Ubuntu update for qemu



Risk Medium
Patch available YES
Number of vulnerabilities 14
CVE-ID CVE-2023-2861
CVE-2020-14394
CVE-2020-24165
CVE-2021-3611
CVE-2021-3638
CVE-2023-1544
CVE-2023-3180
CVE-2023-3255
CVE-2023-3301
CVE-2023-3354
CVE-2023-40360
CVE-2023-4135
CVE-2023-42467
CVE-2023-5088
CWE-ID CWE-264
CWE-835
CWE-20
CWE-787
CWE-125
CWE-617
CWE-476
CWE-369
CWE-662
Exploitation vector Network
Public exploit N/A
Vulnerable software
Ubuntu
Operating systems & Components / Operating system

qemu-system-x86-xen (Ubuntu package)
Operating systems & Components / Operating system package or component

qemu-system-x86-microvm (Ubuntu package)
Operating systems & Components / Operating system package or component

qemu-system-x86 (Ubuntu package)
Operating systems & Components / Operating system package or component

qemu-system-sparc (Ubuntu package)
Operating systems & Components / Operating system package or component

qemu-system-s390x (Ubuntu package)
Operating systems & Components / Operating system package or component

qemu-system-ppc (Ubuntu package)
Operating systems & Components / Operating system package or component

qemu-system-misc (Ubuntu package)
Operating systems & Components / Operating system package or component

qemu-system-mips (Ubuntu package)
Operating systems & Components / Operating system package or component

qemu-system-arm (Ubuntu package)
Operating systems & Components / Operating system package or component

qemu-system (Ubuntu package)
Operating systems & Components / Operating system package or component

Vendor Canonical Ltd.

Security Bulletin

This security bulletin contains information about 14 vulnerabilities.

1) Permissions, Privileges, and Access Controls

EUVDB-ID: #VU78780

Risk: Low

CVSSv4.0: 5.8 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-2861

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to an error in the 9p passthrough filesystem (9pfs) implementation in QEMU. A local user can escape from the exported 9p tree by creating and opening a device file in the shared folder.

Mitigation

Update the affected package qemu to the latest version.

Vulnerable software versions

Ubuntu: 20.04 - 22.04

qemu-system-x86-xen (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-x86-microvm (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-x86 (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-sparc (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-s390x (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-ppc (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-misc (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-mips (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-arm (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system (Ubuntu package): before 1:4.2-3ubuntu6.29

CPE2.3 External links

https://ubuntu.com/security/notices/USN-6567-2


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Infinite loop

EUVDB-ID: #VU73788

Risk: Medium

CVSSv4.0: 4.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2020-14394

CWE-ID: CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')

Exploit availability: No

Description

The vulnerability allows an attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop in the USB xHCI controller emulation of QEMU while computing the length of the Transfer Request Block (TRB) Ring. A privileged user on the guest OS can consume all available system resources and cause denial of service conditions of the QEMU process on the host.

Mitigation

Update the affected package qemu to the latest version.

Vulnerable software versions

Ubuntu: 20.04 - 22.04

qemu-system-x86-xen (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-x86-microvm (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-x86 (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-sparc (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-s390x (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-ppc (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-misc (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-mips (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-arm (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system (Ubuntu package): before 1:4.2-3ubuntu6.29

CPE2.3 External links

https://ubuntu.com/security/notices/USN-6567-2


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Input validation error

EUVDB-ID: #VU85832

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2020-24165

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to insufficient validation of user-supplied input in TCG Accelerator. A local user can escalate privileges on the system.

Mitigation

Update the affected package qemu to the latest version.

Vulnerable software versions

Ubuntu: 20.04 - 22.04

qemu-system-x86-xen (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-x86-microvm (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-x86 (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-sparc (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-s390x (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-ppc (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-misc (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-mips (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-arm (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system (Ubuntu package): before 1:4.2-3ubuntu6.29

CPE2.3 External links

https://ubuntu.com/security/notices/USN-6567-2


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Out-of-bounds write

EUVDB-ID: #VU69352

Risk: Medium

CVSSv4.0: 4.9 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2021-3611

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a remote user to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error in the Intel HD Audio device (intel-hda) of QEMU. A remote user of the guest OS trigger an out-of-bounds write and crash the QEMU process on the host.

