Headline
RHSA-2023:2162: Red Hat Security Advisory: qemu-kvm security, bug fix, and enhancement update
An update for qemu-kvm is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2022-3165: An integer underflow issue was found in the QEMU VNC server while processing ClientCutText messages in the extended format. A malicious client could use this flaw to make QEMU unresponsive by sending a specially crafted payload message, resulting in a denial of service.
- CVE-2022-4172: An integer overflow and buffer overflow issues were found in the ACPI Error Record Serialization Table (ERST) device of QEMU in the read_erst_record() and write_erst_record() functions. Both issues may allow the guest to overrun the host buffer allocated for the ERST memory device. A malicious guest could use these flaws to crash the QEMU process on the host. Arbitrary code execution was deemed unlikely.
Synopsis
Moderate: qemu-kvm security, bug fix, and enhancement update
Type/Severity
Security Advisory: Moderate
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
An update for qemu-kvm is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM.
The following packages have been upgraded to a later upstream version: qemu-kvm (7.2.0). (BZ#2111769, BZ#2135806)
Security Fix(es):
- QEMU: VNC: integer underflow in vnc_client_cut_text_ext leads to CPU exhaustion (CVE-2022-3165)
- QEMU: ACPI ERST: memory corruption issues in read_erst_record and write_erst_record (CVE-2022-4172)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.2 Release Notes linked from the References section.
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.
Affected Products
- Red Hat Enterprise Linux for x86_64 9 x86_64
- Red Hat Enterprise Linux for IBM z Systems 9 s390x
- Red Hat Enterprise Linux for Power, little endian 9 ppc64le
- Red Hat Enterprise Linux for ARM 64 9 aarch64
Fixes
- BZ - 1860292 - RFE: add extent_size_hint information to qemu-img info
- BZ - 1905805 - support config interrupt in vhost-vdpa qemu
- BZ - 1963845 - QEMU quit if set nvdimm memory backend option readonly=on
- BZ - 1979276 - SVM: non atomic memslot updates cause boot failure with seabios and cpu-pm=on
- BZ - 1983208 - i386/pc: Fix creation of >= 1Tb guests on AMD systems with IOMMU
- BZ - 1983493 - Qemu should prompt fatal error and quit with an unsupported audiodev
- BZ - 1986665 - [Fwcfg64] dump-guest-memory -w command report error “win-dump: failed to read CPU #2 ContextFrame location” on Windows desktop
- BZ - 2074000 - Make memory preallocation threads NUMA aware
- BZ - 2077376 - [RFE] Add support for 32-bit guest Windows dump with vmcoreinfo (fwcfg) via ‘dump-guest-memory -w’
- BZ - 2086980 - Please Update The Error Info More Clearly When Creating Images Over RBD with The Namespace Not Existing
- BZ - 2087155 - Guest will get stuck at “Reached target Basic System” if insert the virtio-iommu device in pcie-root-port
