4.9 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): LOCAL
- Attack complexity (AC): HIGH
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): LOW
- Integrity impact (I): LOW
- Availability impact (A): LOW
Qemu: virtio-net: stack buffer overflow in virtio_net_flush_tx()
A stack based buffer overflow was found in the virtio-net device of QEMU. This issue occurs when flushing TX in the virtio_net_flush_tx function if guest features VIRTIO_NET_F_HASH_REPORT, VIRTIO_F_VERSION_1 and VIRTIO_NET_F_MRG_RXBUF are enabled. This could allow a malicious user to overwrite local variables allocated on the stack. Specifically, the `out_sg` variable could be used to read a part of process memory and send it to the wire, causing an information leak.
References
- https://access.redhat.com/security/cve/CVE-2023-6693 x_refsource_REDHAT vdb-entry
- RHBZ#2254580 issue-tracking x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2023-6693 x_refsource_REDHAT vdb-entry
- RHBZ#2254580 issue-tracking x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2023-6693 x_refsource_REDHAT vdb-entry
- RHBZ#2254580 issue-tracking x_refsource_REDHAT
- RHBZ#2254580 issue-tracking x_refsource_REDHAT
- https://security.netapp.com/advisory/ntap-20240208-0004/
- https://access.redhat.com/security/cve/CVE-2023-6693 x_refsource_REDHAT vdb-entry
- https://access.redhat.com/security/cve/CVE-2023-6693 x_refsource_REDHAT vdb-entry
- RHBZ#2254580 issue-tracking x_refsource_REDHAT
- https://security.netapp.com/advisory/ntap-20240208-0004/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproj…
- https://access.redhat.com/security/cve/CVE-2023-6693 x_refsource_REDHAT vdb-entry
- RHBZ#2254580 issue-tracking x_refsource_REDHAT
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproj…
- https://security.netapp.com/advisory/ntap-20240208-0004/
- RHSA-2024:2962 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2023-6693 x_refsource_REDHAT vdb-entry
- RHBZ#2254580 issue-tracking x_refsource_REDHAT
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproj…
- https://security.netapp.com/advisory/ntap-20240208-0004/
- RHSA-2024:2962 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2023-6693 x_refsource_REDHAT vdb-entry
- RHBZ#2254580 issue-tracking x_refsource_REDHAT
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproj…
- https://security.netapp.com/advisory/ntap-20240208-0004/
- RHSA-2024:2962 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2023-6693 x_refsource_REDHAT vdb-entry
- RHBZ#2254580 issue-tracking x_refsource_REDHAT
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproj…
- https://security.netapp.com/advisory/ntap-20240208-0004/
- RHSA-2024:2962 x_refsource_REDHAT vendor-advisory x_transferred
- https://access.redhat.com/security/cve/CVE-2023-6693 x_refsource_REDHAT vdb-entry x_transferred
- RHBZ#2254580 issue-tracking x_refsource_REDHAT x_transferred
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproj… x_transferred
- https://security.netapp.com/advisory/ntap-20240208-0004/ x_transferred
- RHSA-2024:2962 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2023-6693 x_refsource_REDHAT vdb-entry
- RHBZ#2254580 issue-tracking x_refsource_REDHAT
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproj…
- https://security.netapp.com/advisory/ntap-20240208-0004/
- RHSA-2024:2962 x_refsource_REDHAT vendor-advisory x_transferred
- https://access.redhat.com/security/cve/CVE-2023-6693 x_refsource_REDHAT vdb-entry x_transferred
- RHBZ#2254580 issue-tracking x_refsource_REDHAT x_transferred
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproj… x_transferred
- https://security.netapp.com/advisory/ntap-20240208-0004/ x_transferred
- https://access.redhat.com/security/cve/CVE-2023-6693 x_refsource_REDHAT vdb-entry
- RHBZ#2254580 issue-tracking x_refsource_REDHAT
- RHSA-2024:2962 x_refsource_REDHAT vendor-advisory
- RHSA-2024:2962 x_refsource_REDHAT vendor-advisory x_transferred
- https://access.redhat.com/security/cve/CVE-2023-6693 x_refsource_REDHAT vdb-entry x_transferred
- RHBZ#2254580 issue-tracking x_refsource_REDHAT x_transferred
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproj… x_transferred
- https://security.netapp.com/advisory/ntap-20240208-0004/ x_transferred
- RHSA-2024:2962 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2023-6693 x_refsource_REDHAT vdb-entry
