Описание
Security update for qemu
This update for qemu fixes the following issues:
Security fixes:
- CVE-2024-8354: Fixed assertion failure in usb_ep_get() (bsc#1230834)
- CVE-2024-8612: Fixed information leak in virtio devices (bsc#1230915)
Update version to 8.2.7:
Security fixes:
- CVE-2024-7409: Fixed denial of service via improper synchronization in QEMU NBD Server during socket closure (bsc#1229007)
- CVE-2024-4693: Fixed improper release of configure vector in virtio-pci that lead to guest triggerable crash (bsc#1224132)
Other fixes:
- added missing fix for ppc64 emulation that caused corruption in userspace (bsc#1230140)
- target/ppc: Fix lxvx/stxvx facility check (bsc#1229929)
- accel/kvm: check for KVM_CAP_READONLY_MEM on VM (bsc#1231519)
Full changelog here:
https://lore.kernel.org/qemu-devel/d9ff276f-f1ba-4e90-8343-a7a0dc2bf305@tls.msk.ru/
Список пакетов
SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6
Ссылки
- Link for SUSE-SU-2024:3744-1
- E-Mail link for SUSE-SU-2024:3744-1
- SUSE Security Ratings
- SUSE Bug 1224132
- SUSE Bug 1229007
- SUSE Bug 1229929
- SUSE Bug 1230140
- SUSE Bug 1230834
- SUSE Bug 1230915
- SUSE Bug 1231519
- SUSE CVE CVE-2024-4693 page
- SUSE CVE CVE-2024-7409 page
- SUSE CVE CVE-2024-8354 page
- SUSE CVE CVE-2024-8612 page
Описание
A flaw was found in the QEMU Virtio PCI Bindings (hw/virtio/virtio-pci.c). An improper release and use of the irqfd for vector 0 during the boot process leads to a guest triggerable crash via vhost_net_stop(). This flaw allows a malicious guest to crash the QEMU process on the host.
Затронутые продукты
Ссылки
- CVE-2024-4693
- SUSE Bug 1224132
Описание
A flaw was found in the QEMU NBD Server. This vulnerability allows a denial of service (DoS) attack via improper synchronization during socket closure when a client keeps a socket open as the server is taken offline.
Затронутые продукты
Ссылки
- CVE-2024-7409
- SUSE Bug 1229007
Описание
A flaw was found in QEMU. An assertion failure was present in the usb_ep_get() function in hw/net/core.c when trying to get the USB endpoint from a USB device. This flaw may allow a malicious unprivileged guest user to crash the QEMU process on the host and cause a denial of service condition.
Затронутые продукты
Ссылки
- CVE-2024-8354
- SUSE Bug 1230834
Описание
A flaw was found in QEMU, in the virtio-scsi, virtio-blk, and virtio-crypto devices. The size for virtqueue_push as set in virtio_scsi_complete_req / virtio_blk_req_complete / virito_crypto_req_complete could be larger than the true size of the data which has been sent to guest. Once virtqueue_push() finally calls dma_memory_unmap to ummap the in_iov, it may call the address_space_write function to write back the data. Some uninitialized data may exist in the bounce.buffer, leading to an information leak.
Затронутые продукты
Ссылки
- CVE-2024-8612
- SUSE Bug 1230915