Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2023:2162: Red Hat Security Advisory: qemu-kvm security, bug fix, and enhancement update

An update for qemu-kvm is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2022-3165: An integer underflow issue was found in the QEMU VNC server while processing ClientCutText messages in the extended format. A malicious client could use this flaw to make QEMU unresponsive by sending a specially crafted payload message, resulting in a denial of service.
  • CVE-2022-4172: An integer overflow and buffer overflow issues were found in the ACPI Error Record Serialization Table (ERST) device of QEMU in the read_erst_record() and write_erst_record() functions. Both issues may allow the guest to overrun the host buffer allocated for the ERST memory device. A malicious guest could use these flaws to crash the QEMU process on the host. Arbitrary code execution was deemed unlikely.
Red Hat Security Data
#vulnerability#ios#mac#windows#linux#red_hat#dos#intel#c++#samba#amd#bios#buffer_overflow#ibm

Synopsis

Moderate: qemu-kvm security, bug fix, and enhancement update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for qemu-kvm is now available for Red Hat Enterprise Linux 9.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM.

The following packages have been upgraded to a later upstream version: qemu-kvm (7.2.0). (BZ#2111769, BZ#2135806)

Security Fix(es):

  • QEMU: VNC: integer underflow in vnc_client_cut_text_ext leads to CPU exhaustion (CVE-2022-3165)
  • QEMU: ACPI ERST: memory corruption issues in read_erst_record and write_erst_record (CVE-2022-4172)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.2 Release Notes linked from the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux for x86_64 9 x86_64
  • Red Hat Enterprise Linux for IBM z Systems 9 s390x
  • Red Hat Enterprise Linux for Power, little endian 9 ppc64le
  • Red Hat Enterprise Linux for ARM 64 9 aarch64

