6.5 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): NONE
- Integrity impact (I): NONE
- Availability impact (A): HIGH
Qemu: vnc: null pointer dereference in qemu_clipboard_request()
A flaw was found in the QEMU built-in VNC server while processing ClientCutText messages. The qemu_clipboard_request() function can be reached before vnc_server_cut_text_caps() was called and had the chance to initialize the clipboard peer, leading to a NULL pointer dereference. This could allow a malicious authenticated VNC client to crash QEMU and trigger a denial of service.
References
- https://access.redhat.com/security/cve/CVE-2023-6683 x_refsource_REDHAT vdb-entry
- RHBZ#2254825 issue-tracking x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2023-6683 x_refsource_REDHAT vdb-entry
- RHBZ#2254825 issue-tracking x_refsource_REDHAT
- RHBZ#2254825 issue-tracking x_refsource_REDHAT
- https://security.netapp.com/advisory/ntap-20240223-0001/
- https://access.redhat.com/security/cve/CVE-2023-6683 x_refsource_REDHAT vdb-entry
- https://access.redhat.com/security/cve/CVE-2023-6683 x_refsource_REDHAT vdb-entry
- RHBZ#2254825 issue-tracking x_refsource_REDHAT
- https://security.netapp.com/advisory/ntap-20240223-0001/
- https://security.netapp.com/advisory/ntap-20240223-0001/
- RHSA-2024:2135 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2023-6683 x_refsource_REDHAT vdb-entry
- RHBZ#2254825 issue-tracking x_refsource_REDHAT
- RHSA-2024:2135 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2023-6683 x_refsource_REDHAT vdb-entry
- RHBZ#2254825 issue-tracking x_refsource_REDHAT
- https://security.netapp.com/advisory/ntap-20240223-0001/
- https://security.netapp.com/advisory/ntap-20240223-0001/
- RHSA-2024:2135 vendor-advisory x_refsource_REDHAT
- RHSA-2024:2962 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2023-6683 x_refsource_REDHAT vdb-entry
- RHBZ#2254825 issue-tracking x_refsource_REDHAT
- RHBZ#2254825 issue-tracking x_refsource_REDHAT
- https://security.netapp.com/advisory/ntap-20240223-0001/
- RHSA-2024:2135 vendor-advisory x_refsource_REDHAT
- RHSA-2024:2962 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2023-6683 x_refsource_REDHAT vdb-entry
- RHSA-2024:2135 vendor-advisory x_refsource_REDHAT
- RHSA-2024:2962 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2023-6683 x_refsource_REDHAT vdb-entry
- RHBZ#2254825 issue-tracking x_refsource_REDHAT
- https://security.netapp.com/advisory/ntap-20240223-0001/
- RHSA-2024:2135 vendor-advisory x_refsource_REDHAT
- RHSA-2024:2962 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2023-6683 x_refsource_REDHAT vdb-entry
- RHBZ#2254825 issue-tracking x_refsource_REDHAT
- https://security.netapp.com/advisory/ntap-20240223-0001/
- RHSA-2024:2135 vendor-advisory x_refsource_REDHAT x_transferred
- RHSA-2024:2962 vendor-advisory x_refsource_REDHAT x_transferred
- https://access.redhat.com/security/cve/CVE-2023-6683 x_transferred x_refsource_REDHAT vdb-entry
- RHBZ#2254825 issue-tracking x_refsource_REDHAT x_transferred
- https://security.netapp.com/advisory/ntap-20240223-0001/ x_transferred
- RHSA-2024:2135 vendor-advisory x_refsource_REDHAT
- RHSA-2024:2962 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2023-6683 x_refsource_REDHAT vdb-entry
- RHBZ#2254825 issue-tracking x_refsource_REDHAT
- https://security.netapp.com/advisory/ntap-20240223-0001/
- RHSA-2024:2135 vendor-advisory x_refsource_REDHAT x_transferred
- RHSA-2024:2962 vendor-advisory x_refsource_REDHAT x_transferred
- https://access.redhat.com/security/cve/CVE-2023-6683 x_transferred x_refsource_REDHAT vdb-entry
- RHBZ#2254825 issue-tracking x_refsource_REDHAT x_transferred
