Qemu: virtio-net: stack buffer overflow in virtio_net_flush_tx()
CVE-2023-6693

4.9MEDIUM

Summary

A stack based buffer overflow was found in the virtio-net device of QEMU. This issue occurs when flushing TX in the virtio_net_flush_tx function if guest features VIRTIO_NET_F_HASH_REPORT, VIRTIO_F_VERSION_1 and VIRTIO_NET_F_MRG_RXBUF are enabled. This could allow a malicious user to overwrite local variables allocated on the stack. Specifically, the out_sg variable could be used to read a part of process memory and send it to the wire, causing an information leak.

Affected Version(s)

Red Hat Enterprise Linux 8 8100020240314161907.e155f54d

Red Hat Enterprise Linux 8 8100020240314161907.e155f54d

References

CVSS V3.1

Score:
4.9
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Local
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Red Hat would like to thank Xiao Lei (Zhejiang University) for reporting this issue.
.