First published: Mon Feb 19 2024(Updated: )
An issue was discovered in QEMU 7.1.0 through 8.2.1. register_vfs in hw/pci/pcie_sriov.c mishandles the situation where a guest writes NumVFs greater than TotalVFs, leading to a buffer overflow in VF implementations.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/qemu | 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u7 1:9.0.2+ds-2 1:9.1.0+ds-3 | |
redhat/qemu-kvm | <9.0.0 | 9.0.0 |
QEMU | >=7.1.0<=8.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-26327 has a high severity level due to the potential for buffer overflow vulnerabilities.
To fix CVE-2024-26327, upgrade to the patched versions of QEMU as specified by your distribution.
CVE-2024-26327 affects QEMU versions 7.1.0 through 8.2.1 and related implementations like QEMU-KVM.
CVE-2024-26327 is a buffer overflow vulnerability resulting from improper handling of virtual function configuration.
Yes, CVE-2024-26327 is considered potentially exploitable in a network context, depending on the configuration of the virtual environment.