Search for packages
| purl | pkg:deb/debian/qemu@1:5.2%2Bdfsg-11%2Bdeb11u3 |
| Next non-vulnerable version | 1:10.0.2+ds-2+deb13u1~bpo12+1 |
| Latest non-vulnerable version | 1:10.2.2+ds-1 |
| Risk | 3.7 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-3ew5-8dfe-u3d8
Aliases: CVE-2023-1544 |
Multiple vulnerabilities have been discovered in QEMU, the worst of which could lead to a denial of service. |
Affected by 6 other vulnerabilities. |
|
VCID-3kyg-9mf3-kfft
Aliases: CVE-2024-4467 |
qemu-kvm: 'qemu-img info' leads to host file read/write |
Affected by 6 other vulnerabilities. |
|
VCID-6qnt-yaa3-p3bb
Aliases: CVE-2020-35506 |
Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). |
Affected by 6 other vulnerabilities. |
|
VCID-91y7-ceje-jbd3
Aliases: CVE-2024-7409 |
QEMU: Denial of Service via Improper Synchronization in QEMU NBD Server During Socket Closure |
Affected by 6 other vulnerabilities. |
|
VCID-cenj-mz55-jbg6
Aliases: CVE-2021-3929 |
Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). |
Affected by 6 other vulnerabilities. |
|
VCID-cnyg-wvxr-gqg3
Aliases: CVE-2024-3447 |
QEMU: sdhci: heap buffer overflow in sdhci_write_dataport() |
Affected by 6 other vulnerabilities. |
|
VCID-d2ve-dnmj-4bbz
Aliases: CVE-2025-11234 |
qemu-kvm: VNC WebSocket handshake use-after-free |
Affected by 6 other vulnerabilities. |
|
VCID-ej5p-r4az-6ud2
Aliases: CVE-2022-4144 |
Multiple vulnerabilities have been discovered in QEMU, the worst of which could lead to a denial of service. |
Affected by 6 other vulnerabilities. |
|
VCID-ewb7-nrtu-g7ex
Aliases: CVE-2024-3446 |
QEMU: virtio: DMA reentrancy issue leads to double free vulnerability |
Affected by 6 other vulnerabilities. |
|
VCID-f4sq-73vu-sfdq
Aliases: CVE-2023-3019 |
QEMU: e1000e: heap use-after-free in e1000e_write_packet_to_guest() |
Affected by 6 other vulnerabilities. |
|
VCID-gc6n-kgsc-f3b6
Aliases: CVE-2020-35505 |
Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). |
Affected by 6 other vulnerabilities. |
|
VCID-kx81-eex4-hug8
Aliases: CVE-2023-6693 |
QEMU: virtio-net: stack buffer overflow in virtio_net_flush_tx() |
Affected by 6 other vulnerabilities. |
|
VCID-m47q-17n6-t7gg
Aliases: CVE-2026-2243 |
qemu-kvm: Heap buffer out-of-bounds read in VMDK compressed grain parsing |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
|
VCID-mtj9-1cns-yybw
Aliases: CVE-2020-15469 |
QEMU: MMIO ops null pointer dereference may lead to DoS |
Affected by 6 other vulnerabilities. |
|
VCID-n71j-fz74-kyhf
Aliases: CVE-2024-8354 |
qemu-kvm: usb: assertion failure in usb_ep_get() |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
|
VCID-p2dz-mtns-5bb4
Aliases: CVE-2023-2861 |
Multiple vulnerabilities have been discovered in QEMU, the worst of which could lead to a denial of service. |
Affected by 6 other vulnerabilities. |
|
VCID-ptty-88p4-ybe9
Aliases: CVE-2024-6505 |
qemu-kvm: virtio-net: queue index out-of-bounds access in software RSS |
Affected by 6 other vulnerabilities. |
|
VCID-pxjg-chmx-nkdc
Aliases: CVE-2022-35414 |
Multiple vulnerabilities have been discovered in QEMU, the worst of which could lead to a denial of service. |
Affected by 6 other vulnerabilities. |
|
VCID-qh2s-apkz-sbaz
Aliases: CVE-2020-35504 |
Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). |
Affected by 6 other vulnerabilities. |
|
VCID-qs61-1esc-c3cz
Aliases: CVE-2023-5088 |
QEMU: improper IDE controller reset can lead to MBR overwrite |
Affected by 6 other vulnerabilities. |
|
VCID-t58m-9jqp-43c9
Aliases: CVE-2024-7730 |
qemu-kvm: virtio-snd: heap buffer overflow in virtio_snd_pcm_in_cb() |
Affected by 0 other vulnerabilities. |
|
VCID-t5gq-4bhn-gkej
Aliases: CVE-2021-3611 |
Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). |
Affected by 6 other vulnerabilities. |
|
VCID-uzxc-npak-yyc4
Aliases: CVE-2021-20255 |
QEMU: net: eepro100: stack overflow via infinite recursion |
Affected by 0 other vulnerabilities. |
|
VCID-w7gc-1eh2-3ufu
