{"id":"RLSA-2024:9136","summary":"Moderate: qemu-kvm security update","details":"Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM.\n\nSecurity Fix(es):\n\n* QEMU: SR-IOV: improper validation of NumVFs leads to buffer overflow (CVE-2024-26327)\n\n* QEMU: virtio: DMA reentrancy issue leads to double free vulnerability (CVE-2024-3446)\n\n* QEMU: Denial of Service via Improper Synchronization in QEMU NBD Server During Socket Closure (CVE-2024-7409)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.","modified":"2026-03-11T05:35:34.479294Z","published":"2025-03-17T20:16:49.937392Z","upstream":["CVE-2024-26327","CVE-2024-3446","CVE-2024-7409"],"references":[{"type":"ADVISORY","url":"https://errata.rockylinux.org/RLSA-2024:9136"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2264844"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2274211"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2302487"}],"affected":[{"package":{"name":"qemu-kvm","ecosystem":"Rocky Linux:9","purl":"pkg:rpm/rocky-linux/qemu-kvm?distro=rocky-linux-9&epoch=7"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"7:9.0.0-10.el9_5.2"}],"database_specific":{"yum_repository":"AppStream"}}],"database_specific":{"source":"https://storage.googleapis.com/resf-osv-data/RLSA-2024:9136.json"}}],"schema_version":"1.7.5","credits":[{"name":"Rocky Enterprise Software Foundation"},{"name":"Red Hat"}]}