- RHBZ#2254580 issue-tracking x_refsource_REDHAT
- RHSA-2024:2962 x_refsource_REDHAT vendor-advisory x_transferred
- https://access.redhat.com/security/cve/CVE-2023-6693 x_refsource_REDHAT vdb-entry x_transferred
- RHBZ#2254580 issue-tracking x_refsource_REDHAT x_transferred
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproj… x_transferred
- https://security.netapp.com/advisory/ntap-20240208-0004/ x_transferred
- https://access.redhat.com/security/cve/CVE-2023-6693 x_refsource_REDHAT vdb-entry
- RHBZ#2254580 issue-tracking x_refsource_REDHAT
- RHSA-2024:2962 x_refsource_REDHAT vendor-advisory
- RHSA-2025:4492 x_refsource_REDHAT vendor-advisory
- RHSA-2024:2962 x_refsource_REDHAT vendor-advisory x_transferred
- https://access.redhat.com/security/cve/CVE-2023-6693 x_refsource_REDHAT vdb-entry x_transferred
- RHBZ#2254580 issue-tracking x_refsource_REDHAT x_transferred
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproj… x_transferred
- https://security.netapp.com/advisory/ntap-20240208-0004/ x_transferred
- RHSA-2025:4492 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2023-6693 x_refsource_REDHAT vdb-entry
- RHBZ#2254580 issue-tracking x_refsource_REDHAT
- RHSA-2024:2962 x_refsource_REDHAT vendor-advisory
- RHSA-2024:2962 x_refsource_REDHAT vendor-advisory x_transferred
- https://access.redhat.com/security/cve/CVE-2023-6693 x_refsource_REDHAT vdb-entry x_transferred
- RHBZ#2254580 issue-tracking x_refsource_REDHAT x_transferred
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproj… x_transferred
- https://security.netapp.com/advisory/ntap-20240208-0004/ x_transferred
- https://access.redhat.com/security/cve/CVE-2023-6693 x_refsource_REDHAT vdb-entry
- RHBZ#2254580 issue-tracking x_refsource_REDHAT
- RHSA-2024:2962 x_refsource_REDHAT vendor-advisory
- RHSA-2025:4492 x_refsource_REDHAT vendor-advisory
- RHSA-2024:2962 x_refsource_REDHAT vendor-advisory x_transferred
- https://access.redhat.com/security/cve/CVE-2023-6693 x_refsource_REDHAT vdb-entry x_transferred
- RHBZ#2254580 issue-tracking x_refsource_REDHAT x_transferred
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproj… x_transferred
- https://security.netapp.com/advisory/ntap-20240208-0004/ x_transferred
- RHSA-2024:2962 x_refsource_REDHAT vendor-advisory
- RHSA-2025:4492 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2023-6693 x_refsource_REDHAT vdb-entry
- RHBZ#2254580 issue-tracking x_refsource_REDHAT
- RHSA-2024:2962 x_refsource_REDHAT vendor-advisory x_transferred
- https://access.redhat.com/security/cve/CVE-2023-6693 x_refsource_REDHAT vdb-entry x_transferred
- RHBZ#2254580 issue-tracking x_refsource_REDHAT x_transferred
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproj… x_transferred
- https://security.netapp.com/advisory/ntap-20240208-0004/ x_transferred
- RHSA-2024:2962 x_refsource_REDHAT vendor-advisory
- RHSA-2025:4492 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2023-6693 x_refsource_REDHAT vdb-entry
- RHBZ#2254580 issue-tracking x_refsource_REDHAT
- https://security.netapp.com/advisory/ntap-20240208-0004/ x_transferred
- RHSA-2024:2962 x_refsource_REDHAT vendor-advisory x_transferred
- https://access.redhat.com/security/cve/CVE-2023-6693 x_refsource_REDHAT vdb-entry x_transferred
- RHBZ#2254580 issue-tracking x_refsource_REDHAT x_transferred
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproj… x_transferred
- RHSA-2024:2962 x_refsource_REDHAT vendor-advisory
- RHSA-2025:4492 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2023-6693 x_refsource_REDHAT vdb-entry
- RHBZ#2254580 issue-tracking x_refsource_REDHAT
- RHSA-2024:2962 x_refsource_REDHAT vendor-advisory x_transferred
- https://access.redhat.com/security/cve/CVE-2023-6693 x_refsource_REDHAT vdb-entry x_transferred
- RHBZ#2254580 issue-tracking x_refsource_REDHAT x_transferred
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproj… x_transferred
- https://security.netapp.com/advisory/ntap-20240208-0004/ x_transferred
- RHSA-2024:2962 x_refsource_REDHAT vendor-advisory
- RHSA-2025:4492 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2023-6693 x_refsource_REDHAT vdb-entry
- RHBZ#2254580 issue-tracking x_refsource_REDHAT
- RHSA-2024:2962 x_refsource_REDHAT vendor-advisory x_transferred
