First published: Wed Jan 11 2023(Updated: )
A vulnerability in the lsi53c895a device affects the latest version of qemu. A DMA-MMIO reentrancy problem may lead to memory corruption bugs like stack overflow or use-after-free.
Credit: patrick@puiterwijk.org patrick@puiterwijk.org
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU KVM | >=7.2.0<7.2.3 | |
QEMU KVM | =8.0.0 | |
QEMU KVM | =8.0.0-rc0 | |
QEMU KVM | =8.0.0-rc1 | |
QEMU KVM | =8.0.0-rc2 | |
QEMU KVM | =8.0.0-rc3 | |
QEMU KVM | =8.0.0-rc4 | |
Debian Debian Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2023-0330.
The latest version of qemu with versions between 7.2.0 and 7.2.3, as well as version 8.0.0 and its release candidates (8.0.0-rc0, 8.0.0-rc1, 8.0.0-rc2, 8.0.0-rc3, 8.0.0-rc4), are affected by this vulnerability.
The severity level of CVE-2023-0330 is medium (6).
This vulnerability may lead to memory corruption bugs like stack overflow or use-after-free.
You can find more information about CVE-2023-0330 in the Debian LTS Announce and QEMU Devel mailing list archives.