An issue was discovered in TCG Accelerator in QEMU 4.2.0, allows local attackers to execute arbitrary code, escalate privileges, and cause a denial of service (DoS). Note: This is disputed as a bug and not a valid security issue by multiple third parties.
References
| Link | Resource |
|---|---|
| https://bugs.launchpad.net/qemu/+bug/1863025 | Issue Tracking |
| https://lists.debian.org/debian-lts-announce/2023/10/msg00006.html | Mailing List Third Party Advisory |
| https://pastebin.com/iqCbjdT8 | Third Party Advisory |
| https://security.netapp.com/advisory/ntap-20231006-0012/ | Third Party Advisory |
| https://bugs.launchpad.net/qemu/+bug/1863025 | Issue Tracking |
| https://lists.debian.org/debian-lts-announce/2023/10/msg00006.html | Mailing List Third Party Advisory |
| https://pastebin.com/iqCbjdT8 | Third Party Advisory |
| https://security.netapp.com/advisory/ntap-20231006-0012/ | Third Party Advisory |
Configurations
History
21 Nov 2024, 05:14
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://bugs.launchpad.net/qemu/+bug/1863025 - Issue Tracking | |
| References | () https://lists.debian.org/debian-lts-announce/2023/10/msg00006.html - Mailing List, Third Party Advisory | |
| References | () https://pastebin.com/iqCbjdT8 - Third Party Advisory | |
| References | () https://security.netapp.com/advisory/ntap-20231006-0012/ - Third Party Advisory |
14 May 2024, 21:15
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | (en) An issue was discovered in TCG Accelerator in QEMU 4.2.0, allows local attackers to execute arbitrary code, escalate privileges, and cause a denial of service (DoS). Note: This is disputed as a bug and not a valid security issue by multiple third parties. |
13 Oct 2023, 01:17
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Debian
Debian debian Linux |
|
| CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* | |
| References | (MLIST) https://lists.debian.org/debian-lts-announce/2023/10/msg00006.html - Mailing List, Third Party Advisory | |
| References | (CONFIRM) https://security.netapp.com/advisory/ntap-20231006-0012/ - Third Party Advisory |
06 Oct 2023, 15:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
05 Oct 2023, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
01 Sep 2023, 15:06
| Type | Values Removed | Values Added |
|---|---|---|
| References | (MISC) https://pastebin.com/iqCbjdT8 - Third Party Advisory | |
| References | (MISC) https://bugs.launchpad.net/qemu/+bug/1863025 - Issue Tracking | |
| CPE | cpe:2.3:a:qemu:qemu:4.2.0:-:*:*:*:*:*:* | |
| First Time |
Qemu qemu
Qemu |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
| CWE | NVD-CWE-noinfo |
28 Aug 2023, 21:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2023-08-28 21:15
Updated : 2024-11-21 05:14
NVD link : CVE-2020-24165
Mitre link : CVE-2020-24165
CVE.ORG link : CVE-2020-24165
JSON object : View
Products Affected
qemu
- qemu
debian
- debian_linux
CWE
