Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
DLA-3759-1 | qemu security update |
![]() |
DLA-4144-1 | qemu security update |
![]() |
EUVD-2023-57428 | A bug in QEMU could cause a guest I/O operation otherwise addressed to an arbitrary disk offset to be targeted to offset 0 instead (potentially overwriting the VM's boot code). This could be used, for example, by L2 guests with a virtual disk (vdiskL2) stored on a virtual disk of an L1 (vdiskL1) hypervisor to read and/or write data to LBA 0 of vdiskL1, potentially gaining control of L1 at its next reboot. |
![]() |
USN-6567-1 | QEMU vulnerabilities |
Solution
No solution given by the vendor.
Workaround
Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Thu, 12 Jun 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 22 Nov 2024 12:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Fri, 13 Sep 2024 19:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-09-26T06:26:56.899Z
Reserved: 2023-09-20T14:21:47.295Z
Link: CVE-2023-5088

Updated: 2024-08-02T07:44:53.804Z

Status : Modified
Published: 2023-11-03T14:15:08.560
Modified: 2024-11-21T08:41:02.500
Link: CVE-2023-5088


No data.