Aliases: CVE-2021-3750 |
Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). |
Affected by 6 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-145f-vwpy-ukfg | Multiple vulnerabilities have been found in QEMU, the worst of which could result in the arbitrary execution of code. |
CVE-2020-7039
|
| VCID-14d3-jbv3-xbbe | Multiple vulnerabilities have been found in QEMU, the worst of which could result in the arbitrary execution of code. |
CVE-2020-10761
|
| VCID-1g7f-6q39-fyhx | Multiple vulnerabilities have been found in libslirp, the worst of which could result in a Denial of Service condition. |
CVE-2021-3593
|
| VCID-28wt-9aqz-xqbg | qemu: OOB read and write due to integer overflow in sm501_2d_operation() in hw/display/sm501.c |
CVE-2020-12829
|
| VCID-29bt-r6ya-jfhu | Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). |
CVE-2021-20263
|
| VCID-29d8-uet3-syfh | QEMU: heap buffer overflow in iscsi_aio_ioctl_cb() in block/iscsi.c may lead to information disclosure |
CVE-2020-11947
|
| VCID-3wee-2xay-r7bt | QEMU: block: fdc: null pointer dereference may lead to guest crash |
CVE-2021-20196
|
| VCID-4848-dnv8-bqez | QEMU: use-after-free in TCG accelerator can lead to local privilege escalation |
CVE-2020-24165
|
| VCID-4d66-e766-q7ch | Multiple vulnerabilities have been found in QEMU, the worst of which could result in the arbitrary execution of code. |
CVE-2020-13253
|
| VCID-4unz-8jyy-qfdc | Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). |
CVE-2021-4206
|
| VCID-5t1d-ve8h-9ba1 | QEMU: division by zero in oss_write() in audio/ossaudio.c |
CVE-2020-14415
|
| VCID-5ur6-6ec3-p7bt | Multiple vulnerabilities have been found in libslirp, the worst of which could result in a Denial of Service condition. |
CVE-2021-3592
|
| VCID-6ef4-c38a-j7ca | Multiple vulnerabilities have been found in QEMU, the worst of which could result in the arbitrary execution of code. |
CVE-2020-13362
|
| VCID-6fs3-3a9w-xycq | QEMU: slirp: out-of-bounds access while processing ARP/NCSI packets |
CVE-2020-29130
|
| VCID-6hqu-ecs5-zqeb | Multiple vulnerabilities have been found in QEMU, the worst of which could result in the arbitrary execution of code. |
CVE-2020-13361
|
| VCID-6pkj-axqp-duf1 | Multiple vulnerabilities have been found in libslirp, the worst of which could result in a Denial of Service condition. |
CVE-2021-3595
|
| VCID-6xcc-y2jp-nufx | QEMU: net: triggerable assertion due to race condition in hot-unplug |
CVE-2023-3301
|
| VCID-7mhs-m1r3-n3ag | QEMU: VNC: improper I/O watch removal in TLS handshake can lead to remote unauthenticated denial of service |
CVE-2023-3354
|
| VCID-7w6v-ewcn-kkdz | Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). |
CVE-2021-3416
|
| VCID-7zkh-xs1s-guh6 | QEMU: slirp: networking out-of-bounds read information disclosure vulnerability |
CVE-2020-10756
|
| VCID-8cnu-b5en-7ye3 | qemu: integer overflow in ati_2d_blt() in hw/display/ati-2d.c could lead to DoS |
CVE-2020-11869
|
| VCID-8jjd-u5mc-zbde | qemu: scsi: lsi: potential infinite loop when executing script in lsi_execute_script |
CVE-2019-12068
|
| VCID-8kzh-2gr5-e7gu | QEMU: out-of-bounds read in ati_cursor_define() function in hw/display/ati.c leads to DoS |
CVE-2019-20808
|
| VCID-93gr-c812-uud8 | QEMU: sdhci: out-of-bounds access issue while doing multi block SDMA |
CVE-2020-25085
|
| VCID-955d-q41q-4uau | QEMU: net: an assert failure via eth_get_gso_type |
CVE-2020-27617
|
| VCID-9rpr-g2sm-yqb6 | QEMU: pvrdma: null dereference or excessive memory allocation when creating QP/CQ |
CVE-2018-20125
|
| VCID-ap2r-g7ew-kqed | Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). |
CVE-2021-3544
|
| VCID-bcps-uatt-wkd7 | Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). |
CVE-2021-3527
|
| VCID-be1r-pq33-abg5 | QEMU: pvrdma: uar_read leads to NULL dereference |
CVE-2018-20191
|
| VCID-br4x-bpvj-puhr | Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). |
CVE-2021-3608
|
