« List of all CVEs

CVE-2023-6693

Qemu: virtio-net: stack buffer overflow in virtio_net_flush_tx()

Published: 1/2/2024 Last updated: 11/6/2025 Reserved: 12/11/2023

A stack based buffer overflow was found in the virtio-net device of QEMU. This issue occurs when flushing TX in the virtio_net_flush_tx function if guest features VIRTIO_NET_F_HASH_REPORT, VIRTIO_F_VERSION_1 and VIRTIO_NET_F_MRG_RXBUF are enabled. This could allow a malicious user to overwrite local variables allocated on the stack. Specifically, the `out_sg` variable could be used to read a part of process memory and send it to the wire, causing an information leak.

CNA assigner: redhat (53f830b8-0a3f-465b-8143-3b8a9948e749) Requested by: n/a

Metrics

Version Score Severity Vector String
3.1 4.9 Medium CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Opam packages affected (2)

conf-qemu-img nbd-tool

Products affected (14)

Product Vendor Version
Red Hat Enterprise Linux 6 Red Hat 15.3(1)S1
Red Hat Enterprise Linux 7 Red Hat 15.3(2)S2
Red Hat Enterprise Linux 9 Red Hat <= 5.4.3
Red Hat Enterprise Linux 6 Red Hat 2008 R2 for x64-based Systems Service Pack 1 (Core installation)
Red Hat Enterprise Linux 7 Red Hat < 6.0.6003.21666
Red Hat Enterprise Linux 9 Red Hat Android-10
Red Hat Enterprise Linux 7 Red Hat n/a
Red Hat Enterprise Linux 7 Red Hat n/a
Red Hat Enterprise Linux 8 Advanced Virtualization Red Hat 2008 R2 for Itanium-Based Systems Service Pack 1
Red Hat Enterprise Linux 8 Advanced Virtualization Red Hat 15.3(3)S1
Red Hat Enterprise Linux 8 Red Hat 8.0
Red Hat Enterprise Linux 8 Red Hat <= 1.0.1
Red Hat Enterprise Linux 8 Red Hat 15.1(2)SY15
Red Hat Enterprise Linux 8 Red Hat 8.61

References (20)

Credits (2)