vulnerability

Rocky Linux: CVE-2023-42467: qemu-kvm (RLSA-2024-2135)

Severity
5
CVSS
(AV:L/AC:L/Au:S/C:N/I:N/A:C)
Published
09/11/2023
Added
05/13/2024
Modified
01/28/2025

Description

QEMU through 8.0.0 could trigger a division by zero in scsi_disk_reset in hw/scsi/scsi-disk.c because scsi_disk_emulate_mode_select does not prevent s->qdev.blocksize from being 256. This stops QEMU and the guest immediately.

Solution(s)

rocky-upgrade-qemu-guest-agentrocky-upgrade-qemu-guest-agent-debuginforocky-upgrade-qemu-imgrocky-upgrade-qemu-img-debuginforocky-upgrade-qemu-kvmrocky-upgrade-qemu-kvm-audio-parocky-upgrade-qemu-kvm-audio-pa-debuginforocky-upgrade-qemu-kvm-block-blkiorocky-upgrade-qemu-kvm-block-blkio-debuginforocky-upgrade-qemu-kvm-block-curlrocky-upgrade-qemu-kvm-block-curl-debuginforocky-upgrade-qemu-kvm-block-rbdrocky-upgrade-qemu-kvm-block-rbd-debuginforocky-upgrade-qemu-kvm-commonrocky-upgrade-qemu-kvm-common-debuginforocky-upgrade-qemu-kvm-corerocky-upgrade-qemu-kvm-core-debuginforocky-upgrade-qemu-kvm-debuginforocky-upgrade-qemu-kvm-debugsourcerocky-upgrade-qemu-kvm-device-display-virtio-gpurocky-upgrade-qemu-kvm-device-display-virtio-gpu-ccwrocky-upgrade-qemu-kvm-device-display-virtio-gpu-ccw-debuginforocky-upgrade-qemu-kvm-device-display-virtio-gpu-debuginforocky-upgrade-qemu-kvm-device-display-virtio-gpu-pcirocky-upgrade-qemu-kvm-device-display-virtio-gpu-pci-debuginforocky-upgrade-qemu-kvm-device-display-virtio-vgarocky-upgrade-qemu-kvm-device-display-virtio-vga-debuginforocky-upgrade-qemu-kvm-device-usb-hostrocky-upgrade-qemu-kvm-device-usb-host-debuginforocky-upgrade-qemu-kvm-device-usb-redirectrocky-upgrade-qemu-kvm-device-usb-redirect-debuginforocky-upgrade-qemu-kvm-docsrocky-upgrade-qemu-kvm-toolsrocky-upgrade-qemu-kvm-tools-debuginforocky-upgrade-qemu-kvm-ui-egl-headlessrocky-upgrade-qemu-kvm-ui-egl-headless-debuginforocky-upgrade-qemu-kvm-ui-openglrocky-upgrade-qemu-kvm-ui-opengl-debuginforocky-upgrade-qemu-pr-helperrocky-upgrade-qemu-pr-helper-debuginfo
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.