Fixes

  • BZ - 1860292 - RFE: add extent_size_hint information to qemu-img info
  • BZ - 1905805 - support config interrupt in vhost-vdpa qemu
  • BZ - 1963845 - QEMU quit if set nvdimm memory backend option readonly=on
  • BZ - 1979276 - SVM: non atomic memslot updates cause boot failure with seabios and cpu-pm=on
  • BZ - 1983208 - i386/pc: Fix creation of >= 1Tb guests on AMD systems with IOMMU
  • BZ - 1983493 - Qemu should prompt fatal error and quit with an unsupported audiodev
  • BZ - 1986665 - [Fwcfg64] dump-guest-memory -w command report error “win-dump: failed to read CPU #2 ContextFrame location” on Windows desktop
  • BZ - 2074000 - Make memory preallocation threads NUMA aware
  • BZ - 2077376 - [RFE] Add support for 32-bit guest Windows dump with vmcoreinfo (fwcfg) via ‘dump-guest-memory -w’
  • BZ - 2086980 - Please Update The Error Info More Clearly When Creating Images Over RBD with The Namespace Not Existing
  • BZ - 2087155 - Guest will get stuck at “Reached target Basic System” if insert the virtio-iommu device in pcie-root-port
  • BZ - 2091166 - Q35: dmidecode doesn’t display number of cpus (>255) correctly
  • BZ - 2108531 - Windows guest reboot after migration with wsl2 installed inside
  • BZ - 2108923 - [RHEL.9.2] Display a deprecation message in '-cpu help’ for deprecated CPU models
  • BZ - 2111769 - Rebase to QEMU 7.1.0
  • BZ - 2113840 - [RHEL9.2] Memory mapping optimization for virt machine
  • BZ - 2116496 - Can’t run when memory backing with hugepages and backend type memfd
  • BZ - 2120480 - guest with tpm crashed when executing memory dump to kdump-zlib_format
  • BZ - 2121430 - Wrong max_sectors_kb and Maximum transfer length on the pass-through device [rhel-9.2.0]
  • BZ - 2122788 - virtio-net TX stall after packet bursts (probably in qemu)
  • BZ - 2123297 - Mirror job with “copy-mode":"write-blocking” that used for storage migration can’t converge under heavy I/O
  • BZ - 2124446 - Can not copy/paste from host to guest after restart spice-vdagentd.service
  • BZ - 2124856 - VM with virtio interface and iommu=on will crash when try to migrate
  • BZ - 2126095 - [rhel9.2][intel_iommu]Booting guest with "-device intel-iommu,intremap=on,device-iotlb=on,caching-mode=on" causes kernel call trace
  • BZ - 2127825 - Use capstone for qemu-kvm build
  • BZ - 2128222 - VDUSE block export should be disabled in builds for now
  • BZ - 2128235 - [s390x][RHEL9] [s390x-ccw bios] lacking document about parameter loadparm in qemu
  • BZ - 2129739 - CVE-2022-3165 QEMU: VNC: integer underflow in vnc_client_cut_text_ext leads to CPU exhaustion
  • BZ - 2131982 - Add rhel-9.2.0 arm virt machine type
  • BZ - 2135806 - Rebase to QEMU 7.2 for RHEL 9.2.0
  • BZ - 2136473 - Add rhel-9.2.0 s390x machine type
  • BZ - 2136797 - qemu crash when taking screenshot with png format
  • BZ - 2137327 - Add rhel-9.2.0 x86_64 machine type
  • BZ - 2137330 - RFE: guest agent ‘guest-get-diskstats’ api support
  • BZ - 2137332 - RFE: guest agent ‘guest-get-cpustats’ api support
  • BZ - 2138242 - zero-copy-send patches to RHEL9.2
  • BZ - 2141088 - vDPA SVQ guest announce support
  • BZ - 2141218 - qemu-kvm build fails with clang 15.0.1 due to false unused variable error
  • BZ - 2143584 - Update machine type compatibility for QEMU 7.2.0 update [aarch64]
  • BZ - 2143585 - Update machine type compatibility for QEMU 7.2.0 update [s390x]
  • BZ - 2144367 - [guest-agent]NVMe SMART support for Linux
  • BZ - 2144436 - usb device cannot be found in VM when starting VM with a usb-redir device
  • BZ - 2148352 - [QEMU-7.2][virtiofs] mount virtiofs stuck and got error ‘SELinux: (dev virtiofs, type virtiofs) getxattr errno 4’ when force quite
  • BZ - 2149022 - qemu-kvm: Missing dependencies between devices
  • BZ - 2149105 - CVE-2022-4172 QEMU: ACPI ERST: memory corruption issues in read_erst_record and write_erst_record
  • BZ - 2149191 - [RFE][guest-agent] - USB bus type support
  • BZ - 2150180 - qemu-img finishes successfully while having errors in commit or bitmaps operations
  • BZ - 2152977 - RFE: support live migrating TPM state to a target that shares storage with the source
  • BZ - 2154640 - [aarch64] qemu fails to load “efi-virtio.rom” romfile when creating virtio-net-pci
  • BZ - 2155112 - Qemu coredump after do snapshot of mirrored top image and its converted base image(iothread enabled)
  • BZ - 2155173 - [vhost-user] unable to start vhost net: 71: falling back on userspace
  • BZ - 2155748 - qemu crash on void blk_drain(BlockBackend *): Assertion qemu_in_main_thread() failed
  • BZ - 2155749 - [regression][stable guest abi][qemu-kvm7.2]Migration failed due to virtio-rng device between RHEL8.8 and RHEL9.2/MSI-X
  • BZ - 2156515 - [guest-agent] Replace '-blacklist’ with '-block-rpcs’ in qemu-ga config file
  • BZ - 2156876 - [virtual network][rhel7.9_guest] qemu-kvm: vhost vring error in virtqueue 1: Invalid argument (22)
  • BZ - 2158704 - RFE: Prefer /dev/userfaultfd over userfaultfd(2) syscall
  • BZ - 2159408 - [s390x] VMs with ISM passthrough don’t autostart after leapp upgrade from RHEL 8
  • BZ - 2162569 - [transitional device][virtio-rng-pci-transitional]Stable Guest ABI failed between RHEL 8.6 to RHEL 9.2
  • BZ - 2168209 - Qemu coredump after do snapshot of mirrored top image and its converted base image(iothread enabled)
  • BZ - 2169232 - RFE: reconnect option for stream socket back-end
  • BZ - 2169732 - Multifd migration fails under a weak network/socket ordering race
  • BZ - 2169904 - [SVVP] job ‘Check SMBIOS Table Specific Requirements’ failed on win2022
  • BZ - 2173590 - bugs in emulation of BMI instructions (for libguestfs without KVM)

