Search CVE reports
271 – 280 of 396 results
CVE-2016-1714
Medium prioritySome fixes available 3 of 4
The (1) fw_cfg_write and (2) fw_cfg_read functions in hw/nvram/fw_cfg.c in QEMU before 2.4, when built with the Firmware Configuration device emulation support, allow guest OS users with the CAP_SYS_RAWIO privilege to cause a...
2 affected packages
qemu, qemu-kvm
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
qemu | — | — | — | — | — |
qemu-kvm | — | — | — | — | — |
CVE-2016-1568
Medium prioritySome fixes available 3 of 4
Use-after-free vulnerability in hw/ide/ahci.c in QEMU, when built with IDE AHCI Emulation support, allows guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via an invalid AHCI Native...
2 affected packages
qemu, qemu-kvm
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
qemu | — | — | — | — | — |
qemu-kvm | — | — | — | — | — |
CVE-2015-8745
Medium prioritySome fixes available 2 of 3
QEMU (aka Quick Emulator) built with a VMWARE VMXNET3 paravirtual NIC emulator support is vulnerable to crash issue. It could occur while reading Interrupt Mask Registers (IMR). A privileged (CAP_SYS_RAWIO) guest user could use...
2 affected packages
qemu, qemu-kvm
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
qemu | — | — | — | — | — |
qemu-kvm | — | — | — | — | — |
CVE-2015-8744
Medium prioritySome fixes available 2 of 3
QEMU (aka Quick Emulator) built with a VMWARE VMXNET3 paravirtual NIC emulator support is vulnerable to crash issue. It occurs when a guest sends a Layer-2 packet smaller than 22 bytes. A privileged (CAP_SYS_RAWIO) guest user...
2 affected packages
qemu, qemu-kvm
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
qemu | — | — | — | — | — |
qemu-kvm | — | — | — | — | — |
CVE-2015-8743
Medium prioritySome fixes available 3 of 4
QEMU (aka Quick Emulator) built with the NE2000 device emulation support is vulnerable to an OOB r/w access issue. It could occur while performing 'ioport' r/w operations. A privileged (CAP_SYS_RAWIO) user/process could use this...
2 affected packages
qemu, qemu-kvm
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
qemu | — | — | — | — | — |
qemu-kvm | — | — | — | — | — |
CVE-2015-8666
Medium prioritySome fixes available 2 of 3
Heap-based buffer overflow in QEMU, when built with the Q35-chipset-based PC system emulator.
2 affected packages
qemu, qemu-kvm
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
qemu | — | — | — | — | — |
qemu-kvm | — | — | — | — | — |
CVE-2015-8613
Medium prioritySome fixes available 2 of 3
Stack-based buffer overflow in the megasas_ctrl_get_info function in QEMU, when built with SCSI MegaRAID SAS HBA emulation support, allows local guest users to cause a denial of service (QEMU instance crash) via a crafted...
2 affected packages
qemu, qemu-kvm
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
qemu | — | — | — | — | — |
qemu-kvm | — | — | — | — | — |
CVE-2015-8619
Low prioritySome fixes available 2 of 3
The Human Monitor Interface support in QEMU allows remote attackers to cause a denial of service (out-of-bounds write and application crash).
2 affected packages
qemu, qemu-kvm
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
qemu | — | — | — | — | — |
qemu-kvm | — | — | — | — | — |
CVE-2015-8550
Medium prioritySome fixes available 23 of 46
Xen, when used on a system providing PV backends, allows local guest OS administrators to cause a denial of service (host OS crash) or gain privileges by writing to memory shared between the frontend and backend, aka a double...
33 affected packages
linux, linux-armadaxp, linux-aws, linux-ec2, linux-flo...
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
linux | — | — | — | — | Not affected |
linux-armadaxp | — | — | — | — | Not in release |
linux-aws | — | — | — | — | Not affected |
linux-ec2 | — | — | — | — | Not in release |
linux-flo | — | — | — | — | Ignored |
linux-fsl-imx51 | — | — | — | — | Not in release |
linux-gke | — | — | — | — | Not affected |
linux-goldfish | — | — | — | — | Ignored |
linux-grouper | — | — | — | — | Not in release |
linux-hwe | — | — | — | — | Not affected |
linux-hwe-edge | — | — | — | — | Not affected |
linux-linaro-omap | — | — | — | — | Not in release |
linux-linaro-shared | — | — | — | — | Not in release |
linux-linaro-vexpress | — | — | — | — | Not in release |
linux-lts-quantal | — | — | — | — | Not in release |
linux-lts-raring | — | — | — | — | Not in release |
linux-lts-saucy | — | — | — | — | Not in release |
linux-lts-trusty | — | — | — | — | Not in release |
linux-lts-utopic | — | — | — | — | Not in release |
linux-lts-vivid | — | — | — | — | Not in release |
linux-lts-wily | — | — | — | — | Not in release |
linux-lts-xenial | — | — | — | — | Not in release |
linux-maguro | — | — | — | — | Not in release |
linux-mako | — | — | — | — | Ignored |
linux-manta | — | — | — | — | Not in release |
linux-mvl-dove | — | — | — | — | Not in release |
linux-qcm-msm | — | — | — | — | Not in release |
linux-raspi2 | — | — | — | — | Not affected |
linux-snapdragon | — | — | — | — | Not affected |
linux-ti-omap4 | — | — | — | — | Not in release |
qemu | — | — | — | — | Fixed |
qemu-kvm | — | — | — | — | Not in release |
xen | — | — | — | — | Fixed |
CVE-2015-8568
Medium prioritySome fixes available 2 of 3
Memory leak in QEMU, when built with a VMWARE VMXNET3 paravirtual NIC emulator support, allows local guest users to cause a denial of service (host memory consumption) by trying to activate the vmxnet3 device repeatedly.
2 affected packages
qemu, qemu-kvm
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
qemu | — | — | — | — | — |
qemu-kvm | — | — | — | — | — |