First published: Wed Jul 12 2023(Updated: )
A DMA reentrancy issue leading to a use-after-free error was found in the e1000e NIC emulation code in QEMU. This issue could allow a privileged guest user to crash the QEMU process on the host, resulting in a denial of service.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/qemu-kvm | <8.2.0 | 8.2.0 |
debian/qemu | <=1:5.2+dfsg-11+deb11u3<=1:5.2+dfsg-11+deb11u2 | 1:7.2+dfsg-7+deb12u12 1:9.2.0+ds-2 1:9.2.0+ds-5 |
QEMU KVM | <8.2.0 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux | =9.0 | |
QEMU KVM |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-3019 is medium.
The affected software for CVE-2023-3019 includes QEMU and Red Hat Enterprise Linux 8.0 and 9.0.
CVE-2023-3019 can allow a privileged guest user to crash the QEMU process on the host, resulting in a denial of service.
To fix CVE-2023-3019, users should update to the latest version of QEMU and apply any patches or updates provided by the vendor.
You can find more information about CVE-2023-3019 on the official QEMU project gitlab, Chromium OSS-Fuzz issues, and the QEMU development mailing list.