Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.10.2024.0387
Category:Mageia Linux Local Security Checks
Title:Mageia: Security Advisory (MGASA-2024-0387)
Summary:The remote host is missing an update for the 'qemu' package(s) announced via the MGASA-2024-0387 advisory.
Description:Summary:
The remote host is missing an update for the 'qemu' package(s) announced via the MGASA-2024-0387 advisory.

Vulnerability Insight:
A flaw was found in the QEMU implementation of VMWare's paravirtual RDMA
device. This flaw allows a crafted guest driver to allocate and
initialize a huge number of page tables to be used as a ring of
descriptors for CQ and async events, potentially leading to an
out-of-bounds read and crash of QEMU. (CVE-2023-1544)
A DMA reentrancy issue leading to a use-after-free error was found in
the e1000e NIC emulation code in QEMU. This issue could allow a
privileged guest user to crash the QEMU process on the host, resulting
in a denial of service. (CVE-2023-3019)
A flaw was found in the QEMU built-in VNC server while processing
ClientCutText messages. A wrong exit condition may lead to an infinite
loop when inflating an attacker controlled zlib buffer in the
`inflate_buffer` function. This could allow a remote authenticated
client who is able to send a clipboard to the VNC server to trigger a
denial of service. (CVE-2023-3255)
A bug in QEMU could cause a guest I/O operation otherwise addressed to
an arbitrary disk offset to be targeted to offset 0 instead (potentially
overwriting the VM's boot code). This could be used, for example, by L2
guests with a virtual disk (vdiskL2) stored on a virtual disk of an L1
(vdiskL1) hypervisor to read and/or write data to LBA 0 of vdiskL1,
potentially gaining control of L1 at its next reboot. (CVE-2023-5088)
A flaw was found in the QEMU built-in VNC server while processing
ClientCutText messages. The qemu_clipboard_request() function can be
reached before vnc_server_cut_text_caps() was called and had the chance
to initialize the clipboard peer, leading to a NULL pointer dereference.
This could allow a malicious authenticated VNC client to crash QEMU and
trigger a denial of service. (CVE-2023-6683)
A stack based buffer overflow was found in the virtio-net device of
QEMU. This issue occurs when flushing TX in the virtio_net_flush_tx
function if guest features VIRTIO_NET_F_HASH_REPORT, VIRTIO_F_VERSION_1
and VIRTIO_NET_F_MRG_RXBUF are enabled. This could allow a malicious
user to overwrite local variables allocated on the stack. Specifically,
the `out_sg` variable could be used to read a part of process memory and
send it to the wire, causing an information leak. (CVE-2023-6693)
QEMU through 8.0.0 could trigger a division by zero in scsi_disk_reset
in hw/scsi/scsi-disk.c because scsi_disk_emulate_mode_select does not
prevent s->qdev.blocksize from being 256. This stops QEMU and the guest
immediately. (CVE-2023-42467)
QEMU before 8.2.0 has an integer underflow, and resultant buffer
overflow, via a TI command when an expected non-DMA transfer length is
less than the length of the available FIFO data. This occurs in
esp_do_nodma in hw/scsi/esp.c because of an underflow of async_len.
(CVE-2024-24474)
An issue was discovered in QEMU 7.1.0 through 8.2.1. register_vfs in
hw/pci/pcie_sriov.c mishandles the situation where a guest writes NumVFs
greater ... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'qemu' package(s) on Mageia 9.

Solution:
Please install the updated package(s).

