A stack overflow vulnerability was found in the Intel HD Audio device (intel-hda) of QEMU. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition. The highest threat from this vulnerability is to system availability. This flaw affects QEMU versions prior to 7.0.0.
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "1:6.2+dfsg-2ubuntu6.16",
"binary_name": "qemu"
},
{
"binary_version": "1:6.2+dfsg-2ubuntu6.16",
"binary_name": "qemu-block-extra"
},
{
"binary_version": "1:6.2+dfsg-2ubuntu6.16",
"binary_name": "qemu-guest-agent"
},
{
"binary_version": "1:6.2+dfsg-2ubuntu6.16",
"binary_name": "qemu-system"
},
{
"binary_version": "1:6.2+dfsg-2ubuntu6.16",
"binary_name": "qemu-system-arm"
},
{
"binary_version": "1:6.2+dfsg-2ubuntu6.16",
"binary_name": "qemu-system-common"
},
{
"binary_version": "1:6.2+dfsg-2ubuntu6.16",
"binary_name": "qemu-system-data"
},
{
"binary_version": "1:6.2+dfsg-2ubuntu6.16",
"binary_name": "qemu-system-gui"
},
{
"binary_version": "1:6.2+dfsg-2ubuntu6.16",
"binary_name": "qemu-system-mips"
},
{
"binary_version": "1:6.2+dfsg-2ubuntu6.16",
"binary_name": "qemu-system-misc"
},
{
"binary_version": "1:6.2+dfsg-2ubuntu6.16",
"binary_name": "qemu-system-ppc"
},
{
"binary_version": "1:6.2+dfsg-2ubuntu6.16",
"binary_name": "qemu-system-s390x"
},
{
"binary_version": "1:6.2+dfsg-2ubuntu6.16",
"binary_name": "qemu-system-sparc"
},
{
"binary_version": "1:6.2+dfsg-2ubuntu6.16",
"binary_name": "qemu-system-x86"
},
{
"binary_version": "1:6.2+dfsg-2ubuntu6.16",
"binary_name": "qemu-system-x86-microvm"
},
{
"binary_version": "1:6.2+dfsg-2ubuntu6.16",
"binary_name": "qemu-system-x86-xen"
},
{
"binary_version": "1:6.2+dfsg-2ubuntu6.16",
"binary_name": "qemu-user"
},
{
"binary_version": "1:6.2+dfsg-2ubuntu6.16",
"binary_name": "qemu-user-binfmt"
},
{
"binary_version": "1:6.2+dfsg-2ubuntu6.16",
"binary_name": "qemu-user-static"
},
{
"binary_version": "1:6.2+dfsg-2ubuntu6.16",
"binary_name": "qemu-utils"
}
]
}