Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 14 |
CVE-ID | CVE-2023-2861 CVE-2020-14394 CVE-2020-24165 CVE-2021-3611 CVE-2021-3638 CVE-2023-1544 CVE-2023-3180 CVE-2023-3255 CVE-2023-3301 CVE-2023-3354 CVE-2023-40360 CVE-2023-4135 CVE-2023-42467 CVE-2023-5088 |
CWE-ID | CWE-264 CWE-835 CWE-20 CWE-787 CWE-125 CWE-617 CWE-476 CWE-369 CWE-662 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
Ubuntu Operating systems & Components / Operating system qemu-system-x86-xen (Ubuntu package) Operating systems & Components / Operating system package or component qemu-system-x86-microvm (Ubuntu package) Operating systems & Components / Operating system package or component qemu-system-x86 (Ubuntu package) Operating systems & Components / Operating system package or component qemu-system-sparc (Ubuntu package) Operating systems & Components / Operating system package or component qemu-system-s390x (Ubuntu package) Operating systems & Components / Operating system package or component qemu-system-ppc (Ubuntu package) Operating systems & Components / Operating system package or component qemu-system-misc (Ubuntu package) Operating systems & Components / Operating system package or component qemu-system-mips (Ubuntu package) Operating systems & Components / Operating system package or component qemu-system-arm (Ubuntu package) Operating systems & Components / Operating system package or component qemu-system (Ubuntu package) Operating systems & Components / Operating system package or component |
Vendor | Canonical Ltd. |
Security Bulletin
This security bulletin contains information about 14 vulnerabilities.
EUVDB-ID: #VU78780
Risk: Low
CVSSv4.0: 5.8 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-2861
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to an error in the 9p passthrough filesystem (9pfs) implementation in QEMU. A local user can escape from the exported 9p tree by creating and opening a device file in the shared folder.
Update the affected package qemu to the latest version.
Vulnerable software versionsUbuntu: 20.04 - 22.04
qemu-system-x86-xen (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-x86-microvm (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-x86 (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-sparc (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-s390x (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-ppc (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-misc (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-mips (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-arm (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system (Ubuntu package): before 1:4.2-3ubuntu6.29
CPE2.3https://ubuntu.com/security/notices/USN-6567-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU73788
Risk: Medium
CVSSv4.0: 4.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2020-14394
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows an attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop in the USB xHCI controller emulation of QEMU while computing the length of the Transfer Request Block (TRB) Ring. A privileged user on the guest OS can consume all available system resources and cause denial of service conditions of the QEMU process on the host.
MitigationUpdate the affected package qemu to the latest version.
Vulnerable software versionsUbuntu: 20.04 - 22.04
qemu-system-x86-xen (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-x86-microvm (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-x86 (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-sparc (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-s390x (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-ppc (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-misc (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-mips (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-arm (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system (Ubuntu package): before 1:4.2-3ubuntu6.29
CPE2.3https://ubuntu.com/security/notices/USN-6567-2
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU85832
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2020-24165
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to insufficient validation of user-supplied input in TCG Accelerator. A local user can escalate privileges on the system.
Update the affected package qemu to the latest version.
Vulnerable software versionsUbuntu: 20.04 - 22.04
qemu-system-x86-xen (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-x86-microvm (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-x86 (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-sparc (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-s390x (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-ppc (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-misc (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-mips (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-arm (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system (Ubuntu package): before 1:4.2-3ubuntu6.29
CPE2.3https://ubuntu.com/security/notices/USN-6567-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU69352
Risk: Medium
CVSSv4.0: 4.9 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2021-3611
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
DescriptionThe vulnerability allows a remote user to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error in the Intel HD Audio device (intel-hda) of QEMU. A remote user of the guest OS trigger an out-of-bounds write and crash the QEMU process on the host.
MitigationUpdate the affected package qemu to the latest version.
Vulnerable software versionsUbuntu: 20.04 - 22.04
qemu-system-x86-xen (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-x86-microvm (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-x86 (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-sparc (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-s390x (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-ppc (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-misc (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-mips (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-arm (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system (Ubuntu package): before 1:4.2-3ubuntu6.29
CPE2.3https://ubuntu.com/security/notices/USN-6567-2
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU72306
Risk: Medium
CVSSv4.0: 1.9 [CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2021-3638
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
Description The vulnerability allows a malicious guest to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error in the ATI VGA device emulation of QEMU within the ati_2d_blt() routine while handling MMIO write operations. A malicious guest can crash the QEMU process on the host.
MitigationUpdate the affected package qemu to the latest version.
Vulnerable software versionsUbuntu: 20.04 - 22.04
qemu-system-x86-xen (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-x86-microvm (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-x86 (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-sparc (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-s390x (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-ppc (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-misc (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-mips (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-arm (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system (Ubuntu package): before 1:4.2-3ubuntu6.29
CPE2.3https://ubuntu.com/security/notices/USN-6567-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU85831
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-1544
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary condition within the pvrdma_ring_next_elem_read() function in the QEMU implementation of VMWare's paravirtual RDMA device. A local user can trigger an out-of-bounds read error and perform a denial of service (DoS) attack.
Update the affected package qemu to the latest version.
Vulnerable software versionsUbuntu: 20.04 - 22.04
qemu-system-x86-xen (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-x86-microvm (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-x86 (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-sparc (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-s390x (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-ppc (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-misc (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-mips (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-arm (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system (Ubuntu package): before 1:4.2-3ubuntu6.29
CPE2.3https://ubuntu.com/security/notices/USN-6567-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU80016
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-3180
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
Description The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error within the virtio_crypto_handle_sym_req() function in hw/virtio/virtio-crypto.c of the QEMU virtual crypto device when handling data encryption/decryption requests. A local user trigger an out-of-bounds write and perform a denial of service 9DoS) attack.
