Name | CVE-2024-6505 |
Description | A flaw was found in the virtio-net device in QEMU. When enabling the RSS feature on the virtio-net network card, the indirections_table data within RSS becomes controllable. Setting excessively large values may cause an index out-of-bounds issue, potentially resulting in heap overflow access. This flaw allows a privileged user in the guest to crash the QEMU process on the host. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 1075919 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
qemu (PTS) | bullseye | 1:5.2+dfsg-11+deb11u3 | vulnerable |
bullseye (security) | 1:5.2+dfsg-11+deb11u4 | vulnerable | |
bookworm | 1:7.2+dfsg-7+deb12u13 | fixed | |
trixie | 1:10.0.0+ds-2 | fixed | |
sid | 1:10.0.2+ds-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
qemu | source | bookworm | 1:7.2+dfsg-7+deb12u8 | |||
qemu | source | (unstable) | 1:9.0.2+ds-3 | 1075919 |
[bullseye] - qemu <postponed> (Minor issue; can be fixed in a following update)
https://bugzilla.redhat.com/show_bug.cgi?id=2295760
Fixed by: https://gitlab.com/qemu-project/qemu/-/commit/f1595ceb9aad36a6c1da95bcb77ab9509b38822d (v9.1.0-rc1)
Fixed by: https://gitlab.com/qemu-project/qemu/-/commit/44ef533498db5078c4432a3f1e160ed5539d7d29 (v8.2.7)
Fixed by: https://gitlab.com/qemu-project/qemu/-/commit/d2476ced2e34b661dded77d8774955b5a90fbda4 (v7.2.14)
Introduced by: https://gitlab.com/qemu-project/qemu/-/commit/4474e37a5b3a616803f4570b542e8eede91e50d2 (v5.1.0-rc0)