Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU94526
Risk: Low
CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-4467
CWE-ID:
CWE-400 - Resource exhaustion
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to application does not properly control consumption of internal resources within the qemu-img utility when handling a specially crafted image file containing a "json:{}" value. A remote attacker can trick the victim into loading a specially crafted image file and perform a denial of service (DoS) attack.
MitigationUpdate the affected package qemu to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
Server Applications Module: 15-SP5
SUSE Package Hub 15: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
openSUSE Leap: 15.5
qemu-block-rbd-debuginfo: before 7.1.0-150500.49.18.1
qemu-block-rbd: before 7.1.0-150500.49.18.1
qemu-vgabios: before 1.16.0_0_gd239552-150500.49.18.1
qemu-microvm: before 7.1.0-150500.49.18.1
qemu-SLOF: before 7.1.0-150500.49.18.1
qemu-ipxe: before 1.0.0+-150500.49.18.1
qemu-skiboot: before 7.1.0-150500.49.18.1
qemu-seabios: before 1.16.0_0_gd239552-150500.49.18.1
qemu-sgabios: before 8-150500.49.18.1
qemu-kvm: before 7.1.0-150500.49.18.1
qemu-linux-user-debugsource: before 7.1.0-150500.49.18.1
qemu-hw-s390x-virtio-gpu-ccw-debuginfo: before 7.1.0-150500.49.18.1
qemu-arm-debuginfo: before 7.1.0-150500.49.18.1
qemu-accel-qtest-debuginfo: before 7.1.0-150500.49.18.1
qemu-ui-opengl-debuginfo: before 7.1.0-150500.49.18.1
qemu-vhost-user-gpu: before 7.1.0-150500.49.18.1
qemu-chardev-spice: before 7.1.0-150500.49.18.1
qemu-hw-display-virtio-gpu-pci-debuginfo: before 7.1.0-150500.49.18.1
qemu-tools: before 7.1.0-150500.49.18.1
qemu-audio-oss: before 7.1.0-150500.49.18.1
qemu-ppc: before 7.1.0-150500.49.18.1
qemu-hw-usb-host-debuginfo: before 7.1.0-150500.49.18.1
qemu-block-gluster: before 7.1.0-150500.49.18.1
qemu-block-curl-debuginfo: before 7.1.0-150500.49.18.1
qemu-ppc-debuginfo: before 7.1.0-150500.49.18.1
qemu-block-iscsi: before 7.1.0-150500.49.18.1
qemu-audio-alsa: before 7.1.0-150500.49.18.1
qemu-vhost-user-gpu-debuginfo: before 7.1.0-150500.49.18.1
qemu-x86-debuginfo: before 7.1.0-150500.49.18.1
qemu-audio-dbus: before 7.1.0-150500.49.18.1
qemu-debuginfo: before 7.1.0-150500.49.18.1
qemu-hw-usb-redirect: before 7.1.0-150500.49.18.1
qemu-block-nfs: before 7.1.0-150500.49.18.1
qemu-block-gluster-debuginfo: before 7.1.0-150500.49.18.1
qemu-ivshmem-tools-debuginfo: before 7.1.0-150500.49.18.1
qemu-block-dmg: before 7.1.0-150500.49.18.1
qemu-hw-s390x-virtio-gpu-ccw: before 7.1.0-150500.49.18.1
qemu-debugsource: before 7.1.0-150500.49.18.1
qemu-hw-usb-smartcard-debuginfo: before 7.1.0-150500.49.18.1
qemu-audio-alsa-debuginfo: before 7.1.0-150500.49.18.1
qemu-guest-agent: before 7.1.0-150500.49.18.1
qemu-guest-agent-debuginfo: before 7.1.0-150500.49.18.1