- BZ - 2091166 - Q35: dmidecode doesn’t display number of cpus (>255) correctly
- BZ - 2108531 - Windows guest reboot after migration with wsl2 installed inside
- BZ - 2108923 - [RHEL.9.2] Display a deprecation message in '-cpu help’ for deprecated CPU models
- BZ - 2111769 - Rebase to QEMU 7.1.0
- BZ - 2113840 - [RHEL9.2] Memory mapping optimization for virt machine
- BZ - 2116496 - Can’t run when memory backing with hugepages and backend type memfd
- BZ - 2120480 - guest with tpm crashed when executing memory dump to kdump-zlib_format
- BZ - 2121430 - Wrong max_sectors_kb and Maximum transfer length on the pass-through device [rhel-9.2.0]
- BZ - 2122788 - virtio-net TX stall after packet bursts (probably in qemu)
- BZ - 2123297 - Mirror job with “copy-mode":"write-blocking” that used for storage migration can’t converge under heavy I/O
- BZ - 2124446 - Can not copy/paste from host to guest after restart spice-vdagentd.service
- BZ - 2124856 - VM with virtio interface and iommu=on will crash when try to migrate
- BZ - 2126095 - [rhel9.2][intel_iommu]Booting guest with "-device intel-iommu,intremap=on,device-iotlb=on,caching-mode=on" causes kernel call trace
- BZ - 2127825 - Use capstone for qemu-kvm build
- BZ - 2128222 - VDUSE block export should be disabled in builds for now
- BZ - 2128235 - [s390x][RHEL9] [s390x-ccw bios] lacking document about parameter loadparm in qemu
- BZ - 2129739 - CVE-2022-3165 QEMU: VNC: integer underflow in vnc_client_cut_text_ext leads to CPU exhaustion
- BZ - 2131982 - Add rhel-9.2.0 arm virt machine type
- BZ - 2135806 - Rebase to QEMU 7.2 for RHEL 9.2.0
- BZ - 2136473 - Add rhel-9.2.0 s390x machine type
- BZ - 2136797 - qemu crash when taking screenshot with png format
- BZ - 2137327 - Add rhel-9.2.0 x86_64 machine type
- BZ - 2137330 - RFE: guest agent ‘guest-get-diskstats’ api support
- BZ - 2137332 - RFE: guest agent ‘guest-get-cpustats’ api support
- BZ - 2138242 - zero-copy-send patches to RHEL9.2
- BZ - 2141088 - vDPA SVQ guest announce support
- BZ - 2141218 - qemu-kvm build fails with clang 15.0.1 due to false unused variable error
- BZ - 2143584 - Update machine type compatibility for QEMU 7.2.0 update [aarch64]
- BZ - 2143585 - Update machine type compatibility for QEMU 7.2.0 update [s390x]
- BZ - 2144367 - [guest-agent]NVMe SMART support for Linux
- BZ - 2144436 - usb device cannot be found in VM when starting VM with a usb-redir device
- BZ - 2148352 - [QEMU-7.2][virtiofs] mount virtiofs stuck and got error ‘SELinux: (dev virtiofs, type virtiofs) getxattr errno 4’ when force quite
- BZ - 2149022 - qemu-kvm: Missing dependencies between devices
- BZ - 2149105 - CVE-2022-4172 QEMU: ACPI ERST: memory corruption issues in read_erst_record and write_erst_record
- BZ - 2149191 - [RFE][guest-agent] - USB bus type support
- BZ - 2150180 - qemu-img finishes successfully while having errors in commit or bitmaps operations
