First published: Wed Jul 12 2023(Updated: )
A flaw was found in the QEMU virtual crypto device while handling data encryption/decryption requests in virtio_crypto_handle_sym_req. There is no check for the value of `src_len` and `dst_len` in virtio_crypto_sym_op_helper, potentially leading to a heap buffer overflow when the two values differ.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/qemu | <=1:5.2+dfsg-11+deb11u2 | 1:5.2+dfsg-11+deb11u3 1:7.2+dfsg-7+deb12u7 1:9.0.2+ds-2 1:9.1.0+ds-3 |
QEMU KVM | ||
Fedoraproject Fedora | =38 | |
Debian Debian Linux | =10.0 | |
QEMU KVM | <8.1.0 | |
QEMU KVM | =8.1.0-rc0 | |
QEMU KVM | =8.1.0-rc1 | |
QEMU KVM | =8.1.0-rc2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-3180 is a vulnerability found in the QEMU virtual crypto device that can lead to a heap buffer overflow.
CVE-2023-3180 has a severity level of medium.
CVE-2023-3180 affects QEMU's virtual crypto device, specifically the handling of data encryption/decryption requests in virtio_crypto_handle_sym_req.
At the moment, there are no known fixes available for CVE-2023-3180.
The references for CVE-2023-3180 are: https://bugzilla.redhat.com/show_bug.cgi?id=2222424, https://access.redhat.com/security/cve/CVE-2023-3180, and https://lists.nongnu.org/archive/html/qemu-devel/2023-08/msg00401.html.