CVE-2023-2680Use After Free in Redhat Enterprise Linux

CWE-416Use After Free5 documents5 sources
Severity
8.2HIGHNVD
EPSS
0.0%
top 90.53%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedSep 13

Description

This CVE exists because of an incomplete fix for CVE-2021-3750. More specifically, the qemu-kvm package as released for Red Hat Enterprise Linux 9.1 via RHSA-2022:7967 included a version of qemu-kvm that was actually missing the fix for CVE-2021-3750.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:HExploitability: 1.5 | Impact: 6.0

Affected Packages0 packages

Also affects: Enterprise Linux 9.0

🔴Vulnerability Details

2
CVEList
Dma reentrancy issue (incomplete fix for cve-2021-3750)2023-09-13
GHSA
GHSA-69cm-qhp7-ch23: This CVE exists because of an incomplete fix for CVE-2021-37502023-09-13

📋Vendor Advisories

2
Red Hat
QEMU: hcd-ehci: DMA reentrancy issue (incomplete fix for CVE-2021-3750)2023-05-12
Debian
CVE-2023-2680: qemu - This CVE exists because of an incomplete fix for CVE-2021-3750. More specificall...2023
CVE-2023-2680 — Use After Free in Redhat | cvebase