- https://access.redhat.com/security/cve/CVE-2023-6693 x_refsource_REDHAT vdb-entry x_transferred
- RHBZ#2254580 issue-tracking x_refsource_REDHAT x_transferred
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproj… x_transferred
- https://security.netapp.com/advisory/ntap-20240208-0004/ x_transferred
- RHSA-2025:4492 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2023-6693 x_refsource_REDHAT vdb-entry
- RHBZ#2254580 issue-tracking x_refsource_REDHAT
- RHSA-2024:2962 x_refsource_REDHAT vendor-advisory
- RHSA-2024:2962 x_refsource_REDHAT vendor-advisory x_transferred
- https://access.redhat.com/security/cve/CVE-2023-6693 x_refsource_REDHAT vdb-entry x_transferred
- RHBZ#2254580 issue-tracking x_refsource_REDHAT x_transferred
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproj… x_transferred
- https://security.netapp.com/advisory/ntap-20240208-0004/ x_transferred
- https://lists.debian.org/debian-lts-announce/2025/04/msg00042.html
- RHSA-2024:2962 x_refsource_REDHAT vendor-advisory
- RHSA-2025:4492 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2023-6693 x_refsource_REDHAT vdb-entry
- RHBZ#2254580 issue-tracking x_refsource_REDHAT
- RHBZ#2254580 issue-tracking x_refsource_REDHAT x_transferred
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproj… x_transferred
- https://security.netapp.com/advisory/ntap-20240208-0004/ x_transferred
- https://lists.debian.org/debian-lts-announce/2025/04/msg00042.html
- RHSA-2024:2962 x_refsource_REDHAT vendor-advisory x_transferred
- https://access.redhat.com/security/cve/CVE-2023-6693 x_refsource_REDHAT vdb-entry x_transferred
Affected products
- *
- *
- *
Matching in nixpkgs
pkgs.qemu
Generic and open source machine emulator and virtualizer
-
nixos-unstable -
- nixpkgs-unstable 10.1.0
pkgs.qemu_kvm
Generic and open source machine emulator and virtualizer
-
nixos-unstable -
- nixpkgs-unstable 10.1.0
pkgs.qemu_xen
Generic and open source machine emulator and virtualizer
-
nixos-unstable -
- nixpkgs-unstable 10.1.0
pkgs.qemu-user
QEMU User space emulator - launch executables compiled for one CPU on another CPU
-
nixos-unstable -
- nixpkgs-unstable 10.1.0
pkgs.qemu_full
Generic and open source machine emulator and virtualizer
-
nixos-unstable -
- nixpkgs-unstable 10.1.0
pkgs.qemu_test
Generic and open source machine emulator and virtualizer
-
nixos-unstable -
- nixpkgs-unstable 10.1.0
pkgs.qemu-utils
Generic and open source machine emulator and virtualizer
-
nixos-unstable -
- nixpkgs-unstable 10.1.0
pkgs.canokey-qemu
CanoKey QEMU Virt Card
-
nixos-unstable -
- nixpkgs-unstable 0-unstable-2023-06-06
pkgs.ubootQemuX86
Boot loader for embedded systems
-
nixos-unstable -
- nixpkgs-unstable x86_defconfig-2025.07
pkgs.ubootQemuX86_64
Boot loader for embedded systems
-
nixos-unstable -
- nixpkgs-unstable x86_64_defconfig-2025.07
pkgs.ubootQemuAarch64
Boot loader for embedded systems
-
nixos-unstable -
- nixpkgs-unstable qemu_arm64_defconfig-2025.07
pkgs.qemu-python-utils
Python tooling used by the QEMU project to build, configure, and test QEMU
-
nixos-unstable -
- nixpkgs-unstable 0.6.1.0a1
pkgs.armTrustedFirmwareQemu
Reference implementation of secure world software for ARMv8-A
-
nixos-unstable -
- nixpkgs-unstable 2.13.0
pkgs.python312Packages.qemu
Python tooling used by the QEMU project to build, configure, and test QEMU
-
nixos-unstable -
- nixpkgs-unstable 0.6.1.0a1
pkgs.python313Packages.qemu
Python tooling used by the QEMU project to build, configure, and test QEMU
-
nixos-unstable -
- nixpkgs-unstable 0.6.1.0a1
pkgs.python312Packages.qemu-qmp
Asyncio library for communicating with QEMU Monitor Protocol (“QMP”) servers
-
nixos-unstable -
- nixpkgs-unstable 0.0.3
pkgs.python313Packages.qemu-qmp
Asyncio library for communicating with QEMU Monitor Protocol (“QMP”) servers
-
nixos-unstable -
- nixpkgs-unstable 0.0.3
Package maintainers
-
@lopsided98 Ben Wolsieffer <benwolsieffer@gmail.com>
-
@oxalica oxalica <oxalicc@pm.me>
-
@devplayer0 Jack O'Sullivan <dev@nul.ie>
-
@DavHau David Hauer <d.hauer.it@gmail.com>
-
@brianmcgillion Brian McGillion <bmg.avoin@gmail.com>
-
@alyssais Alyssa Ross <hi@alyssa.is>
-
@hehongbo Hongbo
-
@SigmaSquadron Fernando Rodrigues <alpha@sigmasquadron.net>
-
@CertainLach Yaroslav Bolyukin <iam@lach.pw>
-
@dezgeg Tuomas Tynkkynen <tuomas.tynkkynen@iki.fi>