- https://security.netapp.com/advisory/ntap-20240223-0001/ x_transferred
- RHSA-2024:2135 vendor-advisory x_refsource_REDHAT
- RHSA-2024:2962 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2023-6683 x_refsource_REDHAT vdb-entry
- RHBZ#2254825 issue-tracking x_refsource_REDHAT
- RHSA-2024:2135 vendor-advisory x_refsource_REDHAT x_transferred
- RHSA-2024:2962 vendor-advisory x_refsource_REDHAT x_transferred
- https://access.redhat.com/security/cve/CVE-2023-6683 x_transferred x_refsource_REDHAT vdb-entry
- RHBZ#2254825 issue-tracking x_refsource_REDHAT x_transferred
- https://security.netapp.com/advisory/ntap-20240223-0001/ x_transferred
- RHSA-2024:2135 vendor-advisory x_refsource_REDHAT
- RHSA-2024:2962 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2023-6683 x_refsource_REDHAT vdb-entry
- RHBZ#2254825 issue-tracking x_refsource_REDHAT
- RHBZ#2254825 issue-tracking x_refsource_REDHAT x_transferred
- https://security.netapp.com/advisory/ntap-20240223-0001/ x_transferred
- RHSA-2024:2135 vendor-advisory x_refsource_REDHAT x_transferred
- RHSA-2024:2962 vendor-advisory x_refsource_REDHAT x_transferred
- https://access.redhat.com/security/cve/CVE-2023-6683 x_transferred x_refsource_REDHAT vdb-entry
- RHSA-2024:2135 vendor-advisory x_refsource_REDHAT
- RHSA-2024:2962 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2023-6683 x_refsource_REDHAT vdb-entry
- RHBZ#2254825 issue-tracking x_refsource_REDHAT
- RHSA-2024:2135 vendor-advisory x_refsource_REDHAT x_transferred
- RHSA-2024:2962 vendor-advisory x_refsource_REDHAT x_transferred
- https://access.redhat.com/security/cve/CVE-2023-6683 x_transferred x_refsource_REDHAT vdb-entry
- RHBZ#2254825 issue-tracking x_refsource_REDHAT x_transferred
- https://security.netapp.com/advisory/ntap-20240223-0001/ x_transferred
- RHSA-2024:2135 vendor-advisory x_refsource_REDHAT
- RHSA-2024:2962 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2023-6683 x_refsource_REDHAT vdb-entry
- RHBZ#2254825 issue-tracking x_refsource_REDHAT
- RHSA-2024:2135 vendor-advisory x_refsource_REDHAT x_transferred
- RHSA-2024:2962 vendor-advisory x_refsource_REDHAT x_transferred
- https://access.redhat.com/security/cve/CVE-2023-6683 x_transferred x_refsource_REDHAT vdb-entry
- RHBZ#2254825 issue-tracking x_refsource_REDHAT x_transferred
- https://security.netapp.com/advisory/ntap-20240223-0001/ x_transferred
- RHSA-2024:2135 vendor-advisory x_refsource_REDHAT
- RHSA-2024:2962 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2023-6683 x_refsource_REDHAT vdb-entry
- RHBZ#2254825 issue-tracking x_refsource_REDHAT
- RHSA-2024:2962 vendor-advisory x_refsource_REDHAT x_transferred
- https://access.redhat.com/security/cve/CVE-2023-6683 x_transferred x_refsource_REDHAT vdb-entry
- RHBZ#2254825 issue-tracking x_refsource_REDHAT x_transferred
- https://security.netapp.com/advisory/ntap-20240223-0001/ x_transferred
- RHSA-2024:2135 vendor-advisory x_refsource_REDHAT x_transferred
- RHBZ#2254825 issue-tracking x_refsource_REDHAT
- RHSA-2024:2135 vendor-advisory x_refsource_REDHAT
- RHSA-2024:2962 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2023-6683 x_refsource_REDHAT vdb-entry
- RHSA-2024:2135 vendor-advisory x_refsource_REDHAT x_transferred
- RHSA-2024:2962 vendor-advisory x_refsource_REDHAT x_transferred
- https://access.redhat.com/security/cve/CVE-2023-6683 x_transferred x_refsource_REDHAT vdb-entry
- RHBZ#2254825 issue-tracking x_refsource_REDHAT x_transferred
- https://security.netapp.com/advisory/ntap-20240223-0001/ x_transferred
- RHSA-2024:2135 vendor-advisory x_refsource_REDHAT
- RHSA-2024:2962 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2023-6683 x_refsource_REDHAT vdb-entry
- RHBZ#2254825 issue-tracking x_refsource_REDHAT
- RHSA-2024:2135 vendor-advisory x_refsource_REDHAT x_transferred
- RHSA-2024:2962 vendor-advisory x_refsource_REDHAT x_transferred
- https://access.redhat.com/security/cve/CVE-2023-6683 x_transferred x_refsource_REDHAT vdb-entry
- RHBZ#2254825 issue-tracking x_refsource_REDHAT x_transferred
- https://security.netapp.com/advisory/ntap-20240223-0001/ x_transferred
- RHSA-2024:2135 vendor-advisory x_refsource_REDHAT
- RHSA-2024:2962 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2023-6683 x_refsource_REDHAT vdb-entry
- RHBZ#2254825 issue-tracking x_refsource_REDHAT
- RHSA-2024:2135 vendor-advisory x_refsource_REDHAT x_transferred
- RHSA-2024:2962 vendor-advisory x_refsource_REDHAT x_transferred
- https://access.redhat.com/security/cve/CVE-2023-6683 x_transferred x_refsource_REDHAT vdb-entry
- RHBZ#2254825 issue-tracking x_refsource_REDHAT x_transferred
- https://security.netapp.com/advisory/ntap-20240223-0001/ x_transferred
Affected products
- *
- *
- *
Matching in nixpkgs
pkgs.qemu
Generic and open source machine emulator and virtualizer
-
nixos-unstable -
- nixpkgs-unstable 10.1.0
pkgs.qemu_kvm
Generic and open source machine emulator and virtualizer
-
nixos-unstable -
- nixpkgs-unstable 10.1.0
pkgs.qemu_xen
Generic and open source machine emulator and virtualizer
-
nixos-unstable -
- nixpkgs-unstable 10.1.0
pkgs.qemu-user
QEMU User space emulator - launch executables compiled for one CPU on another CPU
-
nixos-unstable -
- nixpkgs-unstable 10.1.0
pkgs.qemu_full
Generic and open source machine emulator and virtualizer
-
nixos-unstable -
- nixpkgs-unstable 10.1.0
pkgs.qemu_test
Generic and open source machine emulator and virtualizer
-
nixos-unstable -
- nixpkgs-unstable 10.1.0
pkgs.qemu-utils
Generic and open source machine emulator and virtualizer
-
nixos-unstable -
- nixpkgs-unstable 10.1.0
pkgs.canokey-qemu
CanoKey QEMU Virt Card
-
nixos-unstable -
- nixpkgs-unstable 0-unstable-2023-06-06
pkgs.ubootQemuX86
Boot loader for embedded systems
-
nixos-unstable -
- nixpkgs-unstable x86_defconfig-2025.07
pkgs.ubootQemuX86_64
Boot loader for embedded systems
-
nixos-unstable -
- nixpkgs-unstable x86_64_defconfig-2025.07
pkgs.ubootQemuAarch64
Boot loader for embedded systems
-
nixos-unstable -
- nixpkgs-unstable qemu_arm64_defconfig-2025.07
pkgs.qemu-python-utils
Python tooling used by the QEMU project to build, configure, and test QEMU
-
nixos-unstable -
- nixpkgs-unstable 0.6.1.0a1
pkgs.armTrustedFirmwareQemu
Reference implementation of secure world software for ARMv8-A
-
nixos-unstable -
- nixpkgs-unstable 2.13.0
pkgs.python312Packages.qemu
Python tooling used by the QEMU project to build, configure, and test QEMU
-
nixos-unstable -
- nixpkgs-unstable 0.6.1.0a1
pkgs.python313Packages.qemu
Python tooling used by the QEMU project to build, configure, and test QEMU
-
nixos-unstable -
- nixpkgs-unstable 0.6.1.0a1
pkgs.python312Packages.qemu-qmp
Asyncio library for communicating with QEMU Monitor Protocol (“QMP”) servers
-
nixos-unstable -
- nixpkgs-unstable 0.0.3
pkgs.python313Packages.qemu-qmp
Asyncio library for communicating with QEMU Monitor Protocol (“QMP”) servers
-
nixos-unstable -
- nixpkgs-unstable 0.0.3
Package maintainers
-
@lopsided98 Ben Wolsieffer <benwolsieffer@gmail.com>
-
@oxalica oxalica <oxalicc@pm.me>
-
@devplayer0 Jack O'Sullivan <dev@nul.ie>
-
@DavHau David Hauer <d.hauer.it@gmail.com>
-
@brianmcgillion Brian McGillion <bmg.avoin@gmail.com>
-
@alyssais Alyssa Ross <hi@alyssa.is>
-
@hehongbo Hongbo
-
@SigmaSquadron Fernando Rodrigues <alpha@sigmasquadron.net>
-
@CertainLach Yaroslav Bolyukin <iam@lach.pw>
-
@dezgeg Tuomas Tynkkynen <tuomas.tynkkynen@iki.fi>