Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU94526
Risk: Low
CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-4467
CWE-ID:
CWE-400 - Resource exhaustion
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to application does not properly control consumption of internal resources within the qemu-img utility when handling a specially crafted image file containing a "json:{}" value. A remote attacker can trick the victim into loading a specially crafted image file and perform a denial of service (DoS) attack.
MitigationUpdate the affected package qemu to the latest version.
Vulnerable software versionsSUSE Package Hub 15: 15-SP6
Server Applications Module: 15-SP6
Basesystem Module: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
SUSE Linux Enterprise Desktop 15: SP6
qemu-block-rbd-debuginfo: before 8.2.6-150600.3.9.1
qemu-block-rbd: before 8.2.6-150600.3.9.1
qemu-microvm: before 8.2.6-150600.3.9.1
qemu-doc: before 8.2.6-150600.3.9.1
qemu-ipxe: before 8.2.6-150600.3.9.1
qemu-skiboot: before 8.2.6-150600.3.9.1
qemu-seabios: before 8.2.61.16.3_3_ga95067eb-150600.3.9.1
qemu-SLOF: before 8.2.6-150600.3.9.1
qemu-vgabios: before 8.2.61.16.3_3_ga95067eb-150600.3.9.1
qemu-block-dmg-debuginfo: before 8.2.6-150600.3.9.1
qemu-linux-user-debuginfo: before 8.2.6-150600.3.9.1
qemu-audio-pipewire-debuginfo: before 8.2.6-150600.3.9.1
qemu-vhost-user-gpu: before 8.2.6-150600.3.9.1
qemu-guest-agent: before 8.2.6-150600.3.9.1
qemu-block-gluster: before 8.2.6-150600.3.9.1
qemu-x86: before 8.2.6-150600.3.9.1
qemu-block-curl-debuginfo: before 8.2.6-150600.3.9.1
qemu-debugsource: before 8.2.6-150600.3.9.1
qemu-hw-display-qxl: before 8.2.6-150600.3.9.1
qemu-debuginfo: before 8.2.6-150600.3.9.1
qemu-chardev-baum-debuginfo: before 8.2.6-150600.3.9.1
qemu-tools-debuginfo: before 8.2.6-150600.3.9.1
qemu-block-nfs: before 8.2.6-150600.3.9.1
qemu-hw-display-qxl-debuginfo: before 8.2.6-150600.3.9.1
qemu-ui-dbus-debuginfo: before 8.2.6-150600.3.9.1
qemu-hw-display-virtio-gpu: before 8.2.6-150600.3.9.1
qemu-chardev-spice: before 8.2.6-150600.3.9.1
qemu-s390x: before 8.2.6-150600.3.9.1
qemu-lang: before 8.2.6-150600.3.9.1
qemu-ui-dbus: before 8.2.6-150600.3.9.1
qemu-audio-spice-debuginfo: before 8.2.6-150600.3.9.1
qemu-audio-oss: before 8.2.6-150600.3.9.1
qemu-ivshmem-tools: before 8.2.6-150600.3.9.1
qemu-vhost-user-gpu-debuginfo: before 8.2.6-150600.3.9.1
qemu-audio-spice: before 8.2.6-150600.3.9.1
qemu-ui-spice-app-debuginfo: before 8.2.6-150600.3.9.1
qemu-hw-usb-redirect: before 8.2.6-150600.3.9.1
qemu-audio-oss-debuginfo: before 8.2.6-150600.3.9.1
qemu-audio-alsa-debuginfo: before 8.2.6-150600.3.9.1
qemu-audio-pipewire: before 8.2.6-150600.3.9.1
qemu-accel-qtest: before 8.2.6-150600.3.9.1
qemu-block-curl: before 8.2.6-150600.3.9.1
qemu-hw-s390x-virtio-gpu-ccw: before 8.2.6-150600.3.9.1
qemu-audio-jack-debuginfo: before 8.2.6-150600.3.9.1
qemu-arm: before 8.2.6-150600.3.9.1
qemu-accel-tcg-x86-debuginfo: before 8.2.6-150600.3.9.1
qemu-block-nfs-debuginfo: before 8.2.6-150600.3.9.1
