SB2025022451 - SUSE update for qemu 



SB2025022451 - SUSE update for qemu

Published: February 24, 2025

Security Bulletin ID SB2025022451
Severity
Medium
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 33% Low 67%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Heap-based buffer overflow (CVE-ID: CVE-2024-3447)

The vulnerability allows a malicious guest to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error in the SDHCI device emulation. A malicious guest can set both "s->data_count" and the size of "s->fifo_buffer" to the value of "0x200" to trigger an out-of-bound memory access and perform a denial of service (DoS) attack.


2) Improper synchronization (CVE-ID: CVE-2024-7409)

The vulnerability allows a malicious guest to perform a denial of service (DoS) attack.

The vulnerability exists due to improper synchronization during socket closure in the QEMU NBD Server. A malicious guest can perform a denial of service (DoS) attack.


3) Memory leak (CVE-ID: CVE-2024-8612)

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due memory leak in the virtio-scsi, virtio-blk, and virtio-crypto devices. A local user can gain access to uninitialized data stored in bounce.buffer.


Remediation

Install update from vendor's website.