- BZ - 2152977 - RFE: support live migrating TPM state to a target that shares storage with the source
- BZ - 2154640 - [aarch64] qemu fails to load “efi-virtio.rom” romfile when creating virtio-net-pci
- BZ - 2155112 - Qemu coredump after do snapshot of mirrored top image and its converted base image(iothread enabled)
- BZ - 2155173 - [vhost-user] unable to start vhost net: 71: falling back on userspace
- BZ - 2155748 - qemu crash on void blk_drain(BlockBackend *): Assertion qemu_in_main_thread() failed
- BZ - 2155749 - [regression][stable guest abi][qemu-kvm7.2]Migration failed due to virtio-rng device between RHEL8.8 and RHEL9.2/MSI-X
- BZ - 2156515 - [guest-agent] Replace '-blacklist’ with '-block-rpcs’ in qemu-ga config file
- BZ - 2156876 - [virtual network][rhel7.9_guest] qemu-kvm: vhost vring error in virtqueue 1: Invalid argument (22)
- BZ - 2158704 - RFE: Prefer /dev/userfaultfd over userfaultfd(2) syscall
- BZ - 2159408 - [s390x] VMs with ISM passthrough don’t autostart after leapp upgrade from RHEL 8
- BZ - 2162569 - [transitional device][virtio-rng-pci-transitional]Stable Guest ABI failed between RHEL 8.6 to RHEL 9.2
- BZ - 2168209 - Qemu coredump after do snapshot of mirrored top image and its converted base image(iothread enabled)
- BZ - 2169232 - RFE: reconnect option for stream socket back-end
- BZ - 2169732 - Multifd migration fails under a weak network/socket ordering race
- BZ - 2169904 - [SVVP] job ‘Check SMBIOS Table Specific Requirements’ failed on win2022
- BZ - 2173590 - bugs in emulation of BMI instructions (for libguestfs without KVM)
References
- https://access.redhat.com/security/updates/classification/#moderate
- https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.2_release_notes/index
Red Hat Enterprise Linux for x86_64 9
SRPM
qemu-kvm-7.2.0-14.el9_2.src.rpm
SHA-256: 2fd79d846b0b3faa4ca880bf55dd94dc7622b0376d01b12e24b19b524772f747
x86_64
qemu-guest-agent-7.2.0-14.el9_2.x86_64.rpm
SHA-256: 9ad7deb668e707eac5bffd8bdffd4490eeb0557b2e65e27313b67b84cee2a0b2
qemu-guest-agent-debuginfo-7.2.0-14.el9_2.x86_64.rpm
SHA-256: 2055f37ec38d395b576f990e511f7979d78e86a9b76548650ff89f5cef48b992
qemu-img-7.2.0-14.el9_2.x86_64.rpm
SHA-256: 837c41c50f8cd54d1a2f1a92907eee45087f3b4874f9a60a115ac0a7ecb67253
qemu-img-debuginfo-7.2.0-14.el9_2.x86_64.rpm
SHA-256: a14a8b885122c531d7f1bbb1904f98c079d583f40c8f6686d749e80e6fa35fdd
qemu-kvm-7.2.0-14.el9_2.x86_64.rpm
SHA-256: 9247b589e74b44b01f352f6538628cdeb28625d9b971f1ecf6334459e6f614c6
qemu-kvm-audio-pa-7.2.0-14.el9_2.x86_64.rpm
SHA-256: d8d7ff9e9d1db8ef83325421d2a605f3db27e58dec7ebb0d0f0d804ce00b6c43
qemu-kvm-audio-pa-debuginfo-7.2.0-14.el9_2.x86_64.rpm
SHA-256: 389a1dc6212287921df0ec4dbc894cc164c6ddf858ee40f54af784f6f5b28d37
qemu-kvm-block-curl-7.2.0-14.el9_2.x86_64.rpm
SHA-256: 3ad7a36128887f1732d7106fe180a740a0ea6d247fc23f1c034e8012af3c83c1