qemu-linux-user-debugsource: before 8.2.6-150600.3.9.1
qemu-ui-curses-debuginfo: before 8.2.6-150600.3.9.1
qemu-x86-debuginfo: before 8.2.6-150600.3.9.1
qemu-linux-user: before 8.2.6-150600.3.9.1
qemu-hw-usb-smartcard-debuginfo: before 8.2.6-150600.3.9.1
qemu-hw-display-virtio-gpu-debuginfo: before 8.2.6-150600.3.9.1
qemu-hw-s390x-virtio-gpu-ccw-debuginfo: before 8.2.6-150600.3.9.1
qemu-block-dmg: before 8.2.6-150600.3.9.1
qemu-tools: before 8.2.6-150600.3.9.1
qemu-pr-helper-debuginfo: before 8.2.6-150600.3.9.1
qemu-audio-alsa: before 8.2.6-150600.3.9.1
qemu-hw-usb-host: before 8.2.6-150600.3.9.1
qemu-hw-display-virtio-gpu-pci: before 8.2.6-150600.3.9.1
qemu-arm-debuginfo: before 8.2.6-150600.3.9.1
qemu-audio-jack: before 8.2.6-150600.3.9.1
qemu-extra-debuginfo: before 8.2.6-150600.3.9.1
qemu-ivshmem-tools-debuginfo: before 8.2.6-150600.3.9.1
qemu-audio-pa: before 8.2.6-150600.3.9.1
qemu-guest-agent-debuginfo: before 8.2.6-150600.3.9.1
qemu-audio-pa-debuginfo: before 8.2.6-150600.3.9.1
qemu-ui-gtk: before 8.2.6-150600.3.9.1
qemu-img-debuginfo: before 8.2.6-150600.3.9.1
qemu: before 8.2.6-150600.3.9.1
qemu-hw-usb-host-debuginfo: before 8.2.6-150600.3.9.1
qemu-accel-qtest-debuginfo: before 8.2.6-150600.3.9.1
qemu-ui-opengl: before 8.2.6-150600.3.9.1
qemu-chardev-spice-debuginfo: before 8.2.6-150600.3.9.1
qemu-accel-tcg-x86: before 8.2.6-150600.3.9.1
qemu-hw-usb-smartcard: before 8.2.6-150600.3.9.1
qemu-hw-display-virtio-gpu-pci-debuginfo: before 8.2.6-150600.3.9.1
qemu-hw-display-virtio-vga: before 8.2.6-150600.3.9.1
qemu-audio-dbus: before 8.2.6-150600.3.9.1
qemu-ui-spice-app: before 8.2.6-150600.3.9.1
qemu-s390x-debuginfo: before 8.2.6-150600.3.9.1
qemu-block-iscsi: before 8.2.6-150600.3.9.1
qemu-hw-usb-redirect-debuginfo: before 8.2.6-150600.3.9.1
qemu-headless: before 8.2.6-150600.3.9.1
qemu-ppc: before 8.2.6-150600.3.9.1
qemu-block-ssh-debuginfo: before 8.2.6-150600.3.9.1
qemu-ui-opengl-debuginfo: before 8.2.6-150600.3.9.1
qemu-spice: before 8.2.6-150600.3.9.1
qemu-ui-spice-core-debuginfo: before 8.2.6-150600.3.9.1
qemu-pr-helper: before 8.2.6-150600.3.9.1
qemu-block-ssh: before 8.2.6-150600.3.9.1
qemu-ui-gtk-debuginfo: before 8.2.6-150600.3.9.1
qemu-img: before 8.2.6-150600.3.9.1
qemu-extra: before 8.2.6-150600.3.9.1
qemu-hw-display-virtio-vga-debuginfo: before 8.2.6-150600.3.9.1
qemu-block-gluster-debuginfo: before 8.2.6-150600.3.9.1
qemu-ui-spice-core: before 8.2.6-150600.3.9.1
qemu-ppc-debuginfo: before 8.2.6-150600.3.9.1
qemu-ui-curses: before 8.2.6-150600.3.9.1
qemu-ksm: before 8.2.6-150600.3.9.1
qemu-block-iscsi-debuginfo: before 8.2.6-150600.3.9.1
qemu-audio-dbus-debuginfo: before 8.2.6-150600.3.9.1
qemu-chardev-baum: before 8.2.6-150600.3.9.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242983-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96080
Risk: Medium
CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-7409
CWE-ID:
CWE-662 - Improper Synchronization
Exploit availability: No
DescriptionThe vulnerability allows a malicious guest to perform a denial of service (DoS) attack.
