Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-3301— Triggerable assertion due to race condition in hot-unplug

CVSS 5.6 · Medium EPSS 0.01% · P0
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2023-3301

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Triggerable assertion due to race condition in hot-unplug
Source: NVD (National Vulnerability Database)
Vulnerability Description
A flaw was found in QEMU. The async nature of hot-unplug enables a race scenario where the net device backend is cleared before the virtio-net pci frontend has been unplugged. A malicious guest could use this time window to trigger an assertion and cause a denial of service.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
可达断言
Source: NVD (National Vulnerability Database)
Vulnerability Title
QEMU 竞争条件问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
QEMU(Quick Emulator)是法国法布里斯-贝拉(Fabrice Bellard)个人开发者的一套模拟处理器软件。该软件具有速度快、跨平台等特点。 QEMU存在安全漏洞,该漏洞源于vhost_vdpa_get_vhost_net()函数存在空指针取消引用问题。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-qemu 8.1.0-rc0 -
Red HatRed Hat Enterprise Linux 6-cpe:/o:redhat:enterprise_linux:6
Red HatRed Hat Enterprise Linux 7-cpe:/o:redhat:enterprise_linux:7
Red HatRed Hat Enterprise Linux 7-cpe:/o:redhat:enterprise_linux:7
Red HatRed Hat Enterprise Linux 8-cpe:/o:redhat:enterprise_linux:8
Red HatRed Hat Enterprise Linux 8 Advanced Virtualization-cpe:/a:redhat:advanced_virtualization:8::el8
Red HatRed Hat Enterprise Linux 9-cpe:/o:redhat:enterprise_linux:9
Red HatRed Hat OpenStack Platform 13 (Queens)-cpe:/a:redhat:openstack:13
FedoraExtra Packages for Enterprise Linux--
FedoraFedora--

II. Public POCs for CVE-2023-3301

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2023-3301

登录查看更多情报信息。

Same Patch Batch · n/a · 2023-09-13 · 12 CVEs total

CVE-2023-26807.5 HIGHDma reentrancy issue (incomplete fix for cve-2021-3750)
CVE-2023-41555.3 MEDIUMSev-es / sev-snp vmgexit double fetch vulnerability
CVE-2023-41162Webmin Usermin 跨站脚本漏洞
CVE-2023-41158Webmin Usermin 跨站脚本漏洞
CVE-2023-41155Usermin 跨站脚本漏洞
CVE-2023-41154Usermin 跨站脚本漏洞
CVE-2023-41152Webmin Usermin 跨站脚本漏洞
CVE-2023-40617Open Knowledge Maps Head Start 7 跨站脚本漏洞
CVE-2023-42468Color Phone 安全漏洞
CVE-2023-40850Netcon NS-ASG 安全漏洞
CVE-2023-42469com.full.dialer.top.secure.crypted 安全漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2023-3301

No comments yet


Leave a comment