7.5

CVE-2024-7409

A flaw was found in the QEMU NBD Server. This vulnerability allows a denial of service (DoS) attack via improper synchronization during socket closure when a client keeps a socket open as the server is taken offline.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
Collection URLhttps://github.com/qemu/qemu
Package qemu
Default Statusunknown
Version 7.2.0
Status unaffected
Version 8.2.0
Status unaffected
Version 9.0.0
Status unaffected
VendorRed Hat
Product Red Hat Enterprise Linux 8
Default Statusaffected
Version < *
Version 8100020240905091210.489197e6
Status unaffected
VendorRed Hat
Product Red Hat Enterprise Linux 8
Default Statusaffected
Version < *
Version 8100020240905091210.489197e6
Status unaffected
VendorRed Hat
Product Red Hat Enterprise Linux 9
Default Statusaffected
Version < *
Version 17:9.0.0-10.el9_5
Status unaffected
VendorRed Hat
Product Red Hat Enterprise Linux 9.2 Extended Update Support
Default Statusaffected
Version < *
Version 17:7.2.0-14.el9_2.14
Status unaffected
VendorRed Hat
Product Red Hat Enterprise Linux 9.4 Extended Update Support
Default Statusaffected
Version < *
Version 17:8.2.0-11.el9_4.8
Status unaffected
VendorRed Hat
Product Red Hat OpenShift Container Platform 4.13
Default Statusaffected
Version < *
Version 413.92.202411212100-0
Status unaffected
VendorRed Hat
Product Red Hat OpenShift Container Platform 4.13
Default Statusaffected
Version < *
Version 413.92.202409180051-0
Status unaffected
VendorRed Hat
Product Red Hat OpenShift Container Platform 4.14
Default Statusaffected
Version < *
Version 414.92.202411130444-0
Status unaffected
VendorRed Hat
Product Red Hat OpenShift Container Platform 4.15
Default Statusaffected
Version < *
Version 415.92.202409162258-0
Status unaffected
VendorRed Hat
Product Red Hat OpenShift Container Platform 4.15
Default Statusaffected
Version < *
Version 415.92.202411050056-0
Status unaffected
VendorRed Hat
Product Red Hat OpenShift Container Platform 4.16
Default Statusaffected
Version < *
Version 416.94.202411261619-0
Status unaffected
VendorRed Hat
Product Red Hat OpenShift Container Platform 4.17
Default Statusaffected
Version < *
Version 417.94.202411261220-0
Status unaffected
VendorRed Hat
Product Red Hat Enterprise Linux 10
Default Statusunaffected
VendorRed Hat
Product Red Hat Enterprise Linux 6
Default Statusunknown
VendorRed Hat
Product Red Hat Enterprise Linux 7
Default Statusunknown
VendorRed Hat
Product Red Hat Enterprise Linux 7
Default Statusunknown
VendorRed Hat
Product Red Hat Enterprise Linux 8 Advanced Virtualization
Default Statusaffected
VendorRed Hat
Product Red Hat Enterprise Linux 8 Advanced Virtualization
Default Statusaffected
VendorRed Hat
Product Red Hat Enterprise Linux 8 Advanced Virtualization
Default Statusaffected
VendorRed Hat
Product Red Hat Enterprise Linux 8 Advanced Virtualization
Default Statusaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 1.71% 0.817
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
secalert@redhat.com 7.5 3.9 3.6
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CWE-662 Improper Synchronization

The product utilizes multiple threads or processes to allow temporary access to a shared resource that can only be exclusive to one process at a time, but it does not properly synchronize these actions, which might cause simultaneous accesses of this resource by multiple threads or processes.