The vulnerability exists due to improper synchronization during socket closure in the QEMU NBD Server. A malicious guest can perform a denial of service (DoS) attack.
Update the affected package qemu to the latest version.
Vulnerable software versionsSUSE Package Hub 15: 15-SP6
Server Applications Module: 15-SP6
Basesystem Module: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
SUSE Linux Enterprise Desktop 15: SP6
qemu-block-rbd-debuginfo: before 8.2.6-150600.3.9.1
qemu-block-rbd: before 8.2.6-150600.3.9.1
qemu-microvm: before 8.2.6-150600.3.9.1
qemu-doc: before 8.2.6-150600.3.9.1
qemu-ipxe: before 8.2.6-150600.3.9.1
qemu-skiboot: before 8.2.6-150600.3.9.1
qemu-seabios: before 8.2.61.16.3_3_ga95067eb-150600.3.9.1
qemu-SLOF: before 8.2.6-150600.3.9.1
qemu-vgabios: before 8.2.61.16.3_3_ga95067eb-150600.3.9.1
qemu-block-dmg-debuginfo: before 8.2.6-150600.3.9.1
qemu-linux-user-debuginfo: before 8.2.6-150600.3.9.1
qemu-audio-pipewire-debuginfo: before 8.2.6-150600.3.9.1
qemu-vhost-user-gpu: before 8.2.6-150600.3.9.1
qemu-guest-agent: before 8.2.6-150600.3.9.1
qemu-block-gluster: before 8.2.6-150600.3.9.1
qemu-x86: before 8.2.6-150600.3.9.1
qemu-block-curl-debuginfo: before 8.2.6-150600.3.9.1
qemu-debugsource: before 8.2.6-150600.3.9.1
qemu-hw-display-qxl: before 8.2.6-150600.3.9.1
qemu-debuginfo: before 8.2.6-150600.3.9.1
qemu-chardev-baum-debuginfo: before 8.2.6-150600.3.9.1
qemu-tools-debuginfo: before 8.2.6-150600.3.9.1
qemu-block-nfs: before 8.2.6-150600.3.9.1
qemu-hw-display-qxl-debuginfo: before 8.2.6-150600.3.9.1
qemu-ui-dbus-debuginfo: before 8.2.6-150600.3.9.1
qemu-hw-display-virtio-gpu: before 8.2.6-150600.3.9.1
qemu-chardev-spice: before 8.2.6-150600.3.9.1
qemu-s390x: before 8.2.6-150600.3.9.1
qemu-lang: before 8.2.6-150600.3.9.1
qemu-ui-dbus: before 8.2.6-150600.3.9.1
qemu-audio-spice-debuginfo: before 8.2.6-150600.3.9.1
qemu-audio-oss: before 8.2.6-150600.3.9.1
qemu-ivshmem-tools: before 8.2.6-150600.3.9.1
qemu-vhost-user-gpu-debuginfo: before 8.2.6-150600.3.9.1
qemu-audio-spice: before 8.2.6-150600.3.9.1
qemu-ui-spice-app-debuginfo: before 8.2.6-150600.3.9.1
qemu-hw-usb-redirect: before 8.2.6-150600.3.9.1
qemu-audio-oss-debuginfo: before 8.2.6-150600.3.9.1
qemu-audio-alsa-debuginfo: before 8.2.6-150600.3.9.1
qemu-audio-pipewire: before 8.2.6-150600.3.9.1
qemu-accel-qtest: before 8.2.6-150600.3.9.1
qemu-block-curl: before 8.2.6-150600.3.9.1
qemu-hw-s390x-virtio-gpu-ccw: before 8.2.6-150600.3.9.1
qemu-audio-jack-debuginfo: before 8.2.6-150600.3.9.1
qemu-arm: before 8.2.6-150600.3.9.1
qemu-accel-tcg-x86-debuginfo: before 8.2.6-150600.3.9.1
qemu-block-nfs-debuginfo: before 8.2.6-150600.3.9.1
qemu-linux-user-debugsource: before 8.2.6-150600.3.9.1
qemu-ui-curses-debuginfo: before 8.2.6-150600.3.9.1
