8.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
7.2 High
AI Score
Confidence
High
4.6 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:P/A:P
0.001 Low
EPSS
Percentile
17.6%
It was discovered that QEMU did not properly manage the guest drivers when
shared buffers are not allocated. A malicious guest driver could use this
issue to cause QEMU to crash, resulting in a denial of service, or possibly
execute arbitrary code. This issue only affected Ubuntu 20.04 LTS, Ubuntu
22.04 LTS and Ubuntu 22.10. (CVE-2022-1050)
It was discovered that QEMU did not properly check the size of the
structure pointed to by the guest physical address pqxl. A malicious guest
attacker could use this issue to cause QEMU to crash, resulting in a denial
of service. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS,
Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS and Ubuntu 22.10.
(CVE-2022-4144)
It was discovered that QEMU did not properly manage memory in the ACPI
Error Record Serialization Table (ERST) device. A malicious guest attacker
could use this issue to cause QEMU to crash, resulting in a denial of
service. This issue only affected Ubuntu 22.10. (CVE-2022-4172)
It was discovered that QEMU did not properly manage memory when DMA memory
writes happen repeatedly in the lsi53c895a device. A malicious guest
attacker could use this issue to cause QEMU to crash, resulting in a denial
of service. (CVE-2023-0330)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 23.04 | noarch | qemu-system-common | < 1:7.2+dfsg-5ubuntu2.2 | UNKNOWN |
Ubuntu | 23.04 | noarch | qemu-block-extra | < 1:7.2+dfsg-5ubuntu2.2 | UNKNOWN |
Ubuntu | 23.04 | noarch | qemu-block-extra-dbgsym | < 1:7.2+dfsg-5ubuntu2.2 | UNKNOWN |
Ubuntu | 23.04 | noarch | qemu-guest-agent | < 1:7.2+dfsg-5ubuntu2.2 | UNKNOWN |
Ubuntu | 23.04 | noarch | qemu-guest-agent-dbgsym | < 1:7.2+dfsg-5ubuntu2.2 | UNKNOWN |
Ubuntu | 23.04 | noarch | qemu-system | < 1:7.2+dfsg-5ubuntu2.2 | UNKNOWN |
Ubuntu | 23.04 | noarch | qemu-system-arm | < 1:7.2+dfsg-5ubuntu2.2 | UNKNOWN |
Ubuntu | 23.04 | noarch | qemu-system-arm-dbgsym | < 1:7.2+dfsg-5ubuntu2.2 | UNKNOWN |
Ubuntu | 23.04 | noarch | qemu-system-common-dbgsym | < 1:7.2+dfsg-5ubuntu2.2 | UNKNOWN |
Ubuntu | 23.04 | noarch | qemu-system-data | < 1:7.2+dfsg-5ubuntu2.2 | UNKNOWN |
8.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
7.2 High
AI Score
Confidence
High
4.6 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:P/A:P
0.001 Low
EPSS
Percentile
17.6%