DMA Reentrancy UAF in QEMU e1000e NIC Emulation Causing Host DOS
CVE-2023-3019 Published on July 24, 2023
Qemu: e1000e: heap use-after-free in e1000e_write_packet_to_guest()
A DMA reentrancy issue leading to a use-after-free error was found in the e1000e NIC emulation code in QEMU. This issue could allow a privileged guest user to crash the QEMU process on the host, resulting in a denial of service.
Vulnerability Analysis
CVE-2023-3019 can be exploited with local system access, and requires user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality and integrity, and a high impact on availability.
Timeline
Reported to Red Hat.
Made public.
Weakness Type
What is a Dangling pointer Vulnerability?
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
CVE-2023-3019 has been classified to as a Dangling pointer vulnerability or weakness.
Products Associated with CVE-2023-3019
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2023-3019 are published in these products:
Affected Versions
Red Hat Enterprise Linux 8:- Version 8090020231206155326.a75119d5 and below * is unaffected.
- Version 8090020231206155326.a75119d5 and below * is unaffected.
- Version 8060020231128234847.ad008a3a and below * is unaffected.
- Version 8060020231128234847.ad008a3a and below * is unaffected.
- Version 8080020240116113044.63b34585 and below * is unaffected.
- Version 8080020240116113044.63b34585 and below * is unaffected.
- Version 17:8.2.0-11.el9_4 and below * is unaffected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.