First published: Thu Sep 19 2024(Updated: )
A flaw was found in QEMU. An assertion failure was present in the usb_ep_get() function in hw/net/core.c when trying to get the USB endpoint from a USB device. This flaw may allow a malicious unprivileged guest user to crash the QEMU process on the host and cause a denial of service condition.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU KVM | ||
Red Hat Enterprise Linux | =6.0 | |
Red Hat Enterprise Linux | =7.0 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-8354 is classified with a severity level that indicates potential denial of service risks for QEMU users.
To fix CVE-2024-8354, users should update QEMU to the latest version that includes patches for this vulnerability.
CVE-2024-8354 may allow unprivileged guest users to crash the QEMU process, leading to a denial of service.
CVE-2024-8354 affects multiple versions of QEMU across various distributions, including those running on Red Hat Enterprise Linux.
CVE-2024-8354 is considered a denial of service vulnerability that could be exploited locally by unprivileged guest users.