Описание
A use-after-free vulnerability was found in the virtio-net device of QEMU. It could occur when the descriptor's address belongs to the non direct access region, due to num_buffers being set after the virtqueue elem has been unmapped. A malicious guest could use this flaw to crash QEMU, resulting in a denial of service condition, or potentially execute code on the host with the privileges of the QEMU process.
Отчет
This issue affects the versions of qemu-kvm
as shipped with Red Hat Enterprise Linux 8 and Red Hat Enterprise Linux 8 Advanced Virtualization. A future update may address this flaw.
Меры по смягчению последствий
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 6 | qemu-kvm | Out of support scope | ||
Red Hat Enterprise Linux 7 | qemu-kvm | Out of support scope | ||
Red Hat Enterprise Linux 7 | qemu-kvm-ma | Out of support scope | ||
Red Hat Enterprise Linux 8 Advanced Virtualization | virt:8.2/qemu-kvm | Affected | ||
Red Hat Enterprise Linux 8 Advanced Virtualization | virt:av/qemu-kvm | Affected | ||
Red Hat Enterprise Linux 9 | qemu-kvm | Not affected | ||
Red Hat OpenStack Platform 10 (Newton) | qemu-kvm-rhev | Out of support scope | ||
Red Hat OpenStack Platform 13 (Queens) | qemu-kvm-rhev | Out of support scope | ||
Advanced Virtualization for RHEL 8.2.1 | virt | Fixed | RHSA-2021:5036 | 09.12.2021 |
Advanced Virtualization for RHEL 8.2.1 | virt-devel | Fixed | RHSA-2021:5036 | 09.12.2021 |
Показывать по
Дополнительная информация
Статус:
EPSS
7.5 High
CVSS3
Связанные уязвимости
A use-after-free vulnerability was found in the virtio-net device of QEMU. It could occur when the descriptor's address belongs to the non direct access region, due to num_buffers being set after the virtqueue elem has been unmapped. A malicious guest could use this flaw to crash QEMU, resulting in a denial of service condition, or potentially execute code on the host with the privileges of the QEMU process.
A use-after-free vulnerability was found in the virtio-net device of QEMU. It could occur when the descriptor's address belongs to the non direct access region, due to num_buffers being set after the virtqueue elem has been unmapped. A malicious guest could use this flaw to crash QEMU, resulting in a denial of service condition, or potentially execute code on the host with the privileges of the QEMU process.
A use-after-free vulnerability was found in the virtio-net device of Q ...
A use-after-free vulnerability was found in the virtio-net device of QEMU. It could occur when the descriptor's address belongs to the non direct access region, due to num_buffers being set after the virtqueue elem has been unmapped. A malicious guest could use this flaw to crash QEMU, resulting in a denial of service condition, or potentially execute code on the host with the privileges of the QEMU process.
EPSS
7.5 High
CVSS3