CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
5.1%
qemu is vulnerable to Buffer Overflows. A guest I/O address overflow vulnerability allows an attacker to overwrite arbitrary memory on the host system by exploiting a flaw in the way that QEMU handles guest I/O operations.
access.redhat.com/errata/RHSA-2024:2135
access.redhat.com/errata/RHSA-2024:2962
access.redhat.com/security/cve/CVE-2023-5088
bugzilla.redhat.com/show_bug.cgi?id=2247283
lists.debian.org/debian-lts-announce/2024/03/msg00012.html
lore.kernel.org/all/[email protected]/T/
security-tracker.debian.org/tracker/CVE-2023-5088
security.netapp.com/advisory/ntap-20231208-0005/