ALAS2-2023-2061 --- qemuID: oval:org.secpod.oval:def:1701322 | Date: (C)2023-06-13 (M)2024-05-22 |
Class: PATCH | Family: unix |
A NULL pointer dereference flaw was found in the floppy disk emulator of QEMU. This issue occurs while processing read/write ioport commands if the selected floppy drive is not initialized with a block device. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability. A use-after-free flaw was found in the MegaRAID emulator of QEMU. This issue occurs while processing SCSI I/O requests in the case of an error mptsas_free_request that does not dequeue the request object 'req' from a pending requests queue. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. Versions between 2.10.0 and 5.2.0 are potentially affected. A flaw was found in the USB redirector device of QEMU. Small USB packets are combined into a single, large transfer request, to reduce the overhead and improve performance. The combined size of the bulk transfer is used to dynamically allocate a variable length array on the stack without proper validation. Since the total size is not bounded, a malicious guest could use this flaw to influence the array length and cause the QEMU process to perform an excessive allocation on the stack, resulting in a denial of service. An off-by-one error was found in the SCSI device emulation in QEMU. It could occur while processing MODE SELECT commands in mode_sense_page if the 'page' argument was set to MODE_PAGE_ALLS . A malicious guest could use this flaw to potentially crash QEMU, resulting in a denial of service condition. A flaw was found in the QXL display device emulation in QEMU. A double fetch of guest controlled values `cursor-greater than header.width` and `cursor-greater than header.height` can lead to the allocation of a small cursor object followed by a subsequent heap-based buffer overflow. A malicious privileged guest user could use this flaw to crash the QEMU process on the host or potentially execute arbitrary code within the context of the QEMU process. An out-of-bounds read flaw was found in the QXL display device emulation in QEMU. The qxl_phys2virt function does not check the size of the structure pointed to by the guest physical address, potentially reading past the end of the bar space into adjacent pages. A malicious guest user could use this flaw to crash the QEMU process on the host causing a denial of service condition
Product: |
qemu |
ivshmem-tools |
qemu-guest-agent |
qemu-img |