SB20241022393 - SUSE update for qemu
Published: October 22, 2024
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 4 secuirty vulnerabilities.
1) Operation on a Resource after Expiration or Release (CVE-ID: CVE-2024-4693)
The vulnerability allows a malicious guest to perform a denial of service (DoS) attack.
The vulnerability exists due to an improper release and use of the irqfd for vector 0 during the boot process in the QEMU Virtio PCI Bindings (hw/virtio/virtio-pci.c). A malicious guest can crash the QUEMU host process via vhost_net_stop().
2) Improper synchronization (CVE-ID: CVE-2024-7409)
The vulnerability allows a malicious guest to perform a denial of service (DoS) attack.
The vulnerability exists due to improper synchronization during socket closure in the QEMU NBD Server. A malicious guest can perform a denial of service (DoS) attack.
3) Reachable assertion (CVE-ID: CVE-2024-8354)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a reachable assertion within the usb_ep_get() function in hw/net/core.c when trying to get the USB endpoint from a USB device. A remote attacker can perform a denial of service (DoS) attack.
4) Memory leak (CVE-ID: CVE-2024-8612)
The vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due memory leak in the virtio-scsi, virtio-blk, and virtio-crypto devices. A local user can gain access to uninitialized data stored in bounce.buffer.
Remediation
Install update from vendor's website.