qemu-kvm-block-curl-debuginfo-7.2.0-14.el9_2.x86_64.rpm
SHA-256: d354ac411035f5b29777f1529a612493185d5a6a3980e4ea3d28e3c72a384f15
qemu-kvm-block-rbd-7.2.0-14.el9_2.x86_64.rpm
SHA-256: 718a1bd6cb39f266a79401f9bdb988b70bf6ebc3c23e7b54b42e531d36ad6656
qemu-kvm-block-rbd-debuginfo-7.2.0-14.el9_2.x86_64.rpm
SHA-256: 64fa54fa4ef8756c4733c7703e577e75f3b8e4bf74c3fd98081e29071910907f
qemu-kvm-common-7.2.0-14.el9_2.x86_64.rpm
SHA-256: bf21625896de3971825796c00bc6822a96748d5fa432beb5900b3d418b9bff8f
qemu-kvm-common-debuginfo-7.2.0-14.el9_2.x86_64.rpm
SHA-256: d06c4197bfa5b70f21b2e7595171c657479c7d471062ed97593dd888ff019f40
qemu-kvm-core-7.2.0-14.el9_2.x86_64.rpm
SHA-256: 5dd2a26e89a09de4dd66f5c5ced9f5f5db90dde50a46d47888c022132b23e308
qemu-kvm-core-debuginfo-7.2.0-14.el9_2.x86_64.rpm
SHA-256: 8f6ef5bf1e2083e3d6a2c2e61a1c4c0e7cc02a29550b0d6548fe8c41b2aed538
qemu-kvm-debuginfo-7.2.0-14.el9_2.x86_64.rpm
SHA-256: bfbd4b3d8506eff5e1cebbdab00a2f8d9551cfd82c314e683d19b50386acde5f
qemu-kvm-debugsource-7.2.0-14.el9_2.x86_64.rpm
SHA-256: ba4d06efd3e28347cca0cd9f9facb9199e059c37bc710b44e45a7930472b0af7
qemu-kvm-device-display-virtio-gpu-7.2.0-14.el9_2.x86_64.rpm
SHA-256: cda1b7e11032d5b81215991ea8ef017cb2ac452a9e8ed411f11db633c1189dc5
qemu-kvm-device-display-virtio-gpu-debuginfo-7.2.0-14.el9_2.x86_64.rpm
SHA-256: 4868e19c342ccbe7b48123afe7342b12c984f085e7d963318d17f78a8a288173
qemu-kvm-device-display-virtio-gpu-pci-7.2.0-14.el9_2.x86_64.rpm
SHA-256: 5111777a9f5bec218fa2b16b9fdb9120c843c071234cf58e34d34233da69713b
qemu-kvm-device-display-virtio-gpu-pci-debuginfo-7.2.0-14.el9_2.x86_64.rpm
SHA-256: 171668dbb3ce47a561524c251aa6e93b7eee51da6aaaa3e953ed184791e95c48
qemu-kvm-device-display-virtio-vga-7.2.0-14.el9_2.x86_64.rpm
SHA-256: 3aa7492eb9adb484fedb9b5b491a3b74799cc733bb5f2b2c457ba5f9ca146f0b
qemu-kvm-device-display-virtio-vga-debuginfo-7.2.0-14.el9_2.x86_64.rpm
SHA-256: 586ba97bf13ae5f1d82bf6ffb2bd34ce455b356e123acbd3d5ed4eb06e148463
qemu-kvm-device-usb-host-7.2.0-14.el9_2.x86_64.rpm
SHA-256: eb1df797cae80d2ae2d7c527997be74ca059116fcd1aaf27f9c3e2d9b985c9ff
qemu-kvm-device-usb-host-debuginfo-7.2.0-14.el9_2.x86_64.rpm
SHA-256: 9a0cdcf3218782cd8728bd1a22db19fc28ae13e9908bebcd3dccff56fb6bb5fe
qemu-kvm-device-usb-redirect-7.2.0-14.el9_2.x86_64.rpm
SHA-256: 5643c7dd9314831161d4eb79637b1fc18b6b8697897e3651b99d0aa24fbb8094
qemu-kvm-device-usb-redirect-debuginfo-7.2.0-14.el9_2.x86_64.rpm
SHA-256: f42dddc8d738f110fd4f9586c16388f3782815dc34a83fb2c0f25f3f18db04fa
qemu-kvm-docs-7.2.0-14.el9_2.x86_64.rpm
SHA-256: 81e577973dc34c4350134d117085f48cf042da7abd98d462ae84514d3caa17eb
qemu-kvm-tests-debuginfo-7.2.0-14.el9_2.x86_64.rpm
SHA-256: 397922019663cc467e0cdaa474272755e5169d0fe6173920bfeba7ca4624444a
qemu-kvm-tools-7.2.0-14.el9_2.x86_64.rpm
SHA-256: 5ecf0d46514577ab40e1c007a8c9332aa227d4378b71aaf9bad4aa116e7ce618
qemu-kvm-tools-debuginfo-7.2.0-14.el9_2.x86_64.rpm
