๐Ÿ” CVE Alert

CVE-2023-1544

MEDIUM 6.0

Qemu: pvrdma: out-of-bounds read in pvrdma_ring_next_elem_read()

CVSS Score
6.0
EPSS Score
0.0%
EPSS Percentile
0th

A flaw was found in the QEMU implementation of VMWare's paravirtual RDMA device. This flaw allows a crafted guest driver to allocate and initialize a huge number of page tables to be used as a ring of descriptors for CQ and async events, potentially leading to an out-of-bounds read and crash of QEMU.

CWE CWE-125
Published Mar 23, 2023
Last Updated Nov 3, 2025
Stay Ahead of the Next One

Get instant alerts for

Be the first to know when new medium vulnerabilities are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Changed
Confidentiality
None
Integrity
None
Availability
High

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
access.redhat.com: https://access.redhat.com/security/cve/CVE-2023-1544 bugzilla.redhat.com: https://bugzilla.redhat.com/show_bug.cgi?id=2180364 lists.nongnu.org: https://lists.nongnu.org/archive/html/qemu-devel/2023-03/msg00206.html security.netapp.com: https://security.netapp.com/advisory/ntap-20230511-0005/ lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/04/msg00042.html

Credits

Red Hat would like to thank SorryMybad (Kunlun Lab) for reporting this issue.