Risk | Low |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2023-6693 CVE-2024-3447 |
CWE-ID | CWE-121 CWE-122 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
SUSE Linux Enterprise Server for SAP Applications 12 Operating systems & Components / Operating system SUSE Linux Enterprise Server 12 Operating systems & Components / Operating system SUSE Linux Enterprise High Performance Computing 12 Operating systems & Components / Operating system qemu-s390 Operating systems & Components / Operating system package or component qemu-s390-debuginfo Operating systems & Components / Operating system package or component qemu-ppc Operating systems & Components / Operating system package or component qemu-ppc-debuginfo Operating systems & Components / Operating system package or component qemu-x86 Operating systems & Components / Operating system package or component qemu-kvm Operating systems & Components / Operating system package or component qemu-vgabios Operating systems & Components / Operating system package or component qemu-sgabios Operating systems & Components / Operating system package or component qemu-seabios Operating systems & Components / Operating system package or component qemu-ipxe Operating systems & Components / Operating system package or component qemu-arm Operating systems & Components / Operating system package or component qemu-arm-debuginfo Operating systems & Components / Operating system package or component qemu-audio-sdl Operating systems & Components / Operating system package or component qemu-audio-pa-debuginfo Operating systems & Components / Operating system package or component qemu Operating systems & Components / Operating system package or component qemu-audio-pa Operating systems & Components / Operating system package or component qemu-guest-agent Operating systems & Components / Operating system package or component qemu-ui-curses-debuginfo Operating systems & Components / Operating system package or component qemu-audio-oss Operating systems & Components / Operating system package or component qemu-block-ssh Operating systems & Components / Operating system package or component qemu-ui-curses Operating systems & Components / Operating system package or component qemu-block-ssh-debuginfo Operating systems & Components / Operating system package or component qemu-audio-oss-debuginfo Operating systems & Components / Operating system package or component qemu-block-curl-debuginfo Operating systems & Components / Operating system package or component qemu-audio-alsa Operating systems & Components / Operating system package or component qemu-lang Operating systems & Components / Operating system package or component qemu-block-iscsi Operating systems & Components / Operating system package or component qemu-tools Operating systems & Components / Operating system package or component qemu-block-iscsi-debuginfo Operating systems & Components / Operating system package or component qemu-ui-gtk-debuginfo Operating systems & Components / Operating system package or component qemu-block-rbd-debuginfo Operating systems & Components / Operating system package or component qemu-audio-alsa-debuginfo Operating systems & Components / Operating system package or component qemu-block-rbd Operating systems & Components / Operating system package or component qemu-ui-gtk Operating systems & Components / Operating system package or component qemu-guest-agent-debuginfo Operating systems & Components / Operating system package or component qemu-ui-sdl-debuginfo Operating systems & Components / Operating system package or component qemu-tools-debuginfo Operating systems & Components / Operating system package or component qemu-block-curl Operating systems & Components / Operating system package or component qemu-ui-sdl Operating systems & Components / Operating system package or component qemu-audio-sdl-debuginfo Operating systems & Components / Operating system package or component qemu-debugsource Operating systems & Components / Operating system package or component |
Vendor | SUSE |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU87161
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-6693
CWE-ID:
CWE-121 - Stack-based buffer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error when flushing TX in the virtio_net_flush_tx() function if guest features
VIRTIO_NET_F_HASH_REPORT, VIRTIO_F_VERSION_1 and VIRTIO_NET_F_MRG_RXBUF
are enabled. A local user can trigger a stack based buffer overflow and execute arbitrary code on the system.
