发布时间: 2024年4月26日
修改时间: 2024年4月26日
A double free vulnerability was found in QEMU virtio devices (virtio-gpu, virtio-serial-bus, virtio-crypto), where the mem_reentrancy_guard flag insufficiently protects against DMA reentrancy issues. This issue could allow a malicious privileged guest user to crash the QEMU process on the host, resulting in a denial of service or allow arbitrary code execution within the context of the QEMU process on the host.
NVD | openEuler | |
---|---|---|
CVSS评分 | 8.2 | 8.2 |
Attack Vector | Local | Local |
Attack Complexity | Low | Low |
Privileges Required | High | High |
User Interaction | None | None |
Scope | Changed | Changed |
Confidentiality | High | High |
Integrity | High | High |
Availability | High | High |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2024-1507 | qemu security update | 2024年4月26日 |
KylinSec-SA-2024-3488 | qemu security update | 2024年4月26日 |
产品 | 包 | 状态 |
---|---|---|
KY3.4-4A | qemu | Fixed |
KY3.4-5A | qemu | Fixed |
KY3.5.1 | qemu | Fixed |
KY3.5.2 | qemu | Fixed |