References

  • https://access.redhat.com/security/updates/classification/#moderate
  • https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.2_release_notes/index

Red Hat Enterprise Linux for x86_64 9

SRPM

qemu-kvm-7.2.0-14.el9_2.src.rpm

SHA-256: 2fd79d846b0b3faa4ca880bf55dd94dc7622b0376d01b12e24b19b524772f747

x86_64

qemu-guest-agent-7.2.0-14.el9_2.x86_64.rpm

SHA-256: 9ad7deb668e707eac5bffd8bdffd4490eeb0557b2e65e27313b67b84cee2a0b2

qemu-guest-agent-debuginfo-7.2.0-14.el9_2.x86_64.rpm

SHA-256: 2055f37ec38d395b576f990e511f7979d78e86a9b76548650ff89f5cef48b992

qemu-img-7.2.0-14.el9_2.x86_64.rpm

SHA-256: 837c41c50f8cd54d1a2f1a92907eee45087f3b4874f9a60a115ac0a7ecb67253

qemu-img-debuginfo-7.2.0-14.el9_2.x86_64.rpm

SHA-256: a14a8b885122c531d7f1bbb1904f98c079d583f40c8f6686d749e80e6fa35fdd

qemu-kvm-7.2.0-14.el9_2.x86_64.rpm

SHA-256: 9247b589e74b44b01f352f6538628cdeb28625d9b971f1ecf6334459e6f614c6

qemu-kvm-audio-pa-7.2.0-14.el9_2.x86_64.rpm

SHA-256: d8d7ff9e9d1db8ef83325421d2a605f3db27e58dec7ebb0d0f0d804ce00b6c43

qemu-kvm-audio-pa-debuginfo-7.2.0-14.el9_2.x86_64.rpm

SHA-256: 389a1dc6212287921df0ec4dbc894cc164c6ddf858ee40f54af784f6f5b28d37

qemu-kvm-block-curl-7.2.0-14.el9_2.x86_64.rpm

SHA-256: 3ad7a36128887f1732d7106fe180a740a0ea6d247fc23f1c034e8012af3c83c1

qemu-kvm-block-curl-debuginfo-7.2.0-14.el9_2.x86_64.rpm

SHA-256: d354ac411035f5b29777f1529a612493185d5a6a3980e4ea3d28e3c72a384f15

qemu-kvm-block-rbd-7.2.0-14.el9_2.x86_64.rpm

SHA-256: 718a1bd6cb39f266a79401f9bdb988b70bf6ebc3c23e7b54b42e531d36ad6656

qemu-kvm-block-rbd-debuginfo-7.2.0-14.el9_2.x86_64.rpm

SHA-256: 64fa54fa4ef8756c4733c7703e577e75f3b8e4bf74c3fd98081e29071910907f

qemu-kvm-common-7.2.0-14.el9_2.x86_64.rpm

SHA-256: bf21625896de3971825796c00bc6822a96748d5fa432beb5900b3d418b9bff8f

qemu-kvm-common-debuginfo-7.2.0-14.el9_2.x86_64.rpm

SHA-256: d06c4197bfa5b70f21b2e7595171c657479c7d471062ed97593dd888ff019f40

qemu-kvm-core-7.2.0-14.el9_2.x86_64.rpm

SHA-256: 5dd2a26e89a09de4dd66f5c5ced9f5f5db90dde50a46d47888c022132b23e308

qemu-kvm-core-debuginfo-7.2.0-14.el9_2.x86_64.rpm

SHA-256: 8f6ef5bf1e2083e3d6a2c2e61a1c4c0e7cc02a29550b0d6548fe8c41b2aed538

qemu-kvm-debuginfo-7.2.0-14.el9_2.x86_64.rpm

SHA-256: bfbd4b3d8506eff5e1cebbdab00a2f8d9551cfd82c314e683d19b50386acde5f

qemu-kvm-debugsource-7.2.0-14.el9_2.x86_64.rpm

SHA-256: ba4d06efd3e28347cca0cd9f9facb9199e059c37bc710b44e45a7930472b0af7

qemu-kvm-device-display-virtio-gpu-7.2.0-14.el9_2.x86_64.rpm

SHA-256: cda1b7e11032d5b81215991ea8ef017cb2ac452a9e8ed411f11db633c1189dc5

qemu-kvm-device-display-virtio-gpu-debuginfo-7.2.0-14.el9_2.x86_64.rpm

SHA-256: 4868e19c342ccbe7b48123afe7342b12c984f085e7d963318d17f78a8a288173

qemu-kvm-device-display-virtio-gpu-pci-7.2.0-14.el9_2.x86_64.rpm

