SUSE: 2024:4094-1 important: qemu Security Advisory Updates
Summary
## This update for qemu fixes the following issues: Security fixes: * CVE-2024-8354: Fixed assertion failure in usb_ep_get() (bsc#1230834) * CVE-2024-8612: Fixed information leak in virtio devices (bsc#1230915) Update version to 8.2.7: Security fixes: * CVE-2024-7409: Fixed denial of service via improper synchronization in QEMU NBD Server during socket closure (bsc#1229007) * CVE-2024-4693: Fixed improper release of configure vector in virtio-pci that lead to guest triggerable crash (bsc#1224132) Other fixes: * added missing fix for ppc64 emulation that caused corruption in userspace (bsc#1230140) * target/ppc: Fix lxvx/stxvx facility check (bsc#1229929) * accel/kvm: check for KVM_CAP_READONLY_MEM on VM (bsc#1231519) Full changelog here: https://lore.kernel.org/qemu- devel/d9ff276f-f1ba-4e90-8343-a7a0dc2bf305@tls.msk.ru/ ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "...
Read the Full AdvisoryReferences
* bsc#1224132
* bsc#1229007
* bsc#1229929
* bsc#1230140
* bsc#1230834
* bsc#1230915
* bsc#1231519
Cross-
* CVE-2024-4693
* CVE-2024-7409
* CVE-2024-8354
* CVE-2024-8612
CVSS scores:
* CVE-2024-4693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-7409 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-7409 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-7409 ( NVD ): 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-8354 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-8354 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-8354 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-8354 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-8612 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-8612 ( SUSE ): 3.8 CVSS:3.1/AV:L...
Read the Full Advisory