QEMU (aka Quick Emulator) built with the NE2000 device emulation support is vulnerable to an OOB r/w access issue. It could occur while performing 'ioport' r/w operations. A privileged (CAPSYSRAWIO) user/process could use this flaw to leak or corrupt QEMU memory bytes.
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "2.0.0+dfsg-2ubuntu1.22",
"binary_name": "qemu"
},
{
"binary_version": "2.0.0+dfsg-2ubuntu1.22",
"binary_name": "qemu-common"
},
{
"binary_version": "2.0.0+dfsg-2ubuntu1.22",
"binary_name": "qemu-guest-agent"
},
{
"binary_version": "2.0.0+dfsg-2ubuntu1.22",
"binary_name": "qemu-keymaps"
},
{
"binary_version": "2.0.0+dfsg-2ubuntu1.22",
"binary_name": "qemu-kvm"
},
{
"binary_version": "2.0.0+dfsg-2ubuntu1.22",
"binary_name": "qemu-system"
},
{
"binary_version": "2.0.0+dfsg-2ubuntu1.22",
"binary_name": "qemu-system-aarch64"
},
{
"binary_version": "2.0.0+dfsg-2ubuntu1.22",
"binary_name": "qemu-system-arm"
},
{
"binary_version": "2.0.0+dfsg-2ubuntu1.22",
"binary_name": "qemu-system-common"
},
{
"binary_version": "2.0.0+dfsg-2ubuntu1.22",
"binary_name": "qemu-system-mips"
},
{
"binary_version": "2.0.0+dfsg-2ubuntu1.22",
"binary_name": "qemu-system-misc"
},
{
"binary_version": "2.0.0+dfsg-2ubuntu1.22",
"binary_name": "qemu-system-ppc"
},
{
"binary_version": "2.0.0+dfsg-2ubuntu1.22",
"binary_name": "qemu-system-sparc"
},
{
"binary_version": "2.0.0+dfsg-2ubuntu1.22",
"binary_name": "qemu-system-x86"
},
{
"binary_version": "2.0.0+dfsg-2ubuntu1.22",
"binary_name": "qemu-user"
},
{
"binary_version": "2.0.0+dfsg-2ubuntu1.22",
"binary_name": "qemu-user-static"
},
{
"binary_version": "2.0.0+dfsg-2ubuntu1.22",
"binary_name": "qemu-utils"
}
]
}