{"id":"USN-6977-1","summary":"qemu vulnerabilities","details":"It was discovered that QEMU did not properly handle certain memory\noperations, which could result in a buffer overflow. An attacker could\npotentially use this issue to cause a denial of service. (CVE-2024-26327)\n\nIt was discovered that QEMU did not properly handle certain memory\noperations, which could result in an out-of-bounds memory access. An\nattacker could potentially use this issue to cause a denial of service.\n(CVE-2024-26328)\n","modified":"2026-02-10T04:45:04Z","published":"2024-08-22T04:04:17Z","related":["UBUNTU-CVE-2024-26327","UBUNTU-CVE-2024-26328"],"upstream":["CVE-2024-26327","CVE-2024-26328","UBUNTU-CVE-2024-26327","UBUNTU-CVE-2024-26328"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-6977-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-26327"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-26328"}],"affected":[{"package":{"name":"qemu","ecosystem":"Ubuntu:24.04:LTS","purl":"pkg:deb/ubuntu/qemu@1:8.2.2+ds-0ubuntu1.2?arch=source&distro=noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:8.2.2+ds-0ubuntu1.2"}]}],"versions":["1:8.0.4+dfsg-1ubuntu3","1:8.0.4+dfsg-1ubuntu4","1:8.0.4+dfsg-1ubuntu5","1:8.1.3+ds-1ubuntu2","1:8.2.1+ds-1ubuntu1","1:8.2.1+ds-1ubuntu8","1:8.2.1+ds-1ubuntu9","1:8.2.2+ds-0ubuntu1"],"ecosystem_specific":{"binaries":[{"binary_version":"1:8.2.2+ds-0ubuntu1.2","binary_name":"qemu-block-extra"},{"binary_version":"1:8.2.2+ds-0ubuntu1.2","binary_name":"qemu-block-supplemental"},{"binary_version":"1:8.2.2+ds-0ubuntu1.2","binary_name":"qemu-guest-agent"},{"binary_version":"1:8.2.2+ds-0ubuntu1.2","binary_name":"qemu-system"},{"binary_version":"1:8.2.2+ds-0ubuntu1.2","binary_name":"qemu-system-arm"},{"binary_version":"1:8.2.2+ds-0ubuntu1.2","binary_name":"qemu-system-common"},{"binary_version":"1:8.2.2+ds-0ubuntu1.2","binary_name":"qemu-system-data"},{"binary_version":"1:8.2.2+ds-0ubuntu1.2","binary_name":"qemu-system-gui"},{"binary_version":"1:8.2.2+ds-0ubuntu1.2","binary_name":"qemu-system-mips"},{"binary_version":"1:8.2.2+ds-0ubuntu1.2","binary_name":"qemu-system-misc"},{"binary_version":"1:8.2.2+ds-0ubuntu1.2","binary_name":"qemu-system-modules-opengl"},{"binary_version":"1:8.2.2+ds-0ubuntu1.2","binary_name":"qemu-system-modules-spice"},{"binary_version":"1:8.2.2+ds-0ubuntu1.2","binary_name":"qemu-system-ppc"},{"binary_version":"1:8.2.2+ds-0ubuntu1.2","binary_name":"qemu-system-s390x"},{"binary_version":"1:8.2.2+ds-0ubuntu1.2","binary_name":"qemu-system-sparc"},{"binary_version":"1:8.2.2+ds-0ubuntu1.2","binary_name":"qemu-system-x86"},{"binary_version":"1:8.2.2+ds-0ubuntu1.2","binary_name":"qemu-system-x86-xen"},{"binary_version":"1:8.2.2+ds-0ubuntu1.2","binary_name":"qemu-system-xen"},{"binary_version":"1:8.2.2+ds-0ubuntu1.2","binary_name":"qemu-user"},{"binary_version":"1:8.2.2+ds-0ubuntu1.2","binary_name":"qemu-user-binfmt"},{"binary_version":"1:8.2.2+ds-0ubuntu1.2","binary_name":"qemu-user-static"},{"binary_version":"1:8.2.2+ds-0ubuntu1.2","binary_name":"qemu-utils"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6977-1.json","cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-26327"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-26328"}],"ecosystem":"Ubuntu:24.04:LTS"}}}],"schema_version":"1.7.3"}