First published: Sat Dec 16 2023(Updated: )
A flaw was found in the QEMU built-in VNC server while processing ClientCutText messages. The qemu_clipboard_request() function can be reached before vnc_server_cut_text_caps() was called and had the chance to initialize the clipboard peer, leading to a NULL pointer dereference. This could allow a malicious authenticated VNC client to crash QEMU and trigger a denial of service.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/qemu-kvm | <9.0.0 | 9.0.0 |
debian/qemu | 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u7 1:9.0.2+ds-2 1:9.1.0+ds-3 | |
QEMU KVM | >=6.1.0<9.0.0 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6683 has been identified as a vulnerability leading to a NULL pointer dereference in the QEMU VNC server.
To fix CVE-2023-6683, update to QEMU version 9.0.0 or later, or apply the appropriate patches provided by your distribution.
CVE-2023-6683 affects QEMU versions before 9.0.0, including versions between 6.1.0 and 9.0.0.
CVE-2023-6683 impacts packages such as qemu-kvm from Red Hat and qemu from Debian.
Exploiting CVE-2023-6683 may lead to unexpected application crashes due to a NULL pointer dereference within the VNC server.