Bug 1220065 (CVE-2024-26328) - VUL-0: CVE-2024-26328: qemu: invalid NumVFs value is mishandled in NVME SR/IOV implementation
Summary: VUL-0: CVE-2024-26328: qemu: invalid NumVFs value is mishandled in NVME SR/IO...
Status: IN_PROGRESS
Alias: CVE-2024-26328
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/394491/
Whiteboard: CVSSv3.1:SUSE:CVE-2024-26328:6.0:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2024-02-19 09:38 UTC by SMASH SMASH
Modified: 2024-07-08 14:21 UTC (History)
2 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description SMASH SMASH 2024-02-19 09:38:46 UTC
An issue was discovered in QEMU 7.1.0 through 8.2.1. register_vfs in hw/pci/pcie_sriov.c does not set NumVFs to PCI_SRIOV_TOTAL_VF, and thus interaction with hw/nvme/ctrl.c is mishandled.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-26328
https://www.cve.org/CVERecord?id=CVE-2024-26328
https://lore.kernel.org/all/20240213055345-mutt-send-email-mst%40kernel.org/
Comment 1 Carlos López 2024-02-19 09:40:22 UTC
I'm not too familiar with SR/IOV but this seems almost a duplicate of bsc#1220062. Affectedness is the same I'd say:
 - SUSE:SLE-15-SP5:Update/qemu
 - SUSE:ALP:Source:Standard:1.0/qemu
 - openSUSE:Factory/qemu
Comment 2 Dario Faggioli 2024-03-19 09:13:03 UTC
Ok, I think it landed upstream as 91bb64a8d2014fda33a81fcf0fce37340f0d3b0c ("hw/nvme: Use pcie_sriov_num_vfs()").

It has a "Fixes: 11871f53ef8e" tag, and 11871f53ef8e is present in QEMU >= 7.1.0 (so, for us, >= 15-SP5, as comment 1 correctly states)
Comment 4 Maintenance Automation 2024-04-03 16:30:10 UTC
SUSE-SU-2024:1103-1: An update that solves five vulnerabilities, contains two features and has one security fix can now be installed.

Category: security (important)
Bug References: 1205316, 1209554, 1218484, 1220062, 1220065, 1220134
CVE References: CVE-2023-1544, CVE-2023-6693, CVE-2024-24474, CVE-2024-26327, CVE-2024-26328
Jira References: PED-7366, PED-8113
Maintenance Incident: [SUSE:Maintenance:33006](https://smelt.suse.de/incident/33006/)
Sources used:
SUSE Package Hub 15 15-SP5 (src):
 qemu-7.1.0-150500.49.12.1
Server Applications Module 15-SP5 (src):
 qemu-7.1.0-150500.49.12.1
openSUSE Leap 15.5 (src):
 qemu-linux-user-7.1.0-150500.49.12.1, qemu-7.1.0-150500.49.12.1
SUSE Linux Enterprise Micro 5.5 (src):
 qemu-7.1.0-150500.49.12.1
Basesystem Module 15-SP5 (src):
 qemu-7.1.0-150500.49.12.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 5 OBSbugzilla Bot 2024-04-18 10:15:02 UTC
This is an autogenerated message for OBS integration:
This bug (1220065) was mentioned in
https://build.opensuse.org/request/show/1168800 Factory / qemu
Comment 12 Dario Faggioli 2024-07-08 14:21:10 UTC
All the branches listed as affected should have been taken care of...