CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
Markus Frank and Fiona Ebner discovered that QEMU did not properly
handle certain memory operations, leading to a NULL pointer dereference.
An authenticated user could potentially use this issue to cause a denial
of service. (CVE-2023-6683)
Xiao Lei discovered that QEMU did not properly handle certain memory
operations when specific features were enabled, which could lead to a
stack overflow. An attacker could potentially use this issue to leak
sensitive information. (CVE-2023-6693)
It was discovered that QEMU had an integer underflow vulnerability in
the TI command, which would result in a buffer overflow. An attacker
could potentially use this issue to cause a denial of service.
(CVE-2024-24474)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 22.04 | noarch | qemu-system | < 1:6.2+dfsg-2ubuntu6.22 | UNKNOWN |
Ubuntu | 22.04 | noarch | qemu | < 1:6.2+dfsg-2ubuntu6.22 | UNKNOWN |
Ubuntu | 22.04 | noarch | qemu-block-extra | < 1:6.2+dfsg-2ubuntu6.22 | UNKNOWN |
Ubuntu | 22.04 | noarch | qemu-block-extra-dbgsym | < 1:6.2+dfsg-2ubuntu6.22 | UNKNOWN |
Ubuntu | 22.04 | noarch | qemu-guest-agent | < 1:6.2+dfsg-2ubuntu6.22 | UNKNOWN |
Ubuntu | 22.04 | noarch | qemu-guest-agent-dbgsym | < 1:6.2+dfsg-2ubuntu6.22 | UNKNOWN |
Ubuntu | 22.04 | noarch | qemu-system-arm | < 1:6.2+dfsg-2ubuntu6.22 | UNKNOWN |
Ubuntu | 22.04 | noarch | qemu-system-arm-dbgsym | < 1:6.2+dfsg-2ubuntu6.22 | UNKNOWN |
Ubuntu | 22.04 | noarch | qemu-system-common | < 1:6.2+dfsg-2ubuntu6.22 | UNKNOWN |
Ubuntu | 22.04 | noarch | qemu-system-common-dbgsym | < 1:6.2+dfsg-2ubuntu6.22 | UNKNOWN |