Flaw in QEMU-KVM virtio-net device enables out-of-bounds acces
Reporter | Title | Published | Views | Family All 11 |
---|---|---|---|---|
![]() | CVE-2024-6505 | 5 Jul 202414:15 | – | cve |
![]() | CVE-2024-6505 | 5 Jul 202414:15 | – | nvd |
![]() | CVE-2024-6505 | 4 Jul 202411:06 | – | redhatcve |
![]() | CVE-2024-6505 | 5 Jul 202414:15 | – | debiancve |
![]() | CVE-2024-6505 | 5 Jul 202414:15 | – | osv |
![]() | UBUNTU-CVE-2024-6505 | 5 Jul 202414:15 | – | osv |
![]() | CVE-2024-6505 Qemu-kvm: virtio-net: queue index out-of-bounds access in software rss | 5 Jul 202413:51 | – | vulnrichment |
![]() | CVE-2024-6505 | 5 Jul 202400:00 | – | ubuntucve |
![]() | Huawei EulerOS: Security Advisory for qemu (EulerOS-SA-2025-1086) | 5 Feb 202500:00 | – | openvas |
![]() | Huawei EulerOS: Security Advisory for qemu (EulerOS-SA-2025-1088) | 5 Feb 202500:00 | – | openvas |
[
{
"versions": [
{
"status": "affected",
"version": "5.1.0",
"lessThan": "9.1.0",
"versionType": "semver"
}
],
"packageName": "qemu",
"collectionURL": "https://gitlab.com/qemu-project/qemu",
"defaultStatus": "unaffected"
},
{
"vendor": "Red Hat",
"product": "Red Hat Enterprise Linux 6",
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"packageName": "qemu-kvm",
"defaultStatus": "unknown",
"cpes": [
"cpe:/o:redhat:enterprise_linux:6"
]
},
{
"vendor": "Red Hat",
"product": "Red Hat Enterprise Linux 7",
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"packageName": "qemu-kvm",
"defaultStatus": "unknown",
"cpes": [
"cpe:/o:redhat:enterprise_linux:7"
]
},
{
"vendor": "Red Hat",
"product": "Red Hat Enterprise Linux 7",
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"packageName": "qemu-kvm-ma",
"defaultStatus": "unknown",
"cpes": [
"cpe:/o:redhat:enterprise_linux:7"
]
},
{
"vendor": "Red Hat",
"product": "Red Hat Enterprise Linux 8",
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"packageName": "virt:rhel/qemu-kvm",
"defaultStatus": "affected",
"cpes": [
"cpe:/o:redhat:enterprise_linux:8"
]
},
{
"vendor": "Red Hat",
"product": "Red Hat Enterprise Linux 8 Advanced Virtualization",
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"packageName": "virt:av/qemu-kvm",
"defaultStatus": "affected",
"cpes": [
"cpe:/a:redhat:advanced_virtualization:8::el8"
]
},
{
"vendor": "Red Hat",
"product": "Red Hat Enterprise Linux 9",
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"packageName": "qemu-kvm",
"defaultStatus": "affected",
"cpes": [
"cpe:/o:redhat:enterprise_linux:9"
]
}
]
Source | Link |
---|---|
access | www.access.redhat.com/security/cve/CVE-2024-6505 |
bugzilla | www.bugzilla.redhat.com/show_bug.cgi |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo