Exploit maturity not defined.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade AlmaLinux:8
virt:rhel/nbdkit-python-plugin
to version 0:1.24.0-4.module_el8.6.0+2880+7d9e3703 or higher.
This issue was patched in ALSA-2022:5821
.
Note: Versions mentioned in the description apply only to the upstream virt:rhel/nbdkit-python-plugin
package and not the virt:rhel/nbdkit-python-plugin
package as distributed by AlmaLinux
.
See How to fix?
for AlmaLinux:8
relevant fixed versions and status.
A flaw was found in the QXL display device emulation in QEMU. A double fetch of guest controlled values cursor->header.width
and cursor->header.height
can lead to the allocation of a small cursor object followed by a subsequent heap-based buffer overflow. A malicious privileged guest user could use this flaw to crash the QEMU process on the host or potentially execute arbitrary code within the context of the QEMU process.