Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2024-6505
HistoryJul 05, 2024 - 2:15 p.m.

CVE-2024-6505

2024-07-0514:15:03
Debian Security Bug Tracker
security-tracker.debian.org
5
cve-2024-6505
qemu
virtio-net
security flaw

CVSS3

6.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H

AI Score

6.8

Confidence

Low

EPSS

0

Percentile

13.6%

A flaw was found in the virtio-net device in QEMU. When enabling the RSS feature on the virtio-net network card, the indirections_table data within RSS becomes controllable. Setting excessively large values may cause an index out-of-bounds issue, potentially resulting in heap overflow access. This flaw allows a privileged user in the guest to crash the QEMU process on the host.

OSVersionArchitecturePackageVersionFilename
Debian12allqemu<= 1:7.2+dfsg-7+deb12u7qemu_1:7.2+dfsg-7+deb12u7_all.deb
Debian11allqemu<= 1:5.2+dfsg-11+deb11u3qemu_1:5.2+dfsg-11+deb11u3_all.deb
Debian999allqemu< 1:9.0.2+ds-3qemu_1:9.0.2+ds-3_all.deb
Debian13allqemu<= 1:9.0.2+ds-2qemu_1:9.0.2+ds-2_all.deb

CVSS3

6.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H

AI Score

6.8

Confidence

Low

EPSS

0

Percentile

13.6%