SHA-256: 640b99afa060405962ee23319af5db034dc307d48c6834c3d3039f39f6ee1f64
qemu-kvm-ui-egl-headless-7.2.0-14.el9_2.x86_64.rpm
SHA-256: 1b71d2d41376d8bfa516035f71f9b626843d8958cd06dc60f9259313ead44203
qemu-kvm-ui-egl-headless-debuginfo-7.2.0-14.el9_2.x86_64.rpm
SHA-256: 6327840e9dfb2ced2f1014801835913eebe8f87a3ed60cf3ba71763bc7451745
qemu-kvm-ui-opengl-7.2.0-14.el9_2.x86_64.rpm
SHA-256: 6203836611b80567b4664c2038bd88bf8e4305566e338f4c79382cc3e191f3c6
qemu-kvm-ui-opengl-debuginfo-7.2.0-14.el9_2.x86_64.rpm
SHA-256: abce56db90417178eca91e8aed7e36dfe55a29d25eb2db50fcb4f84d0f61e91a
qemu-pr-helper-7.2.0-14.el9_2.x86_64.rpm
SHA-256: 4a8db00686efd7d5218a6e310e0adea7e777fe2fb3179ede65b4b843b58216cd
qemu-pr-helper-debuginfo-7.2.0-14.el9_2.x86_64.rpm
SHA-256: b1b2811e85729f9aaf2ec064e303057db9292b3af16d242cc545827c8120dede
Red Hat Enterprise Linux for IBM z Systems 9
SRPM
qemu-kvm-7.2.0-14.el9_2.src.rpm
SHA-256: 2fd79d846b0b3faa4ca880bf55dd94dc7622b0376d01b12e24b19b524772f747
s390x
qemu-guest-agent-7.2.0-14.el9_2.s390x.rpm
SHA-256: e26ffb95484a54bdc656f92116ffef19c83c98908629f0eb7417c299c6fe4f79
qemu-guest-agent-debuginfo-7.2.0-14.el9_2.s390x.rpm
SHA-256: 3fd8bcea1b44839dec07288628ebfb55f00d63ac6a20bc043e1b361f6f2c5d26
qemu-img-7.2.0-14.el9_2.s390x.rpm
SHA-256: e2483a430cb74754aeb29ced82c64ae556674356be6d333e4bc6013b88f5282d
qemu-img-debuginfo-7.2.0-14.el9_2.s390x.rpm
SHA-256: 8e3ebdce563766d8fe50ffe62f55f1c617893e7b045d357d6662f62056aea93a
qemu-kvm-7.2.0-14.el9_2.s390x.rpm
SHA-256: c223c8b0b21823c2f4eef6308dbd2ffeed7bf1450396ee0fb5298947c3b37cc1
qemu-kvm-audio-pa-7.2.0-14.el9_2.s390x.rpm
SHA-256: 091c61d18dc346661eda056ceb1acb48f30eb07b3451c44a71a093602c87779c
qemu-kvm-audio-pa-debuginfo-7.2.0-14.el9_2.s390x.rpm
SHA-256: 72ef6b10b996b245ac2be14bdaa8c6ab900e353b71aa1dec48680b5d3c9d2a29
qemu-kvm-block-curl-7.2.0-14.el9_2.s390x.rpm
SHA-256: c1710bc6370f399d4bbba083a72d05e438b69d86233fcd4e1358040b550115bf
qemu-kvm-block-curl-debuginfo-7.2.0-14.el9_2.s390x.rpm
SHA-256: 1b8c55d72a947a1a6c78bf8e74a9e408674c79c63df39d632295d90536023e83
qemu-kvm-block-rbd-7.2.0-14.el9_2.s390x.rpm
SHA-256: 43e6693a9006089123ff323f733887705b0dc8cff28ae33ec92611567c37594c
qemu-kvm-block-rbd-debuginfo-7.2.0-14.el9_2.s390x.rpm
SHA-256: 4aefbb17f38c59109225842940be296dbc753120063bb921986499bee324e186
qemu-kvm-common-7.2.0-14.el9_2.s390x.rpm
SHA-256: 1cb0439313e48bdcc0eb4ba7d2d2bb92643676dd65ab05db914bc0a37afcd2de
qemu-kvm-common-debuginfo-7.2.0-14.el9_2.s390x.rpm
SHA-256: e5a903c9e51f4d82086655df8e587fdfbc810cd1255de53baa00fd3815f31462
qemu-kvm-core-7.2.0-14.el9_2.s390x.rpm
SHA-256: 861a7dd52d0387b44765ef139771d8f753c555d7b93a1928053e1cd3c375f80a
qemu-kvm-core-debuginfo-7.2.0-14.el9_2.s390x.rpm
SHA-256: 0342837b3d71e3e4eec5079dfa7001941ef93a0f1a5a2dcaa6ac04416a77a753
qemu-kvm-debuginfo-7.2.0-14.el9_2.s390x.rpm
SHA-256: a72d155c4c778a2940f9234620a366faf498f55a9f2c9f81cbdb55fa67856027