SHA-256: 5111777a9f5bec218fa2b16b9fdb9120c843c071234cf58e34d34233da69713b

qemu-kvm-device-display-virtio-gpu-pci-debuginfo-7.2.0-14.el9_2.x86_64.rpm

SHA-256: 171668dbb3ce47a561524c251aa6e93b7eee51da6aaaa3e953ed184791e95c48

qemu-kvm-device-display-virtio-vga-7.2.0-14.el9_2.x86_64.rpm

SHA-256: 3aa7492eb9adb484fedb9b5b491a3b74799cc733bb5f2b2c457ba5f9ca146f0b

qemu-kvm-device-display-virtio-vga-debuginfo-7.2.0-14.el9_2.x86_64.rpm

SHA-256: 586ba97bf13ae5f1d82bf6ffb2bd34ce455b356e123acbd3d5ed4eb06e148463

qemu-kvm-device-usb-host-7.2.0-14.el9_2.x86_64.rpm

SHA-256: eb1df797cae80d2ae2d7c527997be74ca059116fcd1aaf27f9c3e2d9b985c9ff

qemu-kvm-device-usb-host-debuginfo-7.2.0-14.el9_2.x86_64.rpm

SHA-256: 9a0cdcf3218782cd8728bd1a22db19fc28ae13e9908bebcd3dccff56fb6bb5fe

qemu-kvm-device-usb-redirect-7.2.0-14.el9_2.x86_64.rpm

SHA-256: 5643c7dd9314831161d4eb79637b1fc18b6b8697897e3651b99d0aa24fbb8094

qemu-kvm-device-usb-redirect-debuginfo-7.2.0-14.el9_2.x86_64.rpm

SHA-256: f42dddc8d738f110fd4f9586c16388f3782815dc34a83fb2c0f25f3f18db04fa

qemu-kvm-docs-7.2.0-14.el9_2.x86_64.rpm

SHA-256: 81e577973dc34c4350134d117085f48cf042da7abd98d462ae84514d3caa17eb

qemu-kvm-tests-debuginfo-7.2.0-14.el9_2.x86_64.rpm

SHA-256: 397922019663cc467e0cdaa474272755e5169d0fe6173920bfeba7ca4624444a

qemu-kvm-tools-7.2.0-14.el9_2.x86_64.rpm

SHA-256: 5ecf0d46514577ab40e1c007a8c9332aa227d4378b71aaf9bad4aa116e7ce618

qemu-kvm-tools-debuginfo-7.2.0-14.el9_2.x86_64.rpm

SHA-256: 640b99afa060405962ee23319af5db034dc307d48c6834c3d3039f39f6ee1f64

qemu-kvm-ui-egl-headless-7.2.0-14.el9_2.x86_64.rpm

SHA-256: 1b71d2d41376d8bfa516035f71f9b626843d8958cd06dc60f9259313ead44203

qemu-kvm-ui-egl-headless-debuginfo-7.2.0-14.el9_2.x86_64.rpm

SHA-256: 6327840e9dfb2ced2f1014801835913eebe8f87a3ed60cf3ba71763bc7451745

qemu-kvm-ui-opengl-7.2.0-14.el9_2.x86_64.rpm

SHA-256: 6203836611b80567b4664c2038bd88bf8e4305566e338f4c79382cc3e191f3c6

qemu-kvm-ui-opengl-debuginfo-7.2.0-14.el9_2.x86_64.rpm

SHA-256: abce56db90417178eca91e8aed7e36dfe55a29d25eb2db50fcb4f84d0f61e91a

qemu-pr-helper-7.2.0-14.el9_2.x86_64.rpm

SHA-256: 4a8db00686efd7d5218a6e310e0adea7e777fe2fb3179ede65b4b843b58216cd

qemu-pr-helper-debuginfo-7.2.0-14.el9_2.x86_64.rpm

SHA-256: b1b2811e85729f9aaf2ec064e303057db9292b3af16d242cc545827c8120dede

Red Hat Enterprise Linux for IBM z Systems 9

SRPM

qemu-kvm-7.2.0-14.el9_2.src.rpm

SHA-256: 2fd79d846b0b3faa4ca880bf55dd94dc7622b0376d01b12e24b19b524772f747

s390x

qemu-guest-agent-7.2.0-14.el9_2.s390x.rpm

SHA-256: e26ffb95484a54bdc656f92116ffef19c83c98908629f0eb7417c299c6fe4f79

qemu-guest-agent-debuginfo-7.2.0-14.el9_2.s390x.rpm

SHA-256: 3fd8bcea1b44839dec07288628ebfb55f00d63ac6a20bc043e1b361f6f2c5d26