qemu-x86-debuginfo: before 8.2.6-150600.3.9.1
qemu-linux-user: before 8.2.6-150600.3.9.1
qemu-hw-usb-smartcard-debuginfo: before 8.2.6-150600.3.9.1
qemu-hw-display-virtio-gpu-debuginfo: before 8.2.6-150600.3.9.1
qemu-hw-s390x-virtio-gpu-ccw-debuginfo: before 8.2.6-150600.3.9.1
qemu-block-dmg: before 8.2.6-150600.3.9.1
qemu-tools: before 8.2.6-150600.3.9.1
qemu-pr-helper-debuginfo: before 8.2.6-150600.3.9.1
qemu-audio-alsa: before 8.2.6-150600.3.9.1
qemu-hw-usb-host: before 8.2.6-150600.3.9.1
qemu-hw-display-virtio-gpu-pci: before 8.2.6-150600.3.9.1
qemu-arm-debuginfo: before 8.2.6-150600.3.9.1
qemu-audio-jack: before 8.2.6-150600.3.9.1
qemu-extra-debuginfo: before 8.2.6-150600.3.9.1
qemu-ivshmem-tools-debuginfo: before 8.2.6-150600.3.9.1
qemu-audio-pa: before 8.2.6-150600.3.9.1
qemu-guest-agent-debuginfo: before 8.2.6-150600.3.9.1
qemu-audio-pa-debuginfo: before 8.2.6-150600.3.9.1
qemu-ui-gtk: before 8.2.6-150600.3.9.1
qemu-img-debuginfo: before 8.2.6-150600.3.9.1
qemu: before 8.2.6-150600.3.9.1
qemu-hw-usb-host-debuginfo: before 8.2.6-150600.3.9.1
qemu-accel-qtest-debuginfo: before 8.2.6-150600.3.9.1
qemu-ui-opengl: before 8.2.6-150600.3.9.1
qemu-chardev-spice-debuginfo: before 8.2.6-150600.3.9.1
qemu-accel-tcg-x86: before 8.2.6-150600.3.9.1
qemu-hw-usb-smartcard: before 8.2.6-150600.3.9.1
qemu-hw-display-virtio-gpu-pci-debuginfo: before 8.2.6-150600.3.9.1
qemu-hw-display-virtio-vga: before 8.2.6-150600.3.9.1
qemu-audio-dbus: before 8.2.6-150600.3.9.1
qemu-ui-spice-app: before 8.2.6-150600.3.9.1
qemu-s390x-debuginfo: before 8.2.6-150600.3.9.1
qemu-block-iscsi: before 8.2.6-150600.3.9.1
qemu-hw-usb-redirect-debuginfo: before 8.2.6-150600.3.9.1
qemu-headless: before 8.2.6-150600.3.9.1
qemu-ppc: before 8.2.6-150600.3.9.1
qemu-block-ssh-debuginfo: before 8.2.6-150600.3.9.1
qemu-ui-opengl-debuginfo: before 8.2.6-150600.3.9.1
qemu-spice: before 8.2.6-150600.3.9.1
qemu-ui-spice-core-debuginfo: before 8.2.6-150600.3.9.1
qemu-pr-helper: before 8.2.6-150600.3.9.1
qemu-block-ssh: before 8.2.6-150600.3.9.1
qemu-ui-gtk-debuginfo: before 8.2.6-150600.3.9.1
qemu-img: before 8.2.6-150600.3.9.1
qemu-extra: before 8.2.6-150600.3.9.1
qemu-hw-display-virtio-vga-debuginfo: before 8.2.6-150600.3.9.1
qemu-block-gluster-debuginfo: before 8.2.6-150600.3.9.1
qemu-ui-spice-core: before 8.2.6-150600.3.9.1
qemu-ppc-debuginfo: before 8.2.6-150600.3.9.1
qemu-ui-curses: before 8.2.6-150600.3.9.1
qemu-ksm: before 8.2.6-150600.3.9.1
qemu-block-iscsi-debuginfo: before 8.2.6-150600.3.9.1
qemu-audio-dbus-debuginfo: before 8.2.6-150600.3.9.1
qemu-chardev-baum: before 8.2.6-150600.3.9.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242983-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.