Security Bulletin
This security bulletin contains information about 3 vulnerabilities.
EUVDB-ID: #VU72306
Risk: Medium
CVSSv3.1: 4.9 [CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-3638
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
Description The vulnerability allows a malicious guest to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error in the ATI VGA device emulation of QEMU within the ati_2d_blt() routine while handling MMIO write operations. A malicious guest can crash the QEMU process on the host.
MitigationUpdate the affected package qemu to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
Server Applications Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
openSUSE Leap: 15.5
qemu-block-rbd-debuginfo: before 7.1.0-150500.49.9.2
qemu-block-rbd: before 7.1.0-150500.49.9.2
qemu-sgabios: before 8-150500.49.9.2
qemu-seabios: before 1.16.0_0_gd239552-150500.49.9.2
qemu-microvm: before 7.1.0-150500.49.9.2
qemu-skiboot: before 7.1.0-150500.49.9.2
qemu-vgabios: before 1.16.0_0_gd239552-150500.49.9.2
qemu-ipxe: before 1.0.0+-150500.49.9.2
qemu-SLOF: before 7.1.0-150500.49.9.2
qemu-kvm: before 7.1.0-150500.49.9.2
qemu-ui-spice-app: before 7.1.0-150500.49.9.2
qemu-block-curl: before 7.1.0-150500.49.9.2
qemu-ui-spice-core-debuginfo: before 7.1.0-150500.49.9.2
qemu-linux-user-debuginfo: before 7.1.0-150500.49.9.1
qemu-ui-dbus-debuginfo: before 7.1.0-150500.49.9.2
qemu-accel-qtest: before 7.1.0-150500.49.9.2
qemu-chardev-spice: before 7.1.0-150500.49.9.2
qemu-hw-display-virtio-gpu-debuginfo: before 7.1.0-150500.49.9.2
qemu-s390x-debuginfo: before 7.1.0-150500.49.9.2
qemu-hw-usb-redirect: before 7.1.0-150500.49.9.2
qemu-debuginfo: before 7.1.0-150500.49.9.2
qemu-block-nfs: before 7.1.0-150500.49.9.2
qemu-block-nfs-debuginfo: before 7.1.0-150500.49.9.2
qemu-ppc: before 7.1.0-150500.49.9.2
qemu-ivshmem-tools: before 7.1.0-150500.49.9.2
qemu-hw-usb-redirect-debuginfo: before 7.1.0-150500.49.9.2
qemu-ui-dbus: before 7.1.0-150500.49.9.2
qemu-extra: before 7.1.0-150500.49.9.2
qemu-headless: before 7.1.0-150500.49.9.2
qemu-audio-jack-debuginfo: before 7.1.0-150500.49.9.2
qemu-vhost-user-gpu: before 7.1.0-150500.49.9.2
qemu-ppc-debuginfo: before 7.1.0-150500.49.9.2
qemu-hw-display-qxl-debuginfo: before 7.1.0-150500.49.9.2
qemu-audio-jack: before 7.1.0-150500.49.9.2
qemu-block-dmg-debuginfo: before 7.1.0-150500.49.9.2
qemu-block-iscsi: before 7.1.0-150500.49.9.2
qemu-guest-agent: before 7.1.0-150500.49.9.2
qemu-x86-debuginfo: before 7.1.0-150500.49.9.2
qemu-hw-usb-host: before 7.1.0-150500.49.9.2
qemu-accel-tcg-x86: before 7.1.0-150500.49.9.2
qemu-block-gluster: before 7.1.0-150500.49.9.2
qemu-block-gluster-debuginfo: before 7.1.0-150500.49.9.2
qemu-audio-dbus: before 7.1.0-150500.49.9.2
qemu-hw-s390x-virtio-gpu-ccw: before 7.1.0-150500.49.9.2
qemu-audio-oss-debuginfo: before 7.1.0-150500.49.9.2
qemu-audio-alsa-debuginfo: before 7.1.0-150500.49.9.2
qemu-chardev-baum-debuginfo: before 7.1.0-150500.49.9.2
qemu-x86: before 7.1.0-150500.49.9.2
