CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
EPSS
Percentile
39.9%
A flaw was found in the QXL display device emulation in QEMU. A double
fetch of guest controlled values cursor->header.width
and
cursor->header.height
can lead to the allocation of a small cursor object
followed by a subsequent heap-based buffer overflow. A malicious privileged
guest user could use this flaw to crash the QEMU process on the host or
potentially execute arbitrary code within the context of the QEMU process.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | qemu | <Â 1:2.11+dfsg-1ubuntu7.40 | UNKNOWN |
ubuntu | 20.04 | noarch | qemu | <Â 1:4.2-3ubuntu6.23 | UNKNOWN |
ubuntu | 21.10 | noarch | qemu | <Â 1:6.0+dfsg-2expubuntu1.3 | UNKNOWN |
ubuntu | 22.04 | noarch | qemu | <Â 1:6.2+dfsg-2ubuntu6.2 | UNKNOWN |
ubuntu | 22.10 | noarch | qemu | <Â 1:6.2+dfsg-2ubuntu8 | UNKNOWN |
ubuntu | 23.04 | noarch | qemu | <Â 1:6.2+dfsg-2ubuntu8 | UNKNOWN |
ubuntu | 23.10 | noarch | qemu | <Â 1:6.2+dfsg-2ubuntu8 | UNKNOWN |
ubuntu | 24.04 | noarch | qemu | <Â 1:6.2+dfsg-2ubuntu8 | UNKNOWN |
ubuntu | 14.04 | noarch | qemu | <Â any | UNKNOWN |
ubuntu | 16.04 | noarch | qemu | <Â any | UNKNOWN |
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
EPSS
Percentile
39.9%