Vulnerabilities affecting this package (0)
| Vulnerability |
Summary |
Fixed by |
|
This package is not known to be affected by vulnerabilities.
|
Vulnerabilities fixed by this package (4)
| Vulnerability |
Summary |
Aliases |
|
VCID-4848-dnv8-bqez
|
QEMU: use-after-free in TCG accelerator can lead to local privilege escalation
|
CVE-2020-24165
|
|
VCID-5t1d-ve8h-9ba1
|
QEMU: division by zero in oss_write() in audio/ossaudio.c
|
CVE-2020-14415
|
|
VCID-8cnu-b5en-7ye3
|
qemu: integer overflow in ati_2d_blt() in hw/display/ati-2d.c could lead to DoS
|
CVE-2020-11869
|
|
VCID-h22r-c3az-3fa3
|
An issue was discovered in ide_dma_cb() in hw/ide/core.c in QEMU 2.4.0 through 4.2.0. The guest system can crash the QEMU process in the host system via a special SCSI_IOCTL_SEND_COMMAND. It hits an assertion that implies that the size of successful DMA transfers there must be a multiple of 512 (the size of a sector). NOTE: a member of the QEMU security team disputes the significance of this issue because a "privileged guest user has many ways to cause similar DoS effect, without triggering this assert.
|
CVE-2019-20175
|