A vulnerability was found in QEMU up to 3.0.x. It has been declared as critical. This vulnerability affects the function usb_mtp_write_data of the file hw/usb/dev-mtp.c of the component Media Transfer Protocol. The manipulation leads to path traversal.
This vulnerability was named CVE-2018-16867. An attack has to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in libslirp up to 4.3.0 and classified as problematic. Affected by this vulnerability is the function icmp6_send_echoreply of the component SLiRP Networking. The manipulation as part of ICMP Echo Request leads to out-of-bounds read.
This vulnerability is known as CVE-2020-10756. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in QEMU 4.2.0. This issue affects the function sdhci_write of the file hw/sd/sd.c. The manipulation leads to out-of-bounds read.
The identification of this vulnerability is CVE-2020-13253. An attack has to be approached locally. There is no exploit available.
A vulnerability was found in QEMU and classified as critical. Affected by this issue is some unknown functionality of the file hw/net/xgmac.c of the component XGMAC Ethernet Controller. The manipulation as part of Packet leads to buffer overflow.
This vulnerability is handled as CVE-2020-15863. The attack needs to be approached locally. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in QEMU up to 4.x. It has been declared as critical. This vulnerability affects the function oss_write of the file audio/ossaudio.c. The manipulation leads to divide by zero.
This vulnerability was named CVE-2020-14415. The attack needs to be approached locally. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in QEMU up to 5.0.0 and classified as critical. This issue affects the function sm501_2d_engine_write of the file hw/display/sm501.c of the component SM501 Display Driver. The manipulation leads to integer overflow.
The identification of this vulnerability is CVE-2020-12829. Local access is required to approach this attack. There is no exploit available.
A vulnerability has been found in QEMU 5.0.0 and classified as critical. This vulnerability affects the function usb_packet_map of the file hw/usb/hcd-xhci.c. The manipulation as part of Return Value leads to use after free.
This vulnerability was named CVE-2020-25084. Local access is required to approach this attack. There is no exploit available.
A vulnerability was found in QEMU 5.0.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file hw/usb/hcd-ohci.c of the component TD List Handler. The manipulation as part of Infinite Loop leads to infinite loop.
This vulnerability is handled as CVE-2020-25625. An attack has to be approached locally. There is no exploit available.
A vulnerability, which was classified as problematic, was found in QEMU. Affected is the function ati_2d_blt of the file user/process of the component ati-vga Emulator. The manipulation of the argument x/y leads to out-of-bounds read.
This vulnerability is traded as CVE-2020-27616. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in QEMU 5.0.0 and classified as critical. Affected by this issue is some unknown functionality of the file hw/usb/hcd-ohci.c of the component Host Controller Driver. The manipulation leads to stack-based buffer overflow.
This vulnerability is handled as CVE-2020-25624. The attack needs to be done within the local network. There is no exploit available.
A vulnerability was found in QEMU 5.0.0. It has been classified as problematic. Affected is an unknown function of the file hw/net/e1000e_core.c of the component RX Descriptor Handler. The manipulation leads to infinite loop.
This vulnerability is traded as CVE-2020-28916. The attack needs to be approached within the local network. There is no exploit available.
A vulnerability was found in NVIDIA GPU, vGPU and Cloud Gaming on Windows. It has been declared as critical. This vulnerability affects unknown code of the component User Mode Layer. The manipulation leads to out-of-bounds read.
This vulnerability was named CVE-2024-0121. The attack needs to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.