qemu-kvm-debugsource-7.2.0-14.el9_2.s390x.rpm
SHA-256: 91da4a2f78e74b4d7b1ede57bc18d57256fddd6920079648cd54cffc7133a01d
qemu-kvm-device-display-virtio-gpu-7.2.0-14.el9_2.s390x.rpm
SHA-256: a739d45038960809f0750645f4285b66a7edb87c04865fd5ac1d845a662ab630
qemu-kvm-device-display-virtio-gpu-ccw-7.2.0-14.el9_2.s390x.rpm
SHA-256: 4fc8015b5b7433188280c7b2c0d5fcee67931aebd1d37f701812d03c513554bb
qemu-kvm-device-display-virtio-gpu-ccw-debuginfo-7.2.0-14.el9_2.s390x.rpm
SHA-256: 08b8b3f158cee13bea14e0ff1d05bd2de4d7de5895541065616d41106d3e071c
qemu-kvm-device-display-virtio-gpu-debuginfo-7.2.0-14.el9_2.s390x.rpm
SHA-256: 25bb33d016b4e9326d4e4b6d171ab0d400c1fcdbba2004e7811ddaa7f6ca9304
qemu-kvm-device-usb-host-7.2.0-14.el9_2.s390x.rpm
SHA-256: db1b3a3619b41161be251087e02e1886ea4bbe2f08cd2bde5ed894c579d75107
qemu-kvm-device-usb-host-debuginfo-7.2.0-14.el9_2.s390x.rpm
SHA-256: cf15e599b5e976648f48ecfabd15ee574e236bfb473b4d80458827ea6d2935c0
qemu-kvm-docs-7.2.0-14.el9_2.s390x.rpm
SHA-256: e89f80049c90fa7dd67f4f906ac7d2a746e99853568b680fbd62d43f5e38d138
qemu-kvm-tests-debuginfo-7.2.0-14.el9_2.s390x.rpm
SHA-256: 3097dea4cbd14667bf2c22fe02a67afef21d9e8c36e193d62a3128c9271fe2ac
qemu-kvm-tools-7.2.0-14.el9_2.s390x.rpm
SHA-256: 0444516719d6906e9a14df3a183c41238036c1e6bc3c447afb843bb5ee856c89
qemu-kvm-tools-debuginfo-7.2.0-14.el9_2.s390x.rpm
SHA-256: 3865c9e84eefdc4157dad72deabe4094e9bbcbbad796cec1211e2ba922b6510d
qemu-pr-helper-7.2.0-14.el9_2.s390x.rpm
SHA-256: b0b81c1e469c2196de50d8809e5f57bcaea242afc563bac70d4e0be9ba92f513
qemu-pr-helper-debuginfo-7.2.0-14.el9_2.s390x.rpm
SHA-256: f35497fe3a2d05f00527deda222a6175540309c54aada33e65cfdb2bfbea713d
Red Hat Enterprise Linux for Power, little endian 9
SRPM
qemu-kvm-7.2.0-14.el9_2.src.rpm
SHA-256: 2fd79d846b0b3faa4ca880bf55dd94dc7622b0376d01b12e24b19b524772f747
ppc64le
qemu-guest-agent-7.2.0-14.el9_2.ppc64le.rpm
SHA-256: 909da3be68a2ad538f49d4cadaf88cacd8d72e32dd9222fed8d25e546dba9297
qemu-guest-agent-debuginfo-7.2.0-14.el9_2.ppc64le.rpm
SHA-256: af0ce11b9c9673c7554b47940fad05bb4dbceb97330306a05810c171079efd52
qemu-img-7.2.0-14.el9_2.ppc64le.rpm
SHA-256: 06d4109d6fcbf00d24ff310ef171eb224182b1ade4675f33200c824beebe8f08
qemu-img-debuginfo-7.2.0-14.el9_2.ppc64le.rpm
SHA-256: fb60b1a279ccd01c04fc8021517092dd67b057d45adb49f3fcebf0403055acd4
qemu-kvm-debuginfo-7.2.0-14.el9_2.ppc64le.rpm
SHA-256: 193fa2e07b3a2a0fd65cf41b41175764008afed82544cf957e5b984014dfbb3a
qemu-kvm-debugsource-7.2.0-14.el9_2.ppc64le.rpm
SHA-256: 0b3e0de6d5315cae1e9bccf72ab11b17dbb1c9b0b8b9d58c8ed72ae166238754
Red Hat Enterprise Linux for ARM 64 9
SRPM
qemu-kvm-7.2.0-14.el9_2.src.rpm
SHA-256: 2fd79d846b0b3faa4ca880bf55dd94dc7622b0376d01b12e24b19b524772f747
aarch64
qemu-guest-agent-7.2.0-14.el9_2.aarch64.rpm
SHA-256: 9402d44b8b6b25b02890841594957c613b2203722852679d4f6c3167cc4353ad
qemu-guest-agent-debuginfo-7.2.0-14.el9_2.aarch64.rpm
