5.3 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
5.3 Medium
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
15.7%
A stack based buffer overflow was found in the virtio-net device of QEMU.
This issue occurs when flushing TX in the virtio_net_flush_tx function if
guest features VIRTIO_NET_F_HASH_REPORT, VIRTIO_F_VERSION_1 and
VIRTIO_NET_F_MRG_RXBUF are enabled. This could allow a malicious user to
overwrite local variables allocated on the stack. Specifically, the
out_sg
variable could be used to read a part of process memory and send
it to the wire, causing an information leak.
Author | Note |
---|---|
mdeslaur | introduced in v5.1.0-rc0 |
5.3 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
5.3 Medium
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
15.7%