qemu-hw-display-virtio-gpu-pci: before 7.1.0-150500.49.18.1
qemu-lang: before 7.1.0-150500.49.18.1
qemu-hw-display-qxl-debuginfo: before 7.1.0-150500.49.18.1
qemu-audio-spice-debuginfo: before 7.1.0-150500.49.18.1
qemu-audio-spice: before 7.1.0-150500.49.18.1
qemu-linux-user-debuginfo: before 7.1.0-150500.49.18.1
qemu-audio-pa: before 7.1.0-150500.49.18.1
qemu-hw-usb-smartcard: before 7.1.0-150500.49.18.1
qemu-x86: before 7.1.0-150500.49.18.1
qemu-s390x-debuginfo: before 7.1.0-150500.49.18.1
qemu-block-dmg-debuginfo: before 7.1.0-150500.49.18.1
qemu-hw-usb-redirect-debuginfo: before 7.1.0-150500.49.18.1
qemu-chardev-baum-debuginfo: before 7.1.0-150500.49.18.1
qemu-hw-display-virtio-gpu-debuginfo: before 7.1.0-150500.49.18.1
qemu-ui-spice-core-debuginfo: before 7.1.0-150500.49.18.1
qemu-ui-curses: before 7.1.0-150500.49.18.1
qemu-chardev-baum: before 7.1.0-150500.49.18.1
qemu-extra-debuginfo: before 7.1.0-150500.49.18.1
qemu-block-curl: before 7.1.0-150500.49.18.1
qemu-ui-dbus-debuginfo: before 7.1.0-150500.49.18.1
qemu-audio-dbus-debuginfo: before 7.1.0-150500.49.18.1
qemu-ui-spice-app: before 7.1.0-150500.49.18.1
qemu-ui-dbus: before 7.1.0-150500.49.18.1
qemu-ui-gtk: before 7.1.0-150500.49.18.1
qemu-audio-pa-debuginfo: before 7.1.0-150500.49.18.1
qemu-block-iscsi-debuginfo: before 7.1.0-150500.49.18.1
qemu-block-nfs-debuginfo: before 7.1.0-150500.49.18.1
qemu-linux-user: before 7.1.0-150500.49.18.1
qemu-ksm: before 7.1.0-150500.49.18.1
qemu-headless: before 7.1.0-150500.49.18.1
qemu: before 7.1.0-150500.49.18.1
qemu-ui-spice-core: before 7.1.0-150500.49.18.1
qemu-ivshmem-tools: before 7.1.0-150500.49.18.1
qemu-s390x: before 7.1.0-150500.49.18.1
qemu-tools-debuginfo: before 7.1.0-150500.49.18.1
qemu-block-ssh: before 7.1.0-150500.49.18.1
qemu-accel-tcg-x86-debuginfo: before 7.1.0-150500.49.18.1
qemu-ui-curses-debuginfo: before 7.1.0-150500.49.18.1
qemu-accel-tcg-x86: before 7.1.0-150500.49.18.1
qemu-audio-oss-debuginfo: before 7.1.0-150500.49.18.1
qemu-arm: before 7.1.0-150500.49.18.1
qemu-hw-display-virtio-vga: before 7.1.0-150500.49.18.1
qemu-extra: before 7.1.0-150500.49.18.1
qemu-audio-jack: before 7.1.0-150500.49.18.1
qemu-chardev-spice-debuginfo: before 7.1.0-150500.49.18.1
qemu-ui-gtk-debuginfo: before 7.1.0-150500.49.18.1
qemu-hw-display-virtio-vga-debuginfo: before 7.1.0-150500.49.18.1
qemu-ui-spice-app-debuginfo: before 7.1.0-150500.49.18.1
qemu-hw-display-qxl: before 7.1.0-150500.49.18.1
qemu-accel-qtest: before 7.1.0-150500.49.18.1
qemu-hw-display-virtio-gpu: before 7.1.0-150500.49.18.1
qemu-audio-jack-debuginfo: before 7.1.0-150500.49.18.1
qemu-ui-opengl: before 7.1.0-150500.49.18.1
qemu-hw-usb-host: before 7.1.0-150500.49.18.1
qemu-block-ssh-debuginfo: before 7.1.0-150500.49.18.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20243077-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.