Update the affected package qemu to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
qemu-s390: before 3.1.1.1-75.1
qemu-s390-debuginfo: before 3.1.1.1-75.1
qemu-ppc: before 3.1.1.1-75.1
qemu-ppc-debuginfo: before 3.1.1.1-75.1
qemu-x86: before 3.1.1.1-75.1
qemu-kvm: before 3.1.1.1-75.1
qemu-vgabios: before 1.12.0_0_ga698c89-75.1
qemu-sgabios: before 8-75.1
qemu-seabios: before 1.12.0_0_ga698c89-75.1
qemu-ipxe: before 1.0.0+-75.1
qemu-arm: before 3.1.1.1-75.1
qemu-arm-debuginfo: before 3.1.1.1-75.1
qemu-audio-sdl: before 3.1.1.1-75.1
qemu-audio-pa-debuginfo: before 3.1.1.1-75.1
qemu: before 3.1.1.1-75.1
qemu-audio-pa: before 3.1.1.1-75.1
qemu-guest-agent: before 3.1.1.1-75.1
qemu-ui-curses-debuginfo: before 3.1.1.1-75.1
qemu-audio-oss: before 3.1.1.1-75.1
qemu-block-ssh: before 3.1.1.1-75.1
qemu-ui-curses: before 3.1.1.1-75.1
qemu-block-ssh-debuginfo: before 3.1.1.1-75.1
qemu-audio-oss-debuginfo: before 3.1.1.1-75.1
qemu-block-curl-debuginfo: before 3.1.1.1-75.1
qemu-audio-alsa: before 3.1.1.1-75.1
qemu-lang: before 3.1.1.1-75.1
qemu-block-iscsi: before 3.1.1.1-75.1
qemu-tools: before 3.1.1.1-75.1
qemu-block-iscsi-debuginfo: before 3.1.1.1-75.1
qemu-ui-gtk-debuginfo: before 3.1.1.1-75.1
qemu-block-rbd-debuginfo: before 3.1.1.1-75.1
qemu-audio-alsa-debuginfo: before 3.1.1.1-75.1
qemu-block-rbd: before 3.1.1.1-75.1
qemu-ui-gtk: before 3.1.1.1-75.1
qemu-guest-agent-debuginfo: before 3.1.1.1-75.1
qemu-ui-sdl-debuginfo: before 3.1.1.1-75.1
qemu-tools-debuginfo: before 3.1.1.1-75.1
qemu-block-curl: before 3.1.1.1-75.1
qemu-ui-sdl: before 3.1.1.1-75.1
qemu-audio-sdl-debuginfo: before 3.1.1.1-75.1
qemu-debugsource: before 3.1.1.1-75.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243229-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU89048
Risk: Low
CVSSv4.0: 4.4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-3447
CWE-ID:
CWE-122 - Heap-based Buffer Overflow
Exploit availability: No
DescriptionThe vulnerability allows a malicious guest to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error in the SDHCI device emulation. A malicious guest can set both "s->data_count" and the size of "s->fifo_buffer" to the value of "0x200" to trigger an out-of-bound memory access and perform a denial of service (DoS) attack.
Update the affected package qemu to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
qemu-s390: before 3.1.1.1-75.1
qemu-s390-debuginfo: before 3.1.1.1-75.1
qemu-ppc: before 3.1.1.1-75.1
qemu-ppc-debuginfo: before 3.1.1.1-75.1
qemu-x86: before 3.1.1.1-75.1
qemu-kvm: before 3.1.1.1-75.1
qemu-vgabios: before 1.12.0_0_ga698c89-75.1
qemu-sgabios: before 8-75.1
qemu-seabios: before 1.12.0_0_ga698c89-75.1
qemu-ipxe: before 1.0.0+-75.1
qemu-arm: before 3.1.1.1-75.1
qemu-arm-debuginfo: before 3.1.1.1-75.1
qemu-audio-sdl: before 3.1.1.1-75.1
qemu-audio-pa-debuginfo: before 3.1.1.1-75.1
qemu: before 3.1.1.1-75.1
qemu-audio-pa: before 3.1.1.1-75.1
qemu-guest-agent: before 3.1.1.1-75.1
qemu-ui-curses-debuginfo: before 3.1.1.1-75.1
qemu-audio-oss: before 3.1.1.1-75.1
qemu-block-ssh: before 3.1.1.1-75.1
qemu-ui-curses: before 3.1.1.1-75.1
qemu-block-ssh-debuginfo: before 3.1.1.1-75.1
qemu-audio-oss-debuginfo: before 3.1.1.1-75.1
qemu-block-curl-debuginfo: before 3.1.1.1-75.1
qemu-audio-alsa: before 3.1.1.1-75.1
qemu-lang: before 3.1.1.1-75.1
qemu-block-iscsi: before 3.1.1.1-75.1
qemu-tools: before 3.1.1.1-75.1
qemu-block-iscsi-debuginfo: before 3.1.1.1-75.1
qemu-ui-gtk-debuginfo: before 3.1.1.1-75.1
qemu-block-rbd-debuginfo: before 3.1.1.1-75.1
qemu-audio-alsa-debuginfo: before 3.1.1.1-75.1
qemu-block-rbd: before 3.1.1.1-75.1
qemu-ui-gtk: before 3.1.1.1-75.1
qemu-guest-agent-debuginfo: before 3.1.1.1-75.1
qemu-ui-sdl-debuginfo: before 3.1.1.1-75.1
qemu-tools-debuginfo: before 3.1.1.1-75.1
qemu-block-curl: before 3.1.1.1-75.1
qemu-ui-sdl: before 3.1.1.1-75.1
qemu-audio-sdl-debuginfo: before 3.1.1.1-75.1
qemu-debugsource: before 3.1.1.1-75.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243229-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.