Mitigation

Update the affected package qemu to the latest version.

Vulnerable software versions

Ubuntu: 20.04 - 22.04

qemu-system-x86-xen (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-x86-microvm (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-x86 (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-sparc (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-s390x (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-ppc (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-misc (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-mips (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-arm (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system (Ubuntu package): before 1:4.2-3ubuntu6.29

CPE2.3 External links

https://ubuntu.com/security/notices/USN-6567-2


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Out-of-bounds write

EUVDB-ID: #VU72306

Risk: Medium

CVSSv4.0: 1.9 [CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2021-3638

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a malicious guest to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error in the ATI VGA device emulation of QEMU within the ati_2d_blt() routine while handling MMIO write operations. A malicious guest can crash the QEMU process on the host.

Mitigation

Update the affected package qemu to the latest version.

Vulnerable software versions

Ubuntu: 20.04 - 22.04

qemu-system-x86-xen (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-x86-microvm (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-x86 (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-sparc (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-s390x (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-ppc (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-misc (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-mips (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-arm (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system (Ubuntu package): before 1:4.2-3ubuntu6.29

CPE2.3 External links

https://ubuntu.com/security/notices/USN-6567-2


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Out-of-bounds read

EUVDB-ID: #VU85831

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-1544

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary condition within the pvrdma_ring_next_elem_read() function in the QEMU implementation of VMWare's paravirtual RDMA device. A local user can trigger an out-of-bounds read error and perform a denial of service (DoS) attack.

Mitigation

Update the affected package qemu to the latest version.

Vulnerable software versions

Ubuntu: 20.04 - 22.04

qemu-system-x86-xen (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-x86-microvm (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-x86 (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-sparc (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-s390x (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-ppc (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-misc (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-mips (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-arm (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system (Ubuntu package): before 1:4.2-3ubuntu6.29

CPE2.3 External links

https://ubuntu.com/security/notices/USN-6567-2


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Out-of-bounds write

EUVDB-ID: #VU80016

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-3180

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error within the virtio_crypto_handle_sym_req() function in hw/virtio/virtio-crypto.c of the QEMU virtual crypto device when handling data encryption/decryption requests. A local user trigger an out-of-bounds write and perform a denial of service 9DoS) attack.

Mitigation

Update the affected package qemu to the latest version.

Vulnerable software versions

Ubuntu: 20.04 - 22.04

qemu-system-x86-xen (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-x86-microvm (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-x86 (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-sparc (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-s390x (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-ppc (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-misc (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-mips (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-arm (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system (Ubuntu package): before 1:4.2-3ubuntu6.29

CPE2.3 External links

https://ubuntu.com/security/notices/USN-6567-2


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Infinite loop

EUVDB-ID: #VU78946

Risk: Medium

CVSSv4.0: 4.9 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2023-3255

CWE-ID: CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')

Exploit availability: No

Description

The vulnerability allows a remote user to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop within the vnc_client_cut_text_ext function in ui/vnc-clipboard.c. A remote authenticated client who is able to send a clipboard to the QEMU built-in VNC server can perform a denial of service conditions.

Mitigation

Update the affected package qemu to the latest version.

Vulnerable software versions

Ubuntu: 20.04 - 22.04

qemu-system-x86-xen (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-x86-microvm (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-x86 (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-sparc (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-s390x (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-ppc (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-misc (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-mips (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-arm (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system (Ubuntu package): before 1:4.2-3ubuntu6.29

CPE2.3 External links

https://ubuntu.com/security/notices/USN-6567-2


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) Reachable Assertion

EUVDB-ID: #VU78948

Risk: Medium

CVSSv4.0: 4.9 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2023-3301

CWE-ID: CWE-617 - Reachable Assertion

Exploit availability: No

Description

The vulnerability allows a remote user to perform a denial of service (DoS) attack.

The vulnerability exists due to a reachable assertion. When a peer nic is still attached to the vdpa backend, it is too early to free up the vhost-net and vdpa structures. If these structures are freed here, then QEMU crashes when the guest is being shut down.

Mitigation

Update the affected package qemu to the latest version.

