Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2023-3019

Published: 24 July 2023

A DMA reentrancy issue leading to a use-after-free error was found in the e1000e NIC emulation code in QEMU. This issue could allow a privileged guest user to crash the QEMU process on the host, resulting in a denial of service.

Notes

AuthorNote
Priority reason:
Only allows a privileged user to crash their own instance

Priority

Low

Cvss 3 Severity Score

6.5

Score breakdown

Status

Package Release Status
qemu
Launchpad, Ubuntu, Debian
bionic Needs triage

focal Needed

jammy Needed

kinetic Ignored
(end of life, was deferred [2023-10-12])
lunar Ignored
(end of life, was needed)
mantic Needed

noble Not vulnerable
(1:8.2.1+ds-1ubuntu1)
trusty Needs triage

upstream Needs triage

xenial Needs triage

Patches:
other: https://lists.nongnu.org/archive/html/qemu-devel/2023-05/msg08310.html
upstream: https://gitlab.com/qemu-project/qemu/-/commit/7d0fefdf81f5973334c344f6b8e1896c309dff66
upstream: https://gitlab.com/qemu-project/qemu/-/commit/9050f976e447444ea6ee2ba12c9f77e4b0dc54bc

Severity score breakdown

Parameter Value
Base score 6.5
Attack vector Local
Attack complexity Low
Privileges required Low
User interaction None
Scope Changed
Confidentiality None
Integrity impact None
Availability impact High
Vector CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H