The Qemu Project Qemu vulnerabilities
3 known vulnerabilities affecting the_qemu_project/qemu.
Total CVEs
3
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
MEDIUM3
Vulnerabilities
Page 1 of 1
CVE-2020-10702MEDIUMCVSS 5.5v>= 4.0.0, < 5.0.02020-06-04
CVE-2020-10702 [MEDIUM] CWE-325 CVE-2020-10702: A flaw was found in QEMU in the implementation of the Pointer Authentication (PAuth) support for ARM
A flaw was found in QEMU in the implementation of the Pointer Authentication (PAuth) support for ARM introduced in version 4.0 and fixed in version 5.0.0. A general failure of the signature generation process caused every PAuth-enforced pointer to be signed with the same signature. A local attacker could obtain the signature of a protected pointer a
nvd
CVE-2020-10717MEDIUMCVSS 6.5v>= QEMU v5.02020-05-04
CVE-2020-10717 [MEDIUM] CWE-770 CVE-2020-10717: A potential DoS flaw was found in the virtio-fs shared file system daemon (virtiofsd) implementation
A potential DoS flaw was found in the virtio-fs shared file system daemon (virtiofsd) implementation of the QEMU version >= v5.0. Virtio-fs is meant to share a host file system directory with a guest via virtio-fs device. If the guest opens the maximum number of file descriptors under the shared directory, a denial of service may occur. This flaw al
nvd
CVE-2019-3812MEDIUMCVSS 5.5vthrough version 2.10 and through to 3.1.02019-02-19
CVE-2019-3812 [MEDIUM] CWE-119 CVE-2019-3812: QEMU, through version 2.10 and through version 3.1.0, is vulnerable to an out-of-bounds read of up t
QEMU, through version 2.10 and through version 3.1.0, is vulnerable to an out-of-bounds read of up to 128 bytes in the hw/i2c/i2c-ddc.c:i2c_ddc() function. A local attacker with permission to execute i2c commands could exploit this to read stack memory of the qemu process on the host.
nvd