CVE-2023-1544
Published: 23 March 2023
A flaw was found in the QEMU implementation of VMWare's paravirtual RDMA device. This flaw allows a crafted guest driver to allocate and initialize a huge number of page tables to be used as a ring of descriptors for CQ and async events, potentially leading to an out-of-bounds read and crash of QEMU.
Priority
Status
| Package | Release | Status |
|---|---|---|
|
qemu Launchpad, Ubuntu, Debian |
bionic |
Needs triage
|
| focal |
Released
(1:4.2-3ubuntu6.28)
|
|
| jammy |
Released
(1:6.2+dfsg-2ubuntu6.16)
|
|
| kinetic |
Ignored
(end of life, was deferred [2023-10-12])
|
|
| lunar |
Released
(1:7.2+dfsg-5ubuntu2.4)
|
|
| mantic |
Released
(1:8.0.4+dfsg-1ubuntu3.23.10.2)
|
|
| noble |
Released
(1:8.1.3+ds-1ubuntu1)
|
|
| trusty |
Needs triage
|
|
| upstream |
Needs triage
|
|
| xenial |
Needs triage
|
|
|
Patches: upstream: https://gitlab.com/qemu-project/qemu/-/commit/85fc35afa93c7320d1641d344d0c5dfbe341d087 |
||
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score | 6.3 |
| Attack vector | Local |
| Attack complexity | Low |
| Privileges required | None |
| User interaction | Required |
| Scope | Changed |
| Confidentiality | None |
| Integrity impact | None |
| Availability impact | High |
| Vector | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H |