CVE-2023-6693

A stack based buffer overflow was found in the virtio-net device of QEMU. This issue occurs when flushing TX in the virtio_net_flush_tx function if guest features VIRTIO_NET_F_HASH_REPORT, VIRTIO_F_VERSION_1 and VIRTIO_NET_F_MRG_RXBUF are enabled. This could allow a malicious user to overwrite local variables allocated on the stack. Specifically, the `out_sg` variable could be used to read a part of process memory and send it to the wire, causing an information leak.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
4.9 MEDIUM
LOCAL
HIGH
NONE
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
redhatCNA
4.9 MEDIUM
LOCAL
HIGH
NONE
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
CVEADP
---
---
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 9%
VendorProductVersion
qemuqemu
𝑥
< 8.2.1
redhatenterprise_linux
8.0
redhatenterprise_linux
8.0
redhatenterprise_linux
9.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
qemu
bullseye
no-dsa
buster
not-affected
bullseye (security)
vulnerable
bookworm
1:7.2+dfsg-7+deb12u7
fixed
trixie
1:9.2.0+ds-2
fixed
sid
1:9.2.0+ds-3
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
qemu
noble
not-affected
mantic
ignored
lunar
ignored
jammy
Fixed 1:6.2+dfsg-2ubuntu6.22
released
focal
not-affected
bionic
not-affected
xenial
not-affected
trusty
not-affected