SHA-256: b26b8decef7fd3df075a8de1b89d600a801d04641f3dffe62e766322a8841935
qemu-img-7.2.0-14.el9_2.aarch64.rpm
SHA-256: e2cc29a89d318a693bc11b33f369606bad441d8cd6d7f195765bd2ad99202961
qemu-img-debuginfo-7.2.0-14.el9_2.aarch64.rpm
SHA-256: 2679575862bc585a36a6603c5dd821eaac17b100f71f92170d1d39a5b4d0fb9b
qemu-kvm-7.2.0-14.el9_2.aarch64.rpm
SHA-256: fec869ea0c41dbd80de95504e036b5d57336746a56b1d0d3457d91d89979be80
qemu-kvm-audio-pa-7.2.0-14.el9_2.aarch64.rpm
SHA-256: 0c71d7f181d3cb8a4afe1b62c03b3d42550e4ccc97d96fb9c519606a95955abe
qemu-kvm-audio-pa-debuginfo-7.2.0-14.el9_2.aarch64.rpm
SHA-256: 984d73acee040f8e60eb9efed04aa8e991bd83441598cd40c14b63b15dfd0466
qemu-kvm-block-curl-7.2.0-14.el9_2.aarch64.rpm
SHA-256: de5c12a4c910850e447d61585e0caee981c2d44c9b54b24a2bae446430bd729c
qemu-kvm-block-curl-debuginfo-7.2.0-14.el9_2.aarch64.rpm
SHA-256: ec34e66ba558498b39311eafb8959f522ed722dca878c3e38ea1eaaa3f871249
qemu-kvm-block-rbd-7.2.0-14.el9_2.aarch64.rpm
SHA-256: 34c0a4d01162256979fa122bc7a7dbe5bb9046c8a558bab9941b19cc3880e416
qemu-kvm-block-rbd-debuginfo-7.2.0-14.el9_2.aarch64.rpm
SHA-256: 0e6acb2fff2018638246b441dddf9f6b5d6fb241124d9174de9d420665a015a8
qemu-kvm-common-7.2.0-14.el9_2.aarch64.rpm
SHA-256: 9f87a47eab797ccbc1851baebf63fdef864e1570e27db2618ecaa9c95b010bf1
qemu-kvm-common-debuginfo-7.2.0-14.el9_2.aarch64.rpm
SHA-256: 8e1c5c3c030d623cadffb6a5126f3d2447957de7dd35031c3d17f30c93a897a5
qemu-kvm-core-7.2.0-14.el9_2.aarch64.rpm
SHA-256: d43bbdaf4958fa4073cc3f68f99ceae86a8c4f998f88f59e3559d95369dad78c
qemu-kvm-core-debuginfo-7.2.0-14.el9_2.aarch64.rpm
SHA-256: 2b58759ceedab83709660c832c321d05b2a750cb7188f0b897c039e8ae6e1852
qemu-kvm-debuginfo-7.2.0-14.el9_2.aarch64.rpm
SHA-256: a54e37d5f47412c9ff6394bad8e2fde83aa07a9ac1f12f492d830cb64823036d
qemu-kvm-debugsource-7.2.0-14.el9_2.aarch64.rpm
SHA-256: e1f8939fd82b509d12ad0cbcad5a58bccaefe097467a60986ba861cc692d6adc
qemu-kvm-device-display-virtio-gpu-7.2.0-14.el9_2.aarch64.rpm
SHA-256: c81888df61cadaace83c971808cf4d9b5c979dcc846281f2b1756e4baf862f3f
qemu-kvm-device-display-virtio-gpu-debuginfo-7.2.0-14.el9_2.aarch64.rpm
SHA-256: e8363d3fd4f0e41022af69c2c25ad05b61463f4fabe19c7a219e322cb594f7fb
qemu-kvm-device-display-virtio-gpu-pci-7.2.0-14.el9_2.aarch64.rpm
SHA-256: c4f1cb30d44e8f2dcd13aea98aceb4b33d11e308e67f08251a5842825f3070f6
qemu-kvm-device-display-virtio-gpu-pci-debuginfo-7.2.0-14.el9_2.aarch64.rpm
SHA-256: b0d788c06a88250cbc84dc040e2ca3624da43133842ad57b19a08872c08b1572
qemu-kvm-device-usb-host-7.2.0-14.el9_2.aarch64.rpm
SHA-256: 43d749e084d8d5d3493c49bf993e09e48957f1e7243fd8bfd8ea875cfa483669
qemu-kvm-device-usb-host-debuginfo-7.2.0-14.el9_2.aarch64.rpm
SHA-256: 86ba46ccfdbc71170064966bfa5bb5eecccf97f70379a3024a59e5cff266ce6e
qemu-kvm-docs-7.2.0-14.el9_2.aarch64.rpm
SHA-256: 4f661a98d9ef9d0aba0aefad5ea88cc3df82935da2251c7582f8665ea1569bd3
qemu-kvm-tests-debuginfo-7.2.0-14.el9_2.aarch64.rpm