qemu-img-7.2.0-14.el9_2.s390x.rpm

SHA-256: e2483a430cb74754aeb29ced82c64ae556674356be6d333e4bc6013b88f5282d

qemu-img-debuginfo-7.2.0-14.el9_2.s390x.rpm

SHA-256: 8e3ebdce563766d8fe50ffe62f55f1c617893e7b045d357d6662f62056aea93a

qemu-kvm-7.2.0-14.el9_2.s390x.rpm

SHA-256: c223c8b0b21823c2f4eef6308dbd2ffeed7bf1450396ee0fb5298947c3b37cc1

qemu-kvm-audio-pa-7.2.0-14.el9_2.s390x.rpm

SHA-256: 091c61d18dc346661eda056ceb1acb48f30eb07b3451c44a71a093602c87779c

qemu-kvm-audio-pa-debuginfo-7.2.0-14.el9_2.s390x.rpm

SHA-256: 72ef6b10b996b245ac2be14bdaa8c6ab900e353b71aa1dec48680b5d3c9d2a29

qemu-kvm-block-curl-7.2.0-14.el9_2.s390x.rpm

SHA-256: c1710bc6370f399d4bbba083a72d05e438b69d86233fcd4e1358040b550115bf

qemu-kvm-block-curl-debuginfo-7.2.0-14.el9_2.s390x.rpm

SHA-256: 1b8c55d72a947a1a6c78bf8e74a9e408674c79c63df39d632295d90536023e83

qemu-kvm-block-rbd-7.2.0-14.el9_2.s390x.rpm

SHA-256: 43e6693a9006089123ff323f733887705b0dc8cff28ae33ec92611567c37594c

qemu-kvm-block-rbd-debuginfo-7.2.0-14.el9_2.s390x.rpm

SHA-256: 4aefbb17f38c59109225842940be296dbc753120063bb921986499bee324e186

qemu-kvm-common-7.2.0-14.el9_2.s390x.rpm

SHA-256: 1cb0439313e48bdcc0eb4ba7d2d2bb92643676dd65ab05db914bc0a37afcd2de

qemu-kvm-common-debuginfo-7.2.0-14.el9_2.s390x.rpm

SHA-256: e5a903c9e51f4d82086655df8e587fdfbc810cd1255de53baa00fd3815f31462

qemu-kvm-core-7.2.0-14.el9_2.s390x.rpm

SHA-256: 861a7dd52d0387b44765ef139771d8f753c555d7b93a1928053e1cd3c375f80a

qemu-kvm-core-debuginfo-7.2.0-14.el9_2.s390x.rpm

SHA-256: 0342837b3d71e3e4eec5079dfa7001941ef93a0f1a5a2dcaa6ac04416a77a753

qemu-kvm-debuginfo-7.2.0-14.el9_2.s390x.rpm

SHA-256: a72d155c4c778a2940f9234620a366faf498f55a9f2c9f81cbdb55fa67856027

qemu-kvm-debugsource-7.2.0-14.el9_2.s390x.rpm

SHA-256: 91da4a2f78e74b4d7b1ede57bc18d57256fddd6920079648cd54cffc7133a01d

qemu-kvm-device-display-virtio-gpu-7.2.0-14.el9_2.s390x.rpm

SHA-256: a739d45038960809f0750645f4285b66a7edb87c04865fd5ac1d845a662ab630

qemu-kvm-device-display-virtio-gpu-ccw-7.2.0-14.el9_2.s390x.rpm

SHA-256: 4fc8015b5b7433188280c7b2c0d5fcee67931aebd1d37f701812d03c513554bb

qemu-kvm-device-display-virtio-gpu-ccw-debuginfo-7.2.0-14.el9_2.s390x.rpm

SHA-256: 08b8b3f158cee13bea14e0ff1d05bd2de4d7de5895541065616d41106d3e071c

qemu-kvm-device-display-virtio-gpu-debuginfo-7.2.0-14.el9_2.s390x.rpm

SHA-256: 25bb33d016b4e9326d4e4b6d171ab0d400c1fcdbba2004e7811ddaa7f6ca9304

qemu-kvm-device-usb-host-7.2.0-14.el9_2.s390x.rpm

SHA-256: db1b3a3619b41161be251087e02e1886ea4bbe2f08cd2bde5ed894c579d75107

qemu-kvm-device-usb-host-debuginfo-7.2.0-14.el9_2.s390x.rpm

SHA-256: cf15e599b5e976648f48ecfabd15ee574e236bfb473b4d80458827ea6d2935c0

qemu-kvm-docs-7.2.0-14.el9_2.s390x.rpm

SHA-256: e89f80049c90fa7dd67f4f906ac7d2a746e99853568b680fbd62d43f5e38d138

