发布时间: 2024年3月22日
修改时间: 2024年10月31日
A stack based buffer overflow was found in the virtio-net device of QEMU. This issue occurs when flushing TX in the virtio_net_flush_tx function if guest features VIRTIO_NET_F_HASH_REPORT, VIRTIO_F_VERSION_1 and VIRTIO_NET_F_MRG_RXBUF are enabled. This could allow a malicious user to overwrite local variables allocated on the stack. Specifically, the `out_sg` variable could be used to read a part of process memory and send it to the wire, causing an information leak.
NVD | openEuler | |
---|---|---|
Confidentiality | Low | Low |
Attack Vector | Local | Local |
CVSS评分 | 5.3 | 5.3 |
Attack Complexity | Low | Low |
Privileges Required | Low | Low |
Scope | Unchanged | Unchanged |
Integrity | Low | Low |
User Interaction | None | None |
Availability | Low | Low |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2024-1543 | qemu security update | 2024年10月31日 |
产品 | 包 | 状态 |
---|---|---|
KY3.5.2 | qemu | Fixed |
KY3.5.1 | qemu | Fixed |