Update the affected package qemu to the latest version.
Vulnerable software versionsUbuntu: 20.04 - 22.04
qemu-system-x86-xen (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-x86-microvm (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-x86 (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-sparc (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-s390x (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-ppc (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-misc (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-mips (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-arm (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system (Ubuntu package): before 1:4.2-3ubuntu6.29
CPE2.3https://ubuntu.com/security/notices/USN-6567-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU78946
Risk: Medium
CVSSv4.0: 4.9 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-3255
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a remote user to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop within the vnc_client_cut_text_ext function in ui/vnc-clipboard.c. A remote authenticated client who is able to send a clipboard to the QEMU built-in VNC server can perform a denial of service conditions.
MitigationUpdate the affected package qemu to the latest version.
Vulnerable software versionsUbuntu: 20.04 - 22.04
qemu-system-x86-xen (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-x86-microvm (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-x86 (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-sparc (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-s390x (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-ppc (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-misc (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-mips (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-arm (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system (Ubuntu package): before 1:4.2-3ubuntu6.29
CPE2.3https://ubuntu.com/security/notices/USN-6567-2
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU78948
Risk: Medium
CVSSv4.0: 4.9 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-3301
CWE-ID:
CWE-617 - Reachable Assertion
Exploit availability: No
DescriptionThe vulnerability allows a remote user to perform a denial of service (DoS) attack.
The vulnerability exists due to a reachable assertion. When a peer nic is still attached to the vdpa backend, it is too early to free up the vhost-net and vdpa structures. If these structures are freed here, then QEMU crashes when the guest is being shut down.
MitigationUpdate the affected package qemu to the latest version.
Vulnerable software versionsUbuntu: 20.04 - 22.04
qemu-system-x86-xen (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-x86-microvm (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-x86 (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-sparc (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-s390x (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-ppc (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-misc (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-mips (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-arm (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system (Ubuntu package): before 1:4.2-3ubuntu6.29
CPE2.3https://ubuntu.com/security/notices/USN-6567-2
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU80015
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-3354
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error in the QEMU built-in VNC server. When a client connects to the VNC server, QEMU checks whether the current number of connections crosses a certain threshold and if so, cleans up the previous connection. If the previous connection happens to be in the handshake phase and fails, QEMU cleans up the connection again, resulting in NULL pointer dereference and denial of service.
MitigationUpdate the affected package qemu to the latest version.
Vulnerable software versionsUbuntu: 20.04 - 22.04
qemu-system-x86-xen (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-x86-microvm (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-x86 (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-sparc (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-s390x (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-ppc (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-misc (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-mips (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-arm (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system (Ubuntu package): before 1:4.2-3ubuntu6.29
CPE2.3https://ubuntu.com/security/notices/USN-6567-2
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU85829
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-40360
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error within the nvme_directive_receive() function in hw/nvme/ctrl.c. A local user can pass specially crafted data to the application and perform a denial of service (DoS) attack.
MitigationUpdate the affected package qemu to the latest version.
Vulnerable software versionsUbuntu: 20.04 - 22.04
qemu-system-x86-xen (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-x86-microvm (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-x86 (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-sparc (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-s390x (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-ppc (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-misc (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-mips (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-arm (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system (Ubuntu package): before 1:4.2-3ubuntu6.29
CPE2.3https://ubuntu.com/security/notices/USN-6567-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU84979
Risk: Low
CVSSv4.0: 4.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-4135
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote user to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition within the NVMe virtual device. A remote administrator can trigger an out-of-bounds read error and read contents of memory on the system.
MitigationUpdate the affected package qemu to the latest version.
Vulnerable software versionsUbuntu: 20.04 - 22.04
qemu-system-x86-xen (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-x86-microvm (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-x86 (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-sparc (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-s390x (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-ppc (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-misc (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-mips (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-arm (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system (Ubuntu package): before 1:4.2-3ubuntu6.29
CPE2.3https://ubuntu.com/security/notices/USN-6567-2
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU85828
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-42467
CWE-ID:
CWE-369 - Divide By Zero
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service attack.
The vulnerability exists due to a division by zero error within the scsi_disk_reset() function in hw/scsi/scsi-disk.c. A local user can pass specially crafted data to the application and crash it.
Update the affected package qemu to the latest version.
Vulnerable software versionsUbuntu: 20.04 - 22.04
qemu-system-x86-xen (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-x86-microvm (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-x86 (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-sparc (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-s390x (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-ppc (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-misc (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-mips (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-arm (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system (Ubuntu package): before 1:4.2-3ubuntu6.29
CPE2.3https://ubuntu.com/security/notices/USN-6567-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU85827
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-5088
CWE-ID:
CWE-662 - Improper Synchronization
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to improper synchronization, which causes guest I/O operation otherwise addressed to an arbitrary disk offset to be targeted to offset 0 instead. An L2 guest with a virtual disk (vdiskL2) stored on a virtual disk of an L1 (vdiskL1) hypervisor can read and/or write data to LBA 0 of vdiskL1, potentially gaining control of L1 at its next reboot.
MitigationUpdate the affected package qemu to the latest version.
Vulnerable software versionsUbuntu: 20.04 - 22.04
qemu-system-x86-xen (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-x86-microvm (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-x86 (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-sparc (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-s390x (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-ppc (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-misc (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-mips (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system-arm (Ubuntu package): before 1:4.2-3ubuntu6.29
qemu-system (Ubuntu package): before 1:4.2-3ubuntu6.29
CPE2.3https://ubuntu.com/security/notices/USN-6567-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.