Vulnerable software versions

Ubuntu: 20.04 - 22.04

qemu-system-x86-xen (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-x86-microvm (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-x86 (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-sparc (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-s390x (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-ppc (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-misc (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-mips (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-arm (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system (Ubuntu package): before 1:4.2-3ubuntu6.29

CPE2.3 External links

https://ubuntu.com/security/notices/USN-6567-2


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) NULL pointer dereference

EUVDB-ID: #VU80015

Risk: Medium

CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2023-3354

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error in the QEMU built-in VNC server. When a client connects to the VNC server, QEMU checks whether the current number of connections crosses a certain threshold and if so, cleans up the previous connection. If the previous connection happens to be in the handshake phase and fails, QEMU cleans up the connection again, resulting in NULL pointer dereference and denial of service.

Mitigation

Update the affected package qemu to the latest version.

Vulnerable software versions

Ubuntu: 20.04 - 22.04

qemu-system-x86-xen (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-x86-microvm (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-x86 (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-sparc (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-s390x (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-ppc (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-misc (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-mips (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-arm (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system (Ubuntu package): before 1:4.2-3ubuntu6.29

CPE2.3 External links

https://ubuntu.com/security/notices/USN-6567-2


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

11) NULL pointer dereference

EUVDB-ID: #VU85829

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-40360

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error within the nvme_directive_receive() function in hw/nvme/ctrl.c. A local user can pass specially crafted data to the application and perform a denial of service (DoS) attack.

Mitigation

Update the affected package qemu to the latest version.

Vulnerable software versions

Ubuntu: 20.04 - 22.04

qemu-system-x86-xen (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-x86-microvm (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-x86 (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-sparc (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-s390x (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-ppc (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-misc (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-mips (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-arm (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system (Ubuntu package): before 1:4.2-3ubuntu6.29

CPE2.3 External links

https://ubuntu.com/security/notices/USN-6567-2


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

12) Out-of-bounds read

EUVDB-ID: #VU84979

Risk: Low

CVSSv4.0: 4.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-4135

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote user to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition within the NVMe virtual device. A remote administrator can trigger an out-of-bounds read error and read contents of memory on the system.

Mitigation

Update the affected package qemu to the latest version.

Vulnerable software versions

Ubuntu: 20.04 - 22.04

qemu-system-x86-xen (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-x86-microvm (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-x86 (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-sparc (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-s390x (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-ppc (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-misc (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-mips (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-arm (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system (Ubuntu package): before 1:4.2-3ubuntu6.29

CPE2.3 External links

https://ubuntu.com/security/notices/USN-6567-2


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

13) Division by zero

EUVDB-ID: #VU85828

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-42467

CWE-ID: CWE-369 - Divide By Zero

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service attack.

The vulnerability exists due to a division by zero error within the scsi_disk_reset() function in hw/scsi/scsi-disk.c. A local user can pass specially crafted data to the application and crash it.

Mitigation

Update the affected package qemu to the latest version.

Vulnerable software versions

Ubuntu: 20.04 - 22.04

qemu-system-x86-xen (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-x86-microvm (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-x86 (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-sparc (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-s390x (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-ppc (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-misc (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-mips (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-arm (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system (Ubuntu package): before 1:4.2-3ubuntu6.29

CPE2.3 External links

https://ubuntu.com/security/notices/USN-6567-2


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

14) Improper synchronization

EUVDB-ID: #VU85827

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-5088

CWE-ID: CWE-662 - Improper Synchronization

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to improper synchronization, which causes guest I/O operation otherwise addressed to an arbitrary disk offset to be targeted to offset 0 instead. An L2 guest with a virtual disk (vdiskL2) stored on a virtual disk of an L1 (vdiskL1) hypervisor can read and/or write data to LBA 0 of vdiskL1, potentially gaining control of L1 at its next reboot.

Mitigation

Update the affected package qemu to the latest version.

Vulnerable software versions

Ubuntu: 20.04 - 22.04

qemu-system-x86-xen (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-x86-microvm (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-x86 (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-sparc (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-s390x (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-ppc (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-misc (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-mips (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system-arm (Ubuntu package): before 1:4.2-3ubuntu6.29

qemu-system (Ubuntu package): before 1:4.2-3ubuntu6.29

CPE2.3 External links

https://ubuntu.com/security/notices/USN-6567-2


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###