CVE-2024-6505

NameCVE-2024-6505
DescriptionA flaw was found in the virtio-net device in QEMU. When enabling the RSS feature on the virtio-net network card, the indirections_table data within RSS becomes controllable. Setting excessively large values may cause an index out-of-bounds issue, potentially resulting in heap overflow access. This flaw allows a privileged user in the guest to crash the QEMU process on the host.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1075919

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
qemu (PTS)bullseye1:5.2+dfsg-11+deb11u3vulnerable
bullseye (security)1:5.2+dfsg-11+deb11u4vulnerable
bookworm1:7.2+dfsg-7+deb12u13fixed
trixie1:10.0.0+ds-2fixed
sid1:10.0.2+ds-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
qemusourcebookworm1:7.2+dfsg-7+deb12u8
qemusource(unstable)1:9.0.2+ds-31075919

Notes

[bullseye] - qemu <postponed> (Minor issue; can be fixed in a following update)
https://bugzilla.redhat.com/show_bug.cgi?id=2295760
Fixed by: https://gitlab.com/qemu-project/qemu/-/commit/f1595ceb9aad36a6c1da95bcb77ab9509b38822d (v9.1.0-rc1)
Fixed by: https://gitlab.com/qemu-project/qemu/-/commit/44ef533498db5078c4432a3f1e160ed5539d7d29 (v8.2.7)
Fixed by: https://gitlab.com/qemu-project/qemu/-/commit/d2476ced2e34b661dded77d8774955b5a90fbda4 (v7.2.14)
Introduced by: https://gitlab.com/qemu-project/qemu/-/commit/4474e37a5b3a616803f4570b542e8eede91e50d2 (v5.1.0-rc0)

Search for package or bug name: Reporting problems