Vulnerability CVE-2023-6683: Information
Description
A flaw was found in the QEMU built-in VNC server while processing ClientCutText messages. The qemu_clipboard_request() function can be reached before vnc_server_cut_text_caps() was called and had the chance to initialize the clipboard peer, leading to a NULL pointer dereference. This could allow a malicious authenticated VNC client to crash QEMU and trigger a denial of service.
Severity: MEDIUM (6.5) Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Fixed packages
Package name | Branch | Fixed in version | Version from repository | Errata ID | Task # | State |
---|---|---|---|---|---|---|
qemu | sisyphus | 8.2.1-alt1 | 8.2.3-alt1 | ALT-PU-2024-3359-1 | 341883 | Fixed |
qemu | sisyphus_loongarch64 | 8.2.1-alt2 | 8.2.3-alt1 | ALT-PU-2024-3591-1 | - | Fixed |
qemu | p10 | 8.2.2-alt0.p10 | 8.2.2-alt0.p10.1 | ALT-PU-2024-6235-3 | 344683 | Fixed |
qemu | c10f1 | 8.2.2-alt0.p10.1 | 8.2.2-alt0.p10.1 | ALT-PU-2024-7201-3 | 345913 | Fixed |
References to Advisories, Solutions, and Tools
Hyperlink | Resource |
---|---|
https://access.redhat.com/security/cve/CVE-2023-6683 |
|
RHBZ#2254825 |
|
https://security.netapp.com/advisory/ntap-20240223-0001/ |
|
RHSA-2024:2135 |