Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2023-3354

Published: 11 July 2023

A flaw was found in the QEMU built-in VNC server. When a client connects to the VNC server, QEMU checks whether the current number of connections crosses a certain threshold and if so, cleans up the previous connection. If the previous connection happens to be in the handshake phase and fails, QEMU cleans up the connection again, resulting in a NULL pointer dereference issue. This could allow a remote unauthenticated client to cause a denial of service.

Notes

AuthorNote
Priority reason:
Limited to a denial of service in the VNC server component.
mdeslaur
VNC denial of service

Priority

Low

Cvss 3 Severity Score

7.5

Score breakdown

Status

Package Release Status
qemu
Launchpad, Ubuntu, Debian
bionic Needed

focal
Released (1:4.2-3ubuntu6.28)
jammy
Released (1:6.2+dfsg-2ubuntu6.16)
kinetic Ignored
(end of life, was deferred [2023-07-04])
lunar
Released (1:7.2+dfsg-5ubuntu2.4)
mantic Not vulnerable
(1:8.0.4+dfsg-1ubuntu3)
noble Not vulnerable
(1:8.0.4+dfsg-1ubuntu5)
trusty Needed

upstream Needs triage

xenial Needed

Patches:
upstream: https://gitlab.com/qemu-project/qemu/-/commit/10be627d2b5ec2d6b3dce045144aa739eef678b4

Severity score breakdown

Parameter Value
Base score 7.5
Attack vector Network
Attack complexity Low
Privileges required None
User interaction None
Scope Unchanged
Confidentiality None
Integrity impact None
Availability impact High
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H