7.5
CVSSv3

CVE-2019-5008

Published: 19/04/2019 Updated: 07/11/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

hw/sparc64/sun4u.c in QEMU 3.1.50 is vulnerable to a NULL pointer dereference, which allows the malicious user to cause a denial of service via a device driver.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

qemu qemu 3.1.50

Vendor Advisories

Several issues were addressed in QEMU ...
Debian Bug report logs - #929353 qemu: CVE-2019-12155: qxl: null pointer dereference while releasing speice resources Package: src:qemu; Maintainer for src:qemu is Debian QEMU Team <pkg-qemu-devel@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Wed, 22 May 2019 08:03:02 UTC Sever ...
Debian Bug report logs - #927439 qemu: CVE-2019-5008 Package: src:qemu; Maintainer for src:qemu is Debian QEMU Team <pkg-qemu-devel@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 19 Apr 2019 20:42:02 UTC Severity: important Tags: patch, security, upstream Found in version ...
A heap buffer overflow issue was found in the load_device_tree() function of QEMU, which is invoked to load a device tree blob at boot time It occurs due to device tree size manipulation before buffer allocation, which could overflow a signed int type A user/process could use this flaw to potentially execute arbitrary code on a host system with p ...
Impact: Moderate Public Date: 2019-04-19 CWE: CWE-476 Bugzilla: 1705915: CVE-2019-5008 QEMU: NULL point ...