qemu-kvm-tests-debuginfo-7.2.0-14.el9_2.s390x.rpm

SHA-256: 3097dea4cbd14667bf2c22fe02a67afef21d9e8c36e193d62a3128c9271fe2ac

qemu-kvm-tools-7.2.0-14.el9_2.s390x.rpm

SHA-256: 0444516719d6906e9a14df3a183c41238036c1e6bc3c447afb843bb5ee856c89

qemu-kvm-tools-debuginfo-7.2.0-14.el9_2.s390x.rpm

SHA-256: 3865c9e84eefdc4157dad72deabe4094e9bbcbbad796cec1211e2ba922b6510d

qemu-pr-helper-7.2.0-14.el9_2.s390x.rpm

SHA-256: b0b81c1e469c2196de50d8809e5f57bcaea242afc563bac70d4e0be9ba92f513

qemu-pr-helper-debuginfo-7.2.0-14.el9_2.s390x.rpm

SHA-256: f35497fe3a2d05f00527deda222a6175540309c54aada33e65cfdb2bfbea713d

Red Hat Enterprise Linux for Power, little endian 9

SRPM

qemu-kvm-7.2.0-14.el9_2.src.rpm

SHA-256: 2fd79d846b0b3faa4ca880bf55dd94dc7622b0376d01b12e24b19b524772f747

ppc64le

qemu-guest-agent-7.2.0-14.el9_2.ppc64le.rpm

SHA-256: 909da3be68a2ad538f49d4cadaf88cacd8d72e32dd9222fed8d25e546dba9297

qemu-guest-agent-debuginfo-7.2.0-14.el9_2.ppc64le.rpm

SHA-256: af0ce11b9c9673c7554b47940fad05bb4dbceb97330306a05810c171079efd52

qemu-img-7.2.0-14.el9_2.ppc64le.rpm

SHA-256: 06d4109d6fcbf00d24ff310ef171eb224182b1ade4675f33200c824beebe8f08

qemu-img-debuginfo-7.2.0-14.el9_2.ppc64le.rpm

SHA-256: fb60b1a279ccd01c04fc8021517092dd67b057d45adb49f3fcebf0403055acd4

qemu-kvm-debuginfo-7.2.0-14.el9_2.ppc64le.rpm

SHA-256: 193fa2e07b3a2a0fd65cf41b41175764008afed82544cf957e5b984014dfbb3a

qemu-kvm-debugsource-7.2.0-14.el9_2.ppc64le.rpm

SHA-256: 0b3e0de6d5315cae1e9bccf72ab11b17dbb1c9b0b8b9d58c8ed72ae166238754

Red Hat Enterprise Linux for ARM 64 9

SRPM

qemu-kvm-7.2.0-14.el9_2.src.rpm

SHA-256: 2fd79d846b0b3faa4ca880bf55dd94dc7622b0376d01b12e24b19b524772f747

aarch64

qemu-guest-agent-7.2.0-14.el9_2.aarch64.rpm

SHA-256: 9402d44b8b6b25b02890841594957c613b2203722852679d4f6c3167cc4353ad

qemu-guest-agent-debuginfo-7.2.0-14.el9_2.aarch64.rpm

SHA-256: b26b8decef7fd3df075a8de1b89d600a801d04641f3dffe62e766322a8841935

qemu-img-7.2.0-14.el9_2.aarch64.rpm

SHA-256: e2cc29a89d318a693bc11b33f369606bad441d8cd6d7f195765bd2ad99202961

qemu-img-debuginfo-7.2.0-14.el9_2.aarch64.rpm

SHA-256: 2679575862bc585a36a6603c5dd821eaac17b100f71f92170d1d39a5b4d0fb9b

qemu-kvm-7.2.0-14.el9_2.aarch64.rpm

SHA-256: fec869ea0c41dbd80de95504e036b5d57336746a56b1d0d3457d91d89979be80

qemu-kvm-audio-pa-7.2.0-14.el9_2.aarch64.rpm

SHA-256: 0c71d7f181d3cb8a4afe1b62c03b3d42550e4ccc97d96fb9c519606a95955abe

qemu-kvm-audio-pa-debuginfo-7.2.0-14.el9_2.aarch64.rpm

SHA-256: 984d73acee040f8e60eb9efed04aa8e991bd83441598cd40c14b63b15dfd0466

qemu-kvm-block-curl-7.2.0-14.el9_2.aarch64.rpm

SHA-256: de5c12a4c910850e447d61585e0caee981c2d44c9b54b24a2bae446430bd729c

qemu-kvm-block-curl-debuginfo-7.2.0-14.el9_2.aarch64.rpm

