An issue was discovered in TCG Accelerator in QEMU 4.2.0, allows local attackers to execute arbitrary code, escalate privileges, and cause a denial of service (DoS). Note: This is disputed as a bug and not a valid security issue by multiple third parties.
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "1:4.2-3ubuntu6.28",
"binary_name": "qemu"
},
{
"binary_version": "1:4.2-3ubuntu6.28",
"binary_name": "qemu-block-extra"
},
{
"binary_version": "1:4.2-3ubuntu6.28",
"binary_name": "qemu-guest-agent"
},
{
"binary_version": "1:4.2-3ubuntu6.28",
"binary_name": "qemu-kvm"
},
{
"binary_version": "1:4.2-3ubuntu6.28",
"binary_name": "qemu-system"
},
{
"binary_version": "1:4.2-3ubuntu6.28",
"binary_name": "qemu-system-arm"
},
{
"binary_version": "1:4.2-3ubuntu6.28",
"binary_name": "qemu-system-common"
},
{
"binary_version": "1:4.2-3ubuntu6.28",
"binary_name": "qemu-system-data"
},
{
"binary_version": "1:4.2-3ubuntu6.28",
"binary_name": "qemu-system-gui"
},
{
"binary_version": "1:4.2-3ubuntu6.28",
"binary_name": "qemu-system-mips"
},
{
"binary_version": "1:4.2-3ubuntu6.28",
"binary_name": "qemu-system-misc"
},
{
"binary_version": "1:4.2-3ubuntu6.28",
"binary_name": "qemu-system-ppc"
},
{
"binary_version": "1:4.2-3ubuntu6.28",
"binary_name": "qemu-system-s390x"
},
{
"binary_version": "1:4.2-3ubuntu6.28",
"binary_name": "qemu-system-sparc"
},
{
"binary_version": "1:4.2-3ubuntu6.28",
"binary_name": "qemu-system-x86"
},
{
"binary_version": "1:4.2-3ubuntu6.28",
"binary_name": "qemu-system-x86-microvm"
},
{
"binary_version": "1:4.2-3ubuntu6.28",
"binary_name": "qemu-system-x86-xen"
},
{
"binary_version": "1:4.2-3ubuntu6.28",
"binary_name": "qemu-user"
},
{
"binary_version": "1:4.2-3ubuntu6.28",
"binary_name": "qemu-user-binfmt"
},
{
"binary_version": "1:4.2-3ubuntu6.28",
"binary_name": "qemu-user-static"
},
{
"binary_version": "1:4.2-3ubuntu6.28",
"binary_name": "qemu-utils"
}
]
}