« List of all CVEs

CVE-2023-6693

Qemu: virtio-net: stack buffer overflow in virtio_net_flush_tx()

Published: 1/2/2024 Last updated: 2/25/2026 Reserved: 12/11/2023

A stack based buffer overflow was found in the virtio-net device of QEMU. This issue occurs when flushing TX in the virtio_net_flush_tx function if guest features VIRTIO_NET_F_HASH_REPORT, VIRTIO_F_VERSION_1 and VIRTIO_NET_F_MRG_RXBUF are enabled. This could allow a malicious user to overwrite local variables allocated on the stack. Specifically, the `out_sg` variable could be used to read a part of process memory and send it to the wire, causing an information leak.

CNA assigner: redhat (53f830b8-0a3f-465b-8143-3b8a9948e749) Requested by: n/a

Metrics

Version Score Severity Vector String
3.1 4.9 Medium CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Opam packages affected (2)

conf-qemu-img nbd-tool

Products affected (10)

Product Vendor Version
Red Hat Enterprise Linux 6 Red Hat 2N Access Commander 1.14 and prior
Red Hat Enterprise Linux 7 Red Hat <= 7.46.0
Red Hat Enterprise Linux 9 Red Hat < f12c8a7515f641885677960af450082569a87243
Red Hat Enterprise Linux 6 Red Hat < 02b2b691b77cd7b951fa7b6c9d44d4e472cdc823
Red Hat Enterprise Linux 7 Red Hat < 00a860678098fcd9fa8db2b5fb9d2ddf4776d4cc
Red Hat Enterprise Linux 7 Red Hat < 9d2479c960875ca1239bcb899f386970c13d9cfe
Red Hat Enterprise Linux 8 Advanced Virtualization Red Hat 2.6.12
Red Hat Enterprise Linux 8 Red Hat <= 7.47.0
Red Hat Enterprise Linux 8 Red Hat < 8af815ab052eaf74addbbfb556d63ce2137c0e1b
Red Hat Enterprise Linux 8 Red Hat < f96c0959c1ee92adc911c10d6ec209af50105049

References (20)

Credits (2)