qemu-audio-pa: before 7.1.0-150500.49.9.2
qemu-hw-display-virtio-gpu-pci-debuginfo: before 7.1.0-150500.49.9.2
qemu-hw-usb-host-debuginfo: before 7.1.0-150500.49.9.2
qemu-hw-usb-smartcard: before 7.1.0-150500.49.9.2
qemu-audio-dbus-debuginfo: before 7.1.0-150500.49.9.2
qemu-lang: before 7.1.0-150500.49.9.2
qemu-s390x: before 7.1.0-150500.49.9.2
qemu-extra-debuginfo: before 7.1.0-150500.49.9.2
qemu-audio-spice-debuginfo: before 7.1.0-150500.49.9.2
qemu-ui-spice-core: before 7.1.0-150500.49.9.2
qemu-linux-user-debugsource: before 7.1.0-150500.49.9.1
qemu-ui-opengl-debuginfo: before 7.1.0-150500.49.9.2
qemu-block-dmg: before 7.1.0-150500.49.9.2
qemu-audio-spice: before 7.1.0-150500.49.9.2
qemu-audio-oss: before 7.1.0-150500.49.9.2
qemu-ui-opengl: before 7.1.0-150500.49.9.2
qemu-ivshmem-tools-debuginfo: before 7.1.0-150500.49.9.2
qemu-ui-gtk-debuginfo: before 7.1.0-150500.49.9.2
qemu-ui-curses: before 7.1.0-150500.49.9.2
qemu-tools: before 7.1.0-150500.49.9.2
qemu-linux-user: before 7.1.0-150500.49.9.1
qemu-chardev-baum: before 7.1.0-150500.49.9.2
qemu-tools-debuginfo: before 7.1.0-150500.49.9.2
qemu-block-iscsi-debuginfo: before 7.1.0-150500.49.9.2
qemu-accel-tcg-x86-debuginfo: before 7.1.0-150500.49.9.2
qemu-hw-display-qxl: before 7.1.0-150500.49.9.2
qemu-guest-agent-debuginfo: before 7.1.0-150500.49.9.2
qemu-audio-alsa: before 7.1.0-150500.49.9.2
qemu-vhost-user-gpu-debuginfo: before 7.1.0-150500.49.9.2
qemu-audio-pa-debuginfo: before 7.1.0-150500.49.9.2
qemu-hw-display-virtio-vga: before 7.1.0-150500.49.9.2
qemu-hw-s390x-virtio-gpu-ccw-debuginfo: before 7.1.0-150500.49.9.2
qemu-block-curl-debuginfo: before 7.1.0-150500.49.9.2
qemu-hw-display-virtio-vga-debuginfo: before 7.1.0-150500.49.9.2
qemu-ksm: before 7.1.0-150500.49.9.2
qemu-ui-gtk: before 7.1.0-150500.49.9.2
qemu-ui-spice-app-debuginfo: before 7.1.0-150500.49.9.2
qemu: before 7.1.0-150500.49.9.2
qemu-chardev-spice-debuginfo: before 7.1.0-150500.49.9.2
qemu-hw-display-virtio-gpu-pci: before 7.1.0-150500.49.9.2
qemu-hw-usb-smartcard-debuginfo: before 7.1.0-150500.49.9.2
qemu-arm: before 7.1.0-150500.49.9.2
qemu-arm-debuginfo: before 7.1.0-150500.49.9.2
qemu-accel-qtest-debuginfo: before 7.1.0-150500.49.9.2
qemu-debugsource: before 7.1.0-150500.49.9.2
qemu-hw-display-virtio-gpu: before 7.1.0-150500.49.9.2
qemu-block-ssh: before 7.1.0-150500.49.9.2
qemu-ui-curses-debuginfo: before 7.1.0-150500.49.9.2
qemu-block-ssh-debuginfo: before 7.1.0-150500.49.9.2
External linkshttp://www.suse.com/support/update/announcement/2023/suse-su-20234662-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU80016
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-3180
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
Description The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error within the virtio_crypto_handle_sym_req() function in hw/virtio/virtio-crypto.c of the QEMU virtual crypto device when handling data encryption/decryption requests. A local user trigger an out-of-bounds write and perform a denial of service 9DoS) attack.
Update the affected package qemu to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
Server Applications Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
openSUSE Leap: 15.5
qemu-block-rbd-debuginfo: before 7.1.0-150500.49.9.2
qemu-block-rbd: before 7.1.0-150500.49.9.2
qemu-sgabios: before 8-150500.49.9.2
qemu-seabios: before 1.16.0_0_gd239552-150500.49.9.2
qemu-microvm: before 7.1.0-150500.49.9.2
qemu-skiboot: before 7.1.0-150500.49.9.2
qemu-vgabios: before 1.16.0_0_gd239552-150500.49.9.2
qemu-ipxe: before 1.0.0+-150500.49.9.2
qemu-SLOF: before 7.1.0-150500.49.9.2
qemu-kvm: before 7.1.0-150500.49.9.2
qemu-ui-spice-app: before 7.1.0-150500.49.9.2
qemu-block-curl: before 7.1.0-150500.49.9.2
qemu-ui-spice-core-debuginfo: before 7.1.0-150500.49.9.2
qemu-linux-user-debuginfo: before 7.1.0-150500.49.9.1
qemu-ui-dbus-debuginfo: before 7.1.0-150500.49.9.2
qemu-accel-qtest: before 7.1.0-150500.49.9.2
qemu-chardev-spice: before 7.1.0-150500.49.9.2
qemu-hw-display-virtio-gpu-debuginfo: before 7.1.0-150500.49.9.2
qemu-s390x-debuginfo: before 7.1.0-150500.49.9.2
qemu-hw-usb-redirect: before 7.1.0-150500.49.9.2
qemu-debuginfo: before 7.1.0-150500.49.9.2
qemu-block-nfs: before 7.1.0-150500.49.9.2
qemu-block-nfs-debuginfo: before 7.1.0-150500.49.9.2
qemu-ppc: before 7.1.0-150500.49.9.2
qemu-ivshmem-tools: before 7.1.0-150500.49.9.2
qemu-hw-usb-redirect-debuginfo: before 7.1.0-150500.49.9.2
qemu-ui-dbus: before 7.1.0-150500.49.9.2
qemu-extra: before 7.1.0-150500.49.9.2
qemu-headless: before 7.1.0-150500.49.9.2
qemu-audio-jack-debuginfo: before 7.1.0-150500.49.9.2
qemu-vhost-user-gpu: before 7.1.0-150500.49.9.2
qemu-ppc-debuginfo: before 7.1.0-150500.49.9.2
qemu-hw-display-qxl-debuginfo: before 7.1.0-150500.49.9.2
qemu-audio-jack: before 7.1.0-150500.49.9.2
qemu-block-dmg-debuginfo: before 7.1.0-150500.49.9.2
qemu-block-iscsi: before 7.1.0-150500.49.9.2
qemu-guest-agent: before 7.1.0-150500.49.9.2
qemu-x86-debuginfo: before 7.1.0-150500.49.9.2
qemu-hw-usb-host: before 7.1.0-150500.49.9.2
qemu-accel-tcg-x86: before 7.1.0-150500.49.9.2
qemu-block-gluster: before 7.1.0-150500.49.9.2
qemu-block-gluster-debuginfo: before 7.1.0-150500.49.9.2
qemu-audio-dbus: before 7.1.0-150500.49.9.2
qemu-hw-s390x-virtio-gpu-ccw: before 7.1.0-150500.49.9.2
qemu-audio-oss-debuginfo: before 7.1.0-150500.49.9.2
qemu-audio-alsa-debuginfo: before 7.1.0-150500.49.9.2
qemu-chardev-baum-debuginfo: before 7.1.0-150500.49.9.2
qemu-x86: before 7.1.0-150500.49.9.2
qemu-audio-pa: before 7.1.0-150500.49.9.2
qemu-hw-display-virtio-gpu-pci-debuginfo: before 7.1.0-150500.49.9.2
qemu-hw-usb-host-debuginfo: before 7.1.0-150500.49.9.2
qemu-hw-usb-smartcard: before 7.1.0-150500.49.9.2
qemu-audio-dbus-debuginfo: before 7.1.0-150500.49.9.2
qemu-lang: before 7.1.0-150500.49.9.2
qemu-s390x: before 7.1.0-150500.49.9.2
qemu-extra-debuginfo: before 7.1.0-150500.49.9.2
qemu-audio-spice-debuginfo: before 7.1.0-150500.49.9.2
qemu-ui-spice-core: before 7.1.0-150500.49.9.2
qemu-linux-user-debugsource: before 7.1.0-150500.49.9.1
qemu-ui-opengl-debuginfo: before 7.1.0-150500.49.9.2
qemu-block-dmg: before 7.1.0-150500.49.9.2
qemu-audio-spice: before 7.1.0-150500.49.9.2
qemu-audio-oss: before 7.1.0-150500.49.9.2
qemu-ui-opengl: before 7.1.0-150500.49.9.2
qemu-ivshmem-tools-debuginfo: before 7.1.0-150500.49.9.2
qemu-ui-gtk-debuginfo: before 7.1.0-150500.49.9.2
qemu-ui-curses: before 7.1.0-150500.49.9.2
qemu-tools: before 7.1.0-150500.49.9.2
qemu-linux-user: before 7.1.0-150500.49.9.1
qemu-chardev-baum: before 7.1.0-150500.49.9.2
qemu-tools-debuginfo: before 7.1.0-150500.49.9.2
qemu-block-iscsi-debuginfo: before 7.1.0-150500.49.9.2
qemu-accel-tcg-x86-debuginfo: before 7.1.0-150500.49.9.2
qemu-hw-display-qxl: before 7.1.0-150500.49.9.2
qemu-guest-agent-debuginfo: before 7.1.0-150500.49.9.2
qemu-audio-alsa: before 7.1.0-150500.49.9.2
qemu-vhost-user-gpu-debuginfo: before 7.1.0-150500.49.9.2
qemu-audio-pa-debuginfo: before 7.1.0-150500.49.9.2
qemu-hw-display-virtio-vga: before 7.1.0-150500.49.9.2
qemu-hw-s390x-virtio-gpu-ccw-debuginfo: before 7.1.0-150500.49.9.2
qemu-block-curl-debuginfo: before 7.1.0-150500.49.9.2
qemu-hw-display-virtio-vga-debuginfo: before 7.1.0-150500.49.9.2
qemu-ksm: before 7.1.0-150500.49.9.2
qemu-ui-gtk: before 7.1.0-150500.49.9.2
qemu-ui-spice-app-debuginfo: before 7.1.0-150500.49.9.2
qemu: before 7.1.0-150500.49.9.2
qemu-chardev-spice-debuginfo: before 7.1.0-150500.49.9.2
qemu-hw-display-virtio-gpu-pci: before 7.1.0-150500.49.9.2
qemu-hw-usb-smartcard-debuginfo: before 7.1.0-150500.49.9.2
qemu-arm: before 7.1.0-150500.49.9.2
qemu-arm-debuginfo: before 7.1.0-150500.49.9.2
qemu-accel-qtest-debuginfo: before 7.1.0-150500.49.9.2
qemu-debugsource: before 7.1.0-150500.49.9.2
qemu-hw-display-virtio-gpu: before 7.1.0-150500.49.9.2
qemu-block-ssh: before 7.1.0-150500.49.9.2
qemu-ui-curses-debuginfo: before 7.1.0-150500.49.9.2
qemu-block-ssh-debuginfo: before 7.1.0-150500.49.9.2
External linkshttp://www.suse.com/support/update/announcement/2023/suse-su-20234662-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU80015
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-3354
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error in the QEMU built-in VNC server. When a client connects to the VNC server, QEMU checks whether the current number of connections crosses a certain threshold and if so, cleans up the previous connection. If the previous connection happens to be in the handshake phase and fails, QEMU cleans up the connection again, resulting in NULL pointer dereference and denial of service.
MitigationUpdate the affected package qemu to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
Server Applications Module: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
openSUSE Leap: 15.5
qemu-block-rbd-debuginfo: before 7.1.0-150500.49.9.2
qemu-block-rbd: before 7.1.0-150500.49.9.2
qemu-sgabios: before 8-150500.49.9.2
qemu-seabios: before 1.16.0_0_gd239552-150500.49.9.2
qemu-microvm: before 7.1.0-150500.49.9.2
qemu-skiboot: before 7.1.0-150500.49.9.2
qemu-vgabios: before 1.16.0_0_gd239552-150500.49.9.2
qemu-ipxe: before 1.0.0+-150500.49.9.2
qemu-SLOF: before 7.1.0-150500.49.9.2
qemu-kvm: before 7.1.0-150500.49.9.2
qemu-ui-spice-app: before 7.1.0-150500.49.9.2
qemu-block-curl: before 7.1.0-150500.49.9.2
qemu-ui-spice-core-debuginfo: before 7.1.0-150500.49.9.2
qemu-linux-user-debuginfo: before 7.1.0-150500.49.9.1
qemu-ui-dbus-debuginfo: before 7.1.0-150500.49.9.2
qemu-accel-qtest: before 7.1.0-150500.49.9.2
qemu-chardev-spice: before 7.1.0-150500.49.9.2
qemu-hw-display-virtio-gpu-debuginfo: before 7.1.0-150500.49.9.2
qemu-s390x-debuginfo: before 7.1.0-150500.49.9.2
qemu-hw-usb-redirect: before 7.1.0-150500.49.9.2
qemu-debuginfo: before 7.1.0-150500.49.9.2
qemu-block-nfs: before 7.1.0-150500.49.9.2
qemu-block-nfs-debuginfo: before 7.1.0-150500.49.9.2
qemu-ppc: before 7.1.0-150500.49.9.2
qemu-ivshmem-tools: before 7.1.0-150500.49.9.2
qemu-hw-usb-redirect-debuginfo: before 7.1.0-150500.49.9.2
qemu-ui-dbus: before 7.1.0-150500.49.9.2
qemu-extra: before 7.1.0-150500.49.9.2
qemu-headless: before 7.1.0-150500.49.9.2
qemu-audio-jack-debuginfo: before 7.1.0-150500.49.9.2
qemu-vhost-user-gpu: before 7.1.0-150500.49.9.2
qemu-ppc-debuginfo: before 7.1.0-150500.49.9.2
qemu-hw-display-qxl-debuginfo: before 7.1.0-150500.49.9.2
qemu-audio-jack: before 7.1.0-150500.49.9.2
qemu-block-dmg-debuginfo: before 7.1.0-150500.49.9.2
qemu-block-iscsi: before 7.1.0-150500.49.9.2
qemu-guest-agent: before 7.1.0-150500.49.9.2
qemu-x86-debuginfo: before 7.1.0-150500.49.9.2
qemu-hw-usb-host: before 7.1.0-150500.49.9.2
qemu-accel-tcg-x86: before 7.1.0-150500.49.9.2
qemu-block-gluster: before 7.1.0-150500.49.9.2
qemu-block-gluster-debuginfo: before 7.1.0-150500.49.9.2
qemu-audio-dbus: before 7.1.0-150500.49.9.2
qemu-hw-s390x-virtio-gpu-ccw: before 7.1.0-150500.49.9.2
qemu-audio-oss-debuginfo: before 7.1.0-150500.49.9.2
qemu-audio-alsa-debuginfo: before 7.1.0-150500.49.9.2
qemu-chardev-baum-debuginfo: before 7.1.0-150500.49.9.2
qemu-x86: before 7.1.0-150500.49.9.2
qemu-audio-pa: before 7.1.0-150500.49.9.2
qemu-hw-display-virtio-gpu-pci-debuginfo: before 7.1.0-150500.49.9.2
qemu-hw-usb-host-debuginfo: before 7.1.0-150500.49.9.2
qemu-hw-usb-smartcard: before 7.1.0-150500.49.9.2
qemu-audio-dbus-debuginfo: before 7.1.0-150500.49.9.2
qemu-lang: before 7.1.0-150500.49.9.2
qemu-s390x: before 7.1.0-150500.49.9.2
qemu-extra-debuginfo: before 7.1.0-150500.49.9.2
qemu-audio-spice-debuginfo: before 7.1.0-150500.49.9.2
qemu-ui-spice-core: before 7.1.0-150500.49.9.2
qemu-linux-user-debugsource: before 7.1.0-150500.49.9.1
qemu-ui-opengl-debuginfo: before 7.1.0-150500.49.9.2
qemu-block-dmg: before 7.1.0-150500.49.9.2
qemu-audio-spice: before 7.1.0-150500.49.9.2
qemu-audio-oss: before 7.1.0-150500.49.9.2
qemu-ui-opengl: before 7.1.0-150500.49.9.2
qemu-ivshmem-tools-debuginfo: before 7.1.0-150500.49.9.2
qemu-ui-gtk-debuginfo: before 7.1.0-150500.49.9.2
qemu-ui-curses: before 7.1.0-150500.49.9.2
qemu-tools: before 7.1.0-150500.49.9.2
qemu-linux-user: before 7.1.0-150500.49.9.1
qemu-chardev-baum: before 7.1.0-150500.49.9.2
qemu-tools-debuginfo: before 7.1.0-150500.49.9.2
qemu-block-iscsi-debuginfo: before 7.1.0-150500.49.9.2
qemu-accel-tcg-x86-debuginfo: before 7.1.0-150500.49.9.2
qemu-hw-display-qxl: before 7.1.0-150500.49.9.2
qemu-guest-agent-debuginfo: before 7.1.0-150500.49.9.2
qemu-audio-alsa: before 7.1.0-150500.49.9.2
qemu-vhost-user-gpu-debuginfo: before 7.1.0-150500.49.9.2
qemu-audio-pa-debuginfo: before 7.1.0-150500.49.9.2
qemu-hw-display-virtio-vga: before 7.1.0-150500.49.9.2
qemu-hw-s390x-virtio-gpu-ccw-debuginfo: before 7.1.0-150500.49.9.2
qemu-block-curl-debuginfo: before 7.1.0-150500.49.9.2
qemu-hw-display-virtio-vga-debuginfo: before 7.1.0-150500.49.9.2
qemu-ksm: before 7.1.0-150500.49.9.2
qemu-ui-gtk: before 7.1.0-150500.49.9.2
qemu-ui-spice-app-debuginfo: before 7.1.0-150500.49.9.2
qemu: before 7.1.0-150500.49.9.2
qemu-chardev-spice-debuginfo: before 7.1.0-150500.49.9.2
qemu-hw-display-virtio-gpu-pci: before 7.1.0-150500.49.9.2
qemu-hw-usb-smartcard-debuginfo: before 7.1.0-150500.49.9.2
qemu-arm: before 7.1.0-150500.49.9.2
qemu-arm-debuginfo: before 7.1.0-150500.49.9.2
qemu-accel-qtest-debuginfo: before 7.1.0-150500.49.9.2
qemu-debugsource: before 7.1.0-150500.49.9.2
qemu-hw-display-virtio-gpu: before 7.1.0-150500.49.9.2
qemu-block-ssh: before 7.1.0-150500.49.9.2
qemu-ui-curses-debuginfo: before 7.1.0-150500.49.9.2
qemu-block-ssh-debuginfo: before 7.1.0-150500.49.9.2
External linkshttp://www.suse.com/support/update/announcement/2023/suse-su-20234662-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.