| VCID-burb-pa38-fqhw | QEMU: vnc: memory leakage upon disconnect |
CVE-2019-20382
|
| VCID-c4ky-b4y8-kqd5 | QEMU: divide by zero in dwc2_handle_packet() in hw/usb/hcd-dwc2.c |
CVE-2020-27661
|
| VCID-cgq2-b6my-eucg | QEMU: lsi53c895a: DMA reentrancy issue leads to stack overflow |
CVE-2023-0330
|
| VCID-d6gd-j7ks-xkgk | security update |
CVE-2019-15890
|
| VCID-dqbd-gqg9-2kgs | Multiple vulnerabilities have been found in QEMU, the worst of which could result in the arbitrary execution of code. |
CVE-2020-13754
|
| VCID-drqf-646q-xqf3 | qemu: out-of-bound heap buffer access via an interrupt ID field |
CVE-2021-20221
|
| VCID-e99n-gc79-cqcy | Multiple vulnerabilities have been found in QEMU, the worst of which could result in the arbitrary execution of code. |
CVE-2020-11102
|
| VCID-eb18-wa2w-q7bn | Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). |
CVE-2021-3682
|
| VCID-een8-8kc5-qfcx | Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). |
CVE-2021-3546
|
| VCID-egyg-bbm9-8qea | QEMU: slirp: use-after-free in ip_reass() function in ip_input.c |
CVE-2020-1983
|
| VCID-eqp6-raqc-dkch | qemu: 9pfs: TOCTOU privilege escalation vulnerability |
CVE-2021-20181
|
| VCID-ewsp-7ydm-5ub3 | Multiple vulnerabilities have been found in QEMU, the worst of which could result in the arbitrary execution of code. |
CVE-2019-13164
|
| VCID-ezm8-pq4d-mkhg | Multiple vulnerabilities have been found in QEMU, the worst of which could result in the arbitrary execution of code. |
CVE-2020-13800
|
| VCID-f2fx-sqtp-8yhe | Multiple vulnerabilities have been discovered in QEMU, the worst of which could lead to a denial of service. |
CVE-2022-0216
|
| VCID-ffd9-9wm1-rffs | Multiple vulnerabilities have been found in libslirp, the worst of which could result in a Denial of Service condition. |
CVE-2021-3594
|
| VCID-fucx-q3j9-qkat | QEMU: pvrdma: infinite loop in pvrdma_qp_send/recv |
CVE-2018-20216
|
| VCID-gqtx-g1cs-6ybn | Multiple vulnerabilities have been found in QEMU, the worst of which could result in the arbitrary execution of code. |
CVE-2020-8608
|
| VCID-h22r-c3az-3fa3 | An issue was discovered in ide_dma_cb() in hw/ide/core.c in QEMU 2.4.0 through 4.2.0. The guest system can crash the QEMU process in the host system via a special SCSI_IOCTL_SEND_COMMAND. It hits an assertion that implies that the size of successful DMA transfers there must be a multiple of 512 (the size of a sector). NOTE: a member of the QEMU security team disputes the significance of this issue because a "privileged guest user has many ways to cause similar DoS effect, without triggering this assert. |
CVE-2019-20175
|
| VCID-h5sc-3zrc-23dn | QEMU: loader: OOB access while loading registered ROM may lead to code execution |
CVE-2020-13765
|
| VCID-hq1b-c1ew-kkga | QEMU: ati-vga: potential crash via invalid x y parameter values |
CVE-2020-27616
|
| VCID-hrhp-htnd-7bbx | Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). |
CVE-2021-3607
|
| VCID-j11x-bba3-zkdj | QEMU: ppc64: sPAPR emulator leaks the host hardware identity |
CVE-2019-8934
|
| VCID-j1gy-ttz5-1yct | Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). |
CVE-2022-26353
|
| VCID-j6hs-wm45-s3ej | Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). |
CVE-2021-20257
|
| VCID-jmca-kswb-1beq | QEMU: ati-vga: inconsistent check in ati_2d_blt() may lead to out-of-bounds write |
CVE-2021-3638
|
| VCID-juek-f6et-x7eb | QEMU: e1000e: infinite loop scenario in case of null packet descriptor |
CVE-2020-28916
|
| VCID-ke54-4uc4-rkbs | qemu: hw/display/bochs-display.c does not ensure a sufficient PCI config space allocation leading to a buffer overflow involving the PCIe extended config space |
CVE-2019-15034
|
| VCID-mn7m-an9j-yucj | QEMU: heap buffer overflow in msix_table_mmio_write() in hw/pci/msix.c |
CVE-2020-27821
|
| VCID-nb4k-f7rm-kuhg | Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). |
CVE-2021-3582
|
| VCID-ne4d-zj65-qkgx | QEMU: fdc: heap buffer overflow in DMA read data transfers |
