CVE-2023-3019

Name
CVE-2023-3019
Description
A DMA reentrancy issue leading to a use-after-free error was found in the e1000e NIC emulation code in QEMU. This issue could allow a privileged guest user to crash the QEMU process on the host, resulting in a denial of service.
NVD Severity
unknown
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
MISC https://access.redhat.com/security/cve/CVE-2023-3019
MISC https://bugzilla.redhat.com/show_bug.cgi?id=2222351
MISC https://security.netapp.com/advisory/ntap-20230831-0005/
secalert@redhat.com https://access.redhat.com/errata/RHSA-2024:0135
secalert@redhat.com https://access.redhat.com/errata/RHSA-2024:0404
secalert@redhat.com https://access.redhat.com/errata/RHSA-2024:0569
secalert@redhat.com https://access.redhat.com/errata/RHSA-2024:2135

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:qemu:qemu:-:*:*:*:*:*:*:* qemu == None == -
cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:* qemu >= None < 8.2.0

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
qemu 3.19-community 8.1.5-r0 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable