Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2021-0347

Опубликовано: 03 фев. 2021
Источник: oracle-oval
Платформа: Oracle Linux 7

Описание

ELSA-2021-0347: qemu-kvm security and bug fix update (MODERATE)

[1.5.