sensible de la memoria dinámica del host leyendo los valores xattribute antes de escribirlos. • http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=eb687602853b4ae656e9236ee4222609f3a6887d http://www.openwall.com/lists/oss-security/2016/10/28/1 http://www.openwall.com/lists/oss-security/2016/10/30/7 http://www.securityfocus.com/bid/93955 https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html https://lists.gnu.org/archive/html/qemu-devel/2016-10/msg01790.html https://security.gentoo.org/glsa/201611-11 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 6.0EPSS: 0%CPEs: 3EXPL: 0

Memory leak in the v9fs_link function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via vectors involving a reference to the source fid object. Fuga de memoria en la función v9fs_link en hw/9pfs/9p.c en QEMU (también conocido como Quick Emulator) permite a administradores locales del SO invitado provocar una denegación de servicio (consumo de memoria) a través de vectores que implican una referencia al objeto fuente fid. • http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=4c1586787ff43c9acd18a56c12d720e3e6be9f7c http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html http://www.openwall.com/lists/oss-security/2016/10/28/3 http://www.openwall.com/lists/oss-security/2016/10/30/9 http://www.securityfocus.com/bid/93965 https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html https://lists.gnu.org/archive/html/qemu-devel/2016-10/msg02608.html https://security.gentoo.org/glsa/201611& • CWE-772: Missing Release of Resource after Effective Lifetime •

CVSS: 6.0EPSS: 0%CPEs: 10EXPL: 0

Memory leak in the usb_xhci_exit function in hw/usb/hcd-xhci.c in QEMU (aka Quick Emulator), when the xhci uses msix, allows local guest OS administrators to cause a denial of service (memory consumption and possibly QEMU process crash) by repeatedly unplugging a USB device. Fuga de memoria en la función usb_xhci_exit en hw/usb/hcd-xhci.c en QEMU (también conocido como Quick Emulator), cuando el xhci utiliza msix, permite a administradores locales del SO invitado provocar una denegación de servicio (consumo de memoria y posible caída del proceso QEMU) desconectando repetidamente un dispositivo USB. A memory-leak flaw was found in the Quick Emulator(QEMU) built with USB xHCI controller emulation support. The flaw could occur while doing a USB-device unplug operation. Unplugging the device repeatedly resulted in leaking host memory, which affected other services on the host. • http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=b53dd4495ced2432a0b652ea895e651d07336f7e http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html http://www.openwall.com/lists/oss-security/2016/09/19/8 http://www.openwall.com/lists/oss-security/2016/09/20/3 http://www.securityfocus.com/bid/93029 https://access.redhat.com/errata/RHSA-2017:2392 https://access.redhat.com/errata/RHSA-2017:2408 https://lists.gnu.org/archive/html/qemu-devel/2016-09/msg02773.html https:&#x • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-772: Missing Release of Resource after Effective Lifetime •

CVSS: 6.0EPSS: 0%CPEs: 3EXPL: 0

Memory leak in hw/net/eepro100.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by repeatedly unplugging an i8255x (PRO100) NIC device. Fuga de memoria en hw/net/eepro100.c en QEMU (también conocido como Quick Emulator) permite a administradores locales del SO invitado provocar una denegación de servicio (consumo de memoria y caída del proceso QEMU) desconectando repetidamente un dispositivo i8255x (PRO100) NIC. • http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html http://www.openwall.com/lists/oss-security/2016/10/27/14 http://www.openwall.com/lists/oss-security/2016/10/30/5 http://www.securityfocus.com/bid/93957 https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html https://lists.gnu.org/archive/html/qemu-devel/2016-10/msg03024.html https://security.gentoo.org/glsa/201701-49 • CWE-772: Missing Release of Resource after Effective Lifetime •