Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2023-6693

Опубликовано: 02 янв. 2024
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 4.9

Описание

A stack based buffer overflow was found in the virtio-net device of QEMU. This issue occurs when flushing TX in the virtio_net_flush_tx function if guest features VIRTIO_NET_F_HASH_REPORT, VIRTIO_F_VERSION_1 and VIRTIO_NET_F_MRG_RXBUF are enabled. This could allow a malicious user to overwrite local variables allocated on the stack. Specifically, the out_sg variable could be used to read a part of process memory and send it to the wire, causing an information leak.

РелизСтатусПримечание
bionic

ignored

end of standard support
devel

not-affected

1:8.2.1+ds-1ubuntu1
esm-infra-legacy/trusty

not-affected

code not present
esm-infra/bionic

not-affected

code not present
esm-infra/focal

not-affected

code not present
esm-infra/xenial

not-affected

code not present
focal

not-affected

code not present
jammy

released

1:6.2+dfsg-2ubuntu6.22
lunar

ignored

end of life, was deferred [2024-01-12]
mantic

ignored

end of life, was needed

Показывать по

EPSS

Процентиль: 10%
0.00038
Низкий

4.9 Medium

CVSS3

Связанные уязвимости

CVSS3: 4.9
redhat
больше 1 года назад

A stack based buffer overflow was found in the virtio-net device of QEMU. This issue occurs when flushing TX in the virtio_net_flush_tx function if guest features VIRTIO_NET_F_HASH_REPORT, VIRTIO_F_VERSION_1 and VIRTIO_NET_F_MRG_RXBUF are enabled. This could allow a malicious user to overwrite local variables allocated on the stack. Specifically, the `out_sg` variable could be used to read a part of process memory and send it to the wire, causing an information leak.

CVSS3: 4.9
nvd
больше 1 года назад

A stack based buffer overflow was found in the virtio-net device of QEMU. This issue occurs when flushing TX in the virtio_net_flush_tx function if guest features VIRTIO_NET_F_HASH_REPORT, VIRTIO_F_VERSION_1 and VIRTIO_NET_F_MRG_RXBUF are enabled. This could allow a malicious user to overwrite local variables allocated on the stack. Specifically, the `out_sg` variable could be used to read a part of process memory and send it to the wire, causing an information leak.

CVSS3: 5.3
msrc
3 месяца назад

Описание отсутствует

CVSS3: 4.9
debian
больше 1 года назад

A stack based buffer overflow was found in the virtio-net device of QE ...

CVSS3: 4.9
github
больше 1 года назад

A stack based buffer overflow was found in the virtio-net device of QEMU. This issue occurs when flushing TX in the virtio_net_flush_tx function if guest features VIRTIO_NET_F_HASH_REPORT, VIRTIO_F_VERSION_1 and VIRTIO_NET_F_MRG_RXBUF are enabled. This could allow a malicious user to overwrite local variables allocated on the stack. Specifically, the `out_sg` variable could be used to read a part of process memory and send it to the wire, causing an information leak.

EPSS

Процентиль: 10%
0.00038
Низкий

4.9 Medium

CVSS3