CVE-2021-3507
|
| VCID-nuwe-tupt-wfhg | QEMU: usb: hcd-ohci: infinite loop issue while processing transfer descriptors |
CVE-2020-25625
|
| VCID-p2we-9qfu-17eb | QEMU: usb: use-after-free issue while setting up packet |
CVE-2020-25084
|
| VCID-phfy-zv23-sqcr | Multiple vulnerabilities have been found in QEMU, the worst of which could result in the arbitrary execution of code. |
CVE-2020-1711
|
| VCID-q38v-9gvs-sydf | Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). |
CVE-2021-3545
|
| VCID-qejd-5dkk-muhc | QEMU: pvrdma: memory leakage in device hotplug |
CVE-2018-20123
|
| VCID-qn73-3gkb-rkbm | Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). |
CVE-2021-3930
|
| VCID-r47h-wdgy-7bga | Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). |
CVE-2021-3748
|
| VCID-r51r-u7mq-93cy | QEMU: scsi: mptsas: use-after-free while processing io requests |
CVE-2021-3392
|
| VCID-re83-uvh8-5bgq | QEMU: out-of-bounds read/write in ati-vga device emulation in ati_2d_blt() |
CVE-2020-24352
|
| VCID-ruzy-eqc8-5ubs | security update |
CVE-2019-14378
|
| VCID-rvs5-s55e-9ueb | qemu: weak signature generation in Pointer Authentication support for ARM |
CVE-2020-10702
|
| VCID-rz5x-q1ne-53he | Multiple vulnerabilities have been discovered in QEMU, the worst of which could lead to a denial of service. |
CVE-2020-14394
|
| VCID-sy57-hngf-d3gn | Multiple vulnerabilities have been found in QEMU, the worst of which could result in the arbitrary execution of code. |
CVE-2020-13791
|
| VCID-t2y3-nbz8-jqa7 | QEMU: slirp: out-of-bounds access while processing ARP/NCSI packets |
CVE-2020-29129
|
| VCID-t44w-g1ys-47e6 | Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). |
CVE-2020-15859
|
| VCID-t6cq-kfkw-wbch | QEMU: virtio-crypto: heap buffer overflow in virtio_crypto_sym_op_helper() |
CVE-2023-3180
|
| VCID-takm-jn93-eqgb | Multiple vulnerabilities have been discovered in QEMU, the worst of which could lead to a denial of service. |
CVE-2022-1050
|
| VCID-tk7k-71bb-97hh | QEMU: assertion failure through usb_packet_unmap() in hw/usb/hcd-ehci.c |
CVE-2020-25723
|
| VCID-tyv8-tzu8-23fj | Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). |
CVE-2020-35517
|
| VCID-u1wj-9rfp-wyea | QEMU: pvrdma: memory leakage when creating cq/qp |
CVE-2018-20126
|
| VCID-vbq6-qtub-ffbg | QEMU: rdma: OOB access when building scatter-gather array |
CVE-2018-20124
|
| VCID-vpp8-a7sw-pqef | QEMU: usb: hcd-ohci: out-of-bound access issue while processing transfer descriptors |
CVE-2020-25624
|
| VCID-vpu8-k8me-tfe6 | Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). |
CVE-2022-26354
|
| VCID-vrwy-exwv-vyhr | Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). |
CVE-2021-20203
|
| VCID-vvaj-skpn-u3ar | Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). |
CVE-2021-3409
|
| VCID-wdjx-9f36-abgu | Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). |
CVE-2020-15863
|
| VCID-wg5b-8smu-b3fm | Multiple vulnerabilities have been found in QEMU, the worst of which could result in the arbitrary execution of code. |
CVE-2020-10717
|
| VCID-wjxf-kgdw-2kau | Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). |
CVE-2020-16092
|
| VCID-wm9d-ymbb-sfdc | QEMU: usb: out-of-bounds r/w access issue |
CVE-2020-14364
XSA-335 |
| VCID-wyr6-c2nv-p3a2 | QEMU: ide: atapi: OOB access while processing read commands |
CVE-2020-29443
|
| VCID-x8ue-gf65-uket | QEMU: heap buffer overflow in sdhci_sdma_transfer_multi_blocks() in hw/sd/sdhci.c |
CVE-2020-17380
|
| VCID-ycrs-vy13-wbff | Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). |
CVE-2021-3713
|
| VCID-yt3z-g3w7-xfa5 | Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). |
CVE-2021-4207
|
| VCID-zf4c-x45c-tudm | Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). |
CVE-2022-0358
|
| VCID-zk4y-2xjp-vfcs | Multiple vulnerabilities have been found in QEMU, the worst of which could result in the arbitrary execution of code. |
CVE-2020-13659
|