CVSS Score:
6.5

CVSS Vector:
AV:L/AC:L/Au:M/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2023-1544
https://access.redhat.com/security/cve/CVE-2023-1544
https://bugzilla.redhat.com/show_bug.cgi?id=2180364
https://lists.nongnu.org/archive/html/qemu-devel/2023-03/msg00206.html
https://security.netapp.com/advisory/ntap-20230511-0005/
Common Vulnerability Exposure (CVE) ID: CVE-2023-3019
RHBZ#2222351
https://bugzilla.redhat.com/show_bug.cgi?id=2222351
RHSA-2024:0135
https://access.redhat.com/errata/RHSA-2024:0135
RHSA-2024:0404
https://access.redhat.com/errata/RHSA-2024:0404
RHSA-2024:0569
https://access.redhat.com/errata/RHSA-2024:0569
RHSA-2024:2135
https://access.redhat.com/errata/RHSA-2024:2135
https://access.redhat.com/security/cve/CVE-2023-3019
https://security.netapp.com/advisory/ntap-20230831-0005/
Common Vulnerability Exposure (CVE) ID: CVE-2023-3255
RHBZ#2218486
https://bugzilla.redhat.com/show_bug.cgi?id=2218486
RHSA-2024:2962
https://access.redhat.com/errata/RHSA-2024:2962
https://access.redhat.com/security/cve/CVE-2023-3255
https://security.netapp.com/advisory/ntap-20231020-0008/
Common Vulnerability Exposure (CVE) ID: CVE-2023-42467
https://gitlab.com/qemu-project/qemu/-/commit/7cfcc79b0ab800959716738aff9419f53fc68c9c
https://gitlab.com/qemu-project/qemu/-/issues/1813
Common Vulnerability Exposure (CVE) ID: CVE-2023-5088
RHBZ#2247283
https://bugzilla.redhat.com/show_bug.cgi?id=2247283
https://access.redhat.com/security/cve/CVE-2023-5088
https://lists.debian.org/debian-lts-announce/2024/03/msg00012.html
https://lore.kernel.org/all/20230921160712.99521-1-simon.rowe@nutanix.com/T/
https://security.netapp.com/advisory/ntap-20231208-0005/
Common Vulnerability Exposure (CVE) ID: CVE-2023-6683
RHBZ#2254825
https://bugzilla.redhat.com/show_bug.cgi?id=2254825
https://access.redhat.com/security/cve/CVE-2023-6683
https://security.netapp.com/advisory/ntap-20240223-0001/
Common Vulnerability Exposure (CVE) ID: CVE-2023-6693
RHBZ#2254580
https://bugzilla.redhat.com/show_bug.cgi?id=2254580
https://access.redhat.com/security/cve/CVE-2023-6693
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OYGUN5HVOXESW7MSNM44E4AE2VNXQB6Y/
https://security.netapp.com/advisory/ntap-20240208-0004/
Common Vulnerability Exposure (CVE) ID: CVE-2024-24474
https://gist.github.com/1047524396/5ce07b9d387095c276b1cd234ae5615e
https://github.com/qemu/qemu/commit/77668e4b9bca03a856c27ba899a2513ddf52bb52
https://gitlab.com/qemu-project/qemu/-/issues/1810
Common Vulnerability Exposure (CVE) ID: CVE-2024-26327
https://lore.kernel.org/all/20240214-reuse-v4-5-89ad093a07f4@daynix.com/
Common Vulnerability Exposure (CVE) ID: CVE-2024-26328
https://lore.kernel.org/all/20240213055345-mutt-send-email-mst@kernel.org/
Common Vulnerability Exposure (CVE) ID: CVE-2024-3446
RHBZ#2274211
https://bugzilla.redhat.com/show_bug.cgi?id=2274211
https://access.redhat.com/security/cve/CVE-2024-3446
https://patchew.org/QEMU/20240409105537.18308-1-philmd@linaro.org/
Common Vulnerability Exposure (CVE) ID: CVE-2024-3447
Common Vulnerability Exposure (CVE) ID: CVE-2024-4467
Common Vulnerability Exposure (CVE) ID: CVE-2024-7409
Common Vulnerability Exposure (CVE) ID: CVE-2024-8354
Common Vulnerability Exposure (CVE) ID: CVE-2024-8612
CopyrightCopyright (C) 2024 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.