SHA-256: dd2dd5bb923365ca93e5fdbeb92723776dbe2af66db1b517233b2f4a3679d8ef
qemu-kvm-tools-7.2.0-14.el9_2.aarch64.rpm
SHA-256: 026846fbcaff86ed0fa98fa96851cfd021b48472bd96602f2280fb9c2f48b277
qemu-kvm-tools-debuginfo-7.2.0-14.el9_2.aarch64.rpm
SHA-256: 0e43c44e1e17bb4c2497e1a8bfe522d65f2ba834271199330a08c3bea6f6517a
qemu-pr-helper-7.2.0-14.el9_2.aarch64.rpm
SHA-256: 7453307f89536379eb217846a36f7dd7367ddbaf4bffa906bbea4c38a18eadb5
qemu-pr-helper-debuginfo-7.2.0-14.el9_2.aarch64.rpm
SHA-256: 0438dc2c471f156083b77659063dc6ed7a9cef40fd7dd7586d9d2f0b550d6e1b
Related news
Gentoo Linux Security Advisory 202408-18 - Multiple vulnerabilities have been discovered in QEMU, the worst of which could lead to a denial of service. Versions greater than or equal to 8.0.0 are affected.
Ubuntu Security Notice 6167-1 - It was discovered that QEMU did not properly manage the guest drivers when shared buffers are not allocated. A malicious guest driver could use this issue to cause QEMU to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 20.04 LTS, Ubuntu 22.04 LTS and Ubuntu 22.10. It was discovered that QEMU did not properly check the size of the structure pointed to by the guest physical address pqxl. A malicious guest attacker could use this issue to cause QEMU to crash, resulting in a denial of service. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS and Ubuntu 22.10.
An update for the virt:rhel and virt-devel:rhel modules is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46790: A vulnerability was found in NTFS-3G, specifically in the ntfsck utility. Incorrect validation of NTFS metadata can result in a heap-based buffer overflow when processing a crafted NTFS image file or partition. * CVE-2022-3165: An integer underflow issue was found in the QEMU VNC server while processing ClientCut...
Ubuntu Security Notice 5772-1 - It was discovered that QEMU incorrectly handled bulk transfers from SPICE clients. A remote attacker could use this issue to cause QEMU to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 14.04 ESM and Ubuntu 16.04 ESM. It was discovered that QEMU did not properly manage memory when it transfers the USB packets. A malicious guest attacker could use this issue to cause QEMU to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS.
An integer overflow and buffer overflow issues were found in the ACPI Error Record Serialization Table (ERST) device of QEMU in the read_erst_record() and write_erst_record() functions. Both issues may allow the guest to overrun the host buffer allocated for the ERST memory device. A malicious guest could use these flaws to crash the QEMU process on the host.
An integer underflow issue was found in the QEMU VNC server while processing ClientCutText messages in the extended format. A malicious client could use this flaw to make QEMU unresponsive by sending a specially crafted payload message, resulting in a denial of service.