发布时间: 2024年4月26日
修改时间: 2024年10月31日
A double free vulnerability was found in QEMU virtio devices (virtio-gpu, virtio-serial-bus, virtio-crypto), where the mem_reentrancy_guard flag insufficiently protects against DMA reentrancy issues. This issue could allow a malicious privileged guest user to crash the QEMU process on the host, resulting in a denial of service or allow arbitrary code execution within the context of the QEMU process on the host.
NVD | openEuler | |
---|---|---|
Confidentiality | High | |
Attack Vector | Local | |
CVSS评分 | N/A | 8.2 |
Attack Complexity | Low | |
Privileges Required | High | |
Scope | Changed | |
Integrity | High | |
User Interaction | None | |
Availability | High |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2024-1507 | qemu security update | 2024年4月26日 |
KylinSec-SA-2024-3488 | qemu security update | 2024年4月26日 |
产品 | 包 | 状态 |
---|---|---|
KY3.4-4A | qemu | Fixed |
KY3.4-5 | qemu | Fixed |
KY3.5.1 | qemu | Fixed |
KY3.5.2 | qemu | Fixed |