CVE-2023-3019

Name
CVE-2023-3019
Description
A DMA reentrancy issue leading to a use-after-free error was found in the e1000e NIC emulation code in QEMU. This issue could allow a privileged guest user to crash the QEMU process on the host, resulting in a denial of service.
NVD Severity
unknown
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
vdb-entry https://access.redhat.com/security/cve/CVE-2023-3019
issue-tracking https://bugzilla.redhat.com/show_bug.cgi?id=2222351
MISC https://security.netapp.com/advisory/ntap-20230831-0005/
vendor-advisory https://access.redhat.com/errata/RHSA-2024:0135
vendor-advisory https://access.redhat.com/errata/RHSA-2024:0404
vendor-advisory https://access.redhat.com/errata/RHSA-2024:0569
vendor-advisory https://access.redhat.com/errata/RHSA-2024:2135
af854a3a-2127-422b-91ae-364da2661108 https://lists.debian.org/debian-lts-announce/2025/04/msg00042.html

Match rules

CPE URI Source package Min version Max version
cpe:/a:redhat:rhel_eus:8.6::crb shopxo >= 8060020231128234847.ad008a3a < *
cpe:/a:redhat:rhel_eus:8.8::crb shopxo >= 8080020240116113044.63b34585 < *
cpe:/a:redhat:enterprise_linux:9::appstream shopxo >= 17:8.2.0-11.el9_4 < *
cpe:/a:redhat:enterprise_linux:8::appstream shopxo >= 8090020231206155326.a75119d5 < *

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
qemu 3.19-community 8.1.5-r0 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable