SB20241022393 - SUSE update for qemu 



SB20241022393 - SUSE update for qemu

Published: October 22, 2024

Security Bulletin ID SB20241022393
Severity
Medium
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 50% Low 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Operation on a Resource after Expiration or Release (CVE-ID: CVE-2024-4693)

The vulnerability allows a malicious guest to perform a denial of service (DoS) attack.

The vulnerability exists due to an improper release and use of the irqfd for vector 0 during the boot process in the QEMU Virtio PCI Bindings (hw/virtio/virtio-pci.c). A malicious guest can crash the QUEMU host process via vhost_net_stop().


2) Improper synchronization (CVE-ID: CVE-2024-7409)

The vulnerability allows a malicious guest to perform a denial of service (DoS) attack.

The vulnerability exists due to improper synchronization during socket closure in the QEMU NBD Server. A malicious guest can perform a denial of service (DoS) attack.


3) Reachable assertion (CVE-ID: CVE-2024-8354)

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a reachable assertion within the usb_ep_get() function in hw/net/core.c when trying to get the USB endpoint from a USB device. A remote attacker can perform a denial of service (DoS) attack.


4) Memory leak (CVE-ID: CVE-2024-8612)

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due memory leak in the virtio-scsi, virtio-blk, and virtio-crypto devices. A local user can gain access to uninitialized data stored in bounce.buffer.


Remediation

Install update from vendor's website.