SHA-256: ec34e66ba558498b39311eafb8959f522ed722dca878c3e38ea1eaaa3f871249

qemu-kvm-block-rbd-7.2.0-14.el9_2.aarch64.rpm

SHA-256: 34c0a4d01162256979fa122bc7a7dbe5bb9046c8a558bab9941b19cc3880e416

qemu-kvm-block-rbd-debuginfo-7.2.0-14.el9_2.aarch64.rpm

SHA-256: 0e6acb2fff2018638246b441dddf9f6b5d6fb241124d9174de9d420665a015a8

qemu-kvm-common-7.2.0-14.el9_2.aarch64.rpm

SHA-256: 9f87a47eab797ccbc1851baebf63fdef864e1570e27db2618ecaa9c95b010bf1

qemu-kvm-common-debuginfo-7.2.0-14.el9_2.aarch64.rpm

SHA-256: 8e1c5c3c030d623cadffb6a5126f3d2447957de7dd35031c3d17f30c93a897a5

qemu-kvm-core-7.2.0-14.el9_2.aarch64.rpm

SHA-256: d43bbdaf4958fa4073cc3f68f99ceae86a8c4f998f88f59e3559d95369dad78c

qemu-kvm-core-debuginfo-7.2.0-14.el9_2.aarch64.rpm

SHA-256: 2b58759ceedab83709660c832c321d05b2a750cb7188f0b897c039e8ae6e1852

qemu-kvm-debuginfo-7.2.0-14.el9_2.aarch64.rpm

SHA-256: a54e37d5f47412c9ff6394bad8e2fde83aa07a9ac1f12f492d830cb64823036d

qemu-kvm-debugsource-7.2.0-14.el9_2.aarch64.rpm

SHA-256: e1f8939fd82b509d12ad0cbcad5a58bccaefe097467a60986ba861cc692d6adc

qemu-kvm-device-display-virtio-gpu-7.2.0-14.el9_2.aarch64.rpm

SHA-256: c81888df61cadaace83c971808cf4d9b5c979dcc846281f2b1756e4baf862f3f

qemu-kvm-device-display-virtio-gpu-debuginfo-7.2.0-14.el9_2.aarch64.rpm

SHA-256: e8363d3fd4f0e41022af69c2c25ad05b61463f4fabe19c7a219e322cb594f7fb

qemu-kvm-device-display-virtio-gpu-pci-7.2.0-14.el9_2.aarch64.rpm

SHA-256: c4f1cb30d44e8f2dcd13aea98aceb4b33d11e308e67f08251a5842825f3070f6

qemu-kvm-device-display-virtio-gpu-pci-debuginfo-7.2.0-14.el9_2.aarch64.rpm

SHA-256: b0d788c06a88250cbc84dc040e2ca3624da43133842ad57b19a08872c08b1572

qemu-kvm-device-usb-host-7.2.0-14.el9_2.aarch64.rpm

SHA-256: 43d749e084d8d5d3493c49bf993e09e48957f1e7243fd8bfd8ea875cfa483669

qemu-kvm-device-usb-host-debuginfo-7.2.0-14.el9_2.aarch64.rpm

SHA-256: 86ba46ccfdbc71170064966bfa5bb5eecccf97f70379a3024a59e5cff266ce6e

qemu-kvm-docs-7.2.0-14.el9_2.aarch64.rpm

SHA-256: 4f661a98d9ef9d0aba0aefad5ea88cc3df82935da2251c7582f8665ea1569bd3

qemu-kvm-tests-debuginfo-7.2.0-14.el9_2.aarch64.rpm

SHA-256: dd2dd5bb923365ca93e5fdbeb92723776dbe2af66db1b517233b2f4a3679d8ef

qemu-kvm-tools-7.2.0-14.el9_2.aarch64.rpm

SHA-256: 026846fbcaff86ed0fa98fa96851cfd021b48472bd96602f2280fb9c2f48b277

qemu-kvm-tools-debuginfo-7.2.0-14.el9_2.aarch64.rpm

SHA-256: 0e43c44e1e17bb4c2497e1a8bfe522d65f2ba834271199330a08c3bea6f6517a

qemu-pr-helper-7.2.0-14.el9_2.aarch64.rpm

SHA-256: 7453307f89536379eb217846a36f7dd7367ddbaf4bffa906bbea4c38a18eadb5

qemu-pr-helper-debuginfo-7.2.0-14.el9_2.aarch64.rpm

SHA-256: 0438dc2c471f156083b77659063dc6ed7a9cef40fd7dd7586d9d2f0b550d6e1b

Related news

Gentoo Linux Security Advisory 202408-18

