Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-58904 | A flaw was found in the QEMU built-in VNC server while processing ClientCutText messages. The qemu_clipboard_request() function can be reached before vnc_server_cut_text_caps() was called and had the chance to initialize the clipboard peer, leading to a NULL pointer dereference. This could allow a malicious authenticated VNC client to crash QEMU and trigger a denial of service. |
Ubuntu USN |
USN-6954-1 | QEMU vulnerabilities |
Solution
No solution given by the vendor.
Workaround
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Fri, 22 Nov 2024 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 15 Nov 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-11-08T07:10:34.148Z
Reserved: 2023-12-11T14:45:48.417Z
Link: CVE-2023-6683
Updated: 2024-08-02T08:35:15.116Z
Status : Analyzed
Published: 2024-01-12T19:15:11.480
Modified: 2025-05-02T15:10:54.503
Link: CVE-2023-6683
OpenCVE Enrichment
No data.
EUVD
Ubuntu USN