Qemu: virtio-net: stack buffer overflow in virtio_net_flush_tx()
CVE-2023-6693
4.9MEDIUM
Key Information:
- Vendor
- Red Hat
- Status
- Vendor
- CVE Published:
- 2 January 2024
Summary
A stack based buffer overflow was found in the virtio-net device of QEMU. This issue occurs when flushing TX in the virtio_net_flush_tx function if guest features VIRTIO_NET_F_HASH_REPORT, VIRTIO_F_VERSION_1 and VIRTIO_NET_F_MRG_RXBUF are enabled. This could allow a malicious user to overwrite local variables allocated on the stack. Specifically, the out_sg
variable could be used to read a part of process memory and send it to the wire, causing an information leak.
Affected Version(s)
Red Hat Enterprise Linux 8 8100020240314161907.e155f54d
Red Hat Enterprise Linux 8 8100020240314161907.e155f54d
References
CVSS V3.1
Score:
4.9
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Local
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Red Hat would like to thank Xiao Lei (Zhejiang University) for reporting this issue.