Gentoo Linux Security Advisory 202408-18 - Multiple vulnerabilities have been discovered in QEMU, the worst of which could lead to a denial of service. Versions greater than or equal to 8.0.0 are affected.

Ubuntu Security Notice USN-6167-1

Ubuntu Security Notice 6167-1 - It was discovered that QEMU did not properly manage the guest drivers when shared buffers are not allocated. A malicious guest driver could use this issue to cause QEMU to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 20.04 LTS, Ubuntu 22.04 LTS and Ubuntu 22.10. It was discovered that QEMU did not properly check the size of the structure pointed to by the guest physical address pqxl. A malicious guest attacker could use this issue to cause QEMU to crash, resulting in a denial of service. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS and Ubuntu 22.10.

RHSA-2023:2757: Red Hat Security Advisory: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update

An update for the virt:rhel and virt-devel:rhel modules is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46790: A vulnerability was found in NTFS-3G, specifically in the ntfsck utility. Incorrect validation of NTFS metadata can result in a heap-based buffer overflow when processing a crafted NTFS image file or partition. * CVE-2022-3165: An integer underflow issue was found in the QEMU VNC server while processing ClientCut...

Ubuntu Security Notice USN-5772-1

Ubuntu Security Notice 5772-1 - It was discovered that QEMU incorrectly handled bulk transfers from SPICE clients. A remote attacker could use this issue to cause QEMU to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 14.04 ESM and Ubuntu 16.04 ESM. It was discovered that QEMU did not properly manage memory when it transfers the USB packets. A malicious guest attacker could use this issue to cause QEMU to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS.

CVE-2022-4172: hw/acpi/erst.c: Fix memory handling issues (defb7098) · Commits · QEMU / QEMU · GitLab

An integer overflow and buffer overflow issues were found in the ACPI Error Record Serialization Table (ERST) device of QEMU in the read_erst_record() and write_erst_record() functions. Both issues may allow the guest to overrun the host buffer allocated for the ERST memory device. A malicious guest could use these flaws to crash the QEMU process on the host.

CVE-2022-3165: ui/vnc-clipboard: fix integer underflow in vnc_client_cut_text_ext (d307040b) · Commits · QEMU / QEMU · GitLab

An integer underflow issue was found in the QEMU VNC server while processing ClientCutText messages in the extended format. A malicious client could use this flaw to make QEMU unresponsive by sending a specially crafted payload message, resulting in a denial of service.