CVE-2024-4693Operation on a Resource after Expiration or Release in Qemu

Severity
5.5MEDIUMNVD
OSV3.5
EPSS
0.0%
top 90.30%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 14
Latest updateNov 8

Description

A flaw was found in the QEMU Virtio PCI Bindings (hw/virtio/virtio-pci.c). An improper release and use of the irqfd for vector 0 during the boot process leads to a guest triggerable crash via vhost_net_stop(). This flaw allows a malicious guest to crash the QEMU process on the host.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages2 packages

Debianqemu/qemu< 1:8.2.3+ds-1+1
Ubuntuqemu/qemu< 1:4.2-3ubuntu6.30+5

🔴Vulnerability Details

4
OSV
qemu vulnerabilities2024-11-08
GHSA
GHSA-c58x-2x8h-gwq3: A flaw was found in the QEMU Virtio PCI Bindings (hw/virtio/virtio-pci2024-05-14
OSV
CVE-2024-4693: A flaw was found in the QEMU Virtio PCI Bindings (hw/virtio/virtio-pci2024-05-14
CVEList
Qemu-kvm: virtio-pci: improper release of configure vector leads to guest triggerable crash2024-05-10

📋Vendor Advisories

4
Ubuntu
QEMU vulnerabilities2024-11-08
Microsoft
Qemu-kvm: virtio-pci: improper release of configure vector leads to guest triggerable crash2024-05-14
Red Hat
qemu-kvm: virtio-pci: improper release of configure vector leads to guest triggerable crash2024-05-10
Debian
CVE-2024-4693: qemu - A flaw was found in the QEMU Virtio PCI Bindings (hw/virtio/virtio-pci.c). An im...2024