CVE-2016-7155
https://notcve.org/view.php?id=CVE-2016-7155
hw/scsi/vmw_pvscsi.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (out-of-bounds access or infinite loop, and QEMU process crash) via a crafted page count for descriptor rings. hw/scsi/vmw_pvscsi.c en QEMU (también conocido como Quick Emulator) permite a administradores locales del SO invitado provocar una denegación de servicio (acceso fuera de límites o bucle infinito y caída del proceso QEMU) a través de un conteo de páginas manipuladas para anillos de descriptor. • http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=7f61f4690dd153be98900a2a508b88989e692753 http://www.openwall.com/lists/oss-security/2016/09/06/2 http://www.openwall.com/lists/oss-security/2016/09/07/1 http://www.securityfocus.com/bid/92772 https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html https://lists.gnu.org/archive/html/qemu-devel/2016-09/msg00050.html •
CVE-2016-7995
https://notcve.org/view.php?id=CVE-2016-7995
Memory leak in the ehci_process_itd function in hw/usb/hcd-ehci.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via a large number of crafted buffer page select (PG) indexes. Fuga de memoria en la función ehci_process_itd en hw/usb/hcd-ehci.c en QEMU (también conocido como Quick Emulator) permite a administradores locales del SO invitado provocar una denegación de servicio (consumo de memoria) a través de un gran número de índices de selección de página (PG) de búfer manipuladas. • http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=b16c129daf0fed91febbb88de23dae8271c8898a http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html http://www.openwall.com/lists/oss-security/2016/10/07/3 http://www.openwall.com/lists/oss-security/2016/10/08/4 http://www.securityfocus.com/bid/93454 https://lists.gnu.org/archive/html/qemu-devel/2016-09/msg06609.html • CWE-772: Missing Release of Resource after Effective Lifetime •
CVE-2016-6835 – Qemu: net: vmxnet: buffer overflow in vmxnet_tx_pkt_parse_headers() in vmxnet3 device emulation
https://notcve.org/view.php?id=CVE-2016-6835
The vmxnet_tx_pkt_parse_headers function in hw/net/vmxnet_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (buffer over-read) by leveraging failure to check IP header length. La función vmxnet_tx_pkt_parse_headers en hw/net/vmxnet_tx_pkt.c en QEMU (también conocido como Quick Emulator) permite a administradores locales del SO invitado provocar una denegación de servicio (sobre lectura del búfer) aprovechando el fallo para comprobar la longitud del encabezado IP. • http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=93060258ae748573ca7197204125a2670047896d http://www.openwall.com/lists/oss-security/2016/08/11/7 http://www.openwall.com/lists/oss-security/2016/08/18/4 https://access.redhat.com/errata/RHSA-2017:2392 https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html https://lists.gnu.org/archive/html/qemu-stable/2016-08/msg00077.html https://access.redhat.com/security/cve/CVE-2016-6835 https://bugzilla.redhat.com/show_bug • CWE-122: Heap-based Buffer Overflow •
CVE-2015-8818 – Qemu: OOB access in address_space_rw leads to segmentation fault
https://notcve.org/view.php?id=CVE-2015-8818
The cpu_physical_memory_write_rom_internal function in exec.c in QEMU (aka Quick Emulator) does not properly skip MMIO regions, which allows local privileged guest users to cause a denial of service (guest crash) via unspecified vectors. La función cpu_physical_memory_write_rom_internal en exec.c en QEMU (también conocido como Quick Emulator) no omite apropiadamente las regiones MMIO, lo que permite a usuarios invitados privilegiados locales provocar una denegación de servicio (caída del huésped) a través de vectores no especificados. An out-of-bounds flaw was found in the QEMU emulator built using 'address_space_translate' to map an address to a MemoryRegionSection. The flaw could occur while doing pci_dma_read/write calls, resulting in an out-of-bounds read-write access error. A privileged user inside a guest could use this flaw to crash the guest instance (denial of service). • http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=b242e0e0e2969c044a318e56f7988bbd84de1f63 http://rhn.redhat.com/errata/RHSA-2016-2670.html http://rhn.redhat.com/errata/RHSA-2016-2671.html http://rhn.redhat.com/errata/RHSA-2016-2704.html http://rhn.redhat.com/errata/RHSA-2016-2705.html http://rhn.redhat.com/errata/RHSA-2016-2706.html http://www.openwall.com/lists/oss-security/2016/03/01/1 http://www.openwall.com/lists/oss-security/2016/03/01/10 https://bugzilla. • CWE-787: Out-of-bounds Write •
CVE-2016-8577
https://notcve.org/view.php?id=CVE-2016-8577
Memory leak in the v9fs_read function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via vectors related to an I/O read operation. Fuga de memoria en la función v9fs_read en hw/9pfs/9p.c en QEMU (también conocido como Quick Emulator) permite a administradores locales del SO invitado provocar una denegación de servicio (consumo de memoria) a través de vectores relacionados con una operación de lectura I/O. • http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=e95c9a493a5a8d6f969e86c9f19f80ffe6587e19 http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html http://www.openwall.com/lists/oss-security/2016/10/10/13 http://www.openwall.com/lists/oss-security/2016/10/10/7 http://www.securityfocus.com/bid/93473 https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html https://security.gentoo.org/glsa/201611-11 • CWE-772: Missing Release of Resource after Effective Lifetime •