CVE-2025-6603

5.3 MEDIUM

📋 TL;DR

This vulnerability is an integer overflow in qCUDA's qcow_make_empty function that could lead to memory corruption when processing manipulated L1 size arguments. It affects users of coldfunction qCUDA up to commit db0085400c2f2011eed46fbc04fdc0873141688e. Attackers need local access to exploit this vulnerability.

💻 Affected Systems

Products:
  • coldfunction qCUDA
Versions: Up to commit db0085400c2f2011eed46fbc04fdc0873141688e (rolling release)
Operating Systems: Linux, Unix-like systems
Default Config Vulnerable: ⚠️ Yes
Notes: Using rolling release model, so all installations before the fix commit are vulnerable. Requires qCUDA with qcow device functionality.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local privilege escalation leading to full system compromise through memory corruption and potential code execution.

🟠

Likely Case

Application crash or denial of service due to memory corruption when processing malicious input.

🟢

If Mitigated

Limited impact with proper access controls and sandboxing preventing local attacker access.

🌐 Internet-Facing: LOW - Requires local access for exploitation, not remotely exploitable.
🏢 Internal Only: MEDIUM - Local attackers could exploit this to escalate privileges or cause denial of service.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access and knowledge of the qCUDA system. No public exploit code has been identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Commit after db0085400c2f2011eed46fbc04fdc0873141688e

Vendor Advisory: https://github.com/coldfunction/qCUDA/issues/10

Restart Required: Yes

Instructions:

1. Pull latest qCUDA from GitHub repository. 2. Verify commit is newer than db0085400c2f2011eed46fbc04fdc0873141688e. 3. Rebuild and reinstall qCUDA. 4. Restart any services using qCUDA.

🔧 Temporary Workarounds

Restrict local access

all

Limit user access to systems running qCUDA to trusted users only

Disable qcow device functionality

linux

If qcow device functionality is not required, disable it in qCUDA configuration

🧯 If You Can't Patch

  • Implement strict access controls to prevent untrusted local users from accessing qCUDA systems
  • Monitor systems for crashes or unusual behavior in qCUDA processes

🔍 How to Verify

Check if Vulnerable:

Check qCUDA commit hash: git log --oneline -1. If commit is db0085400c2f2011eed46fbc04fdc0873141688e or older, system is vulnerable.

Check Version:

git log --oneline -1

Verify Fix Applied:

Verify current commit is newer than db0085400c2f2011eed46fbc04fdc0873141688e: git log --oneline -1 | grep -v 'db0085400c2f2011eed46fbc04fdc0873141688e'

📡 Detection & Monitoring

Log Indicators:

  • qCUDA process crashes
  • Kernel logs showing memory corruption errors
  • Application logs with qcow-related errors

Network Indicators:

  • None - local exploitation only

SIEM Query:

Process:qCUDA AND (EventID:1000 OR EventID:1001 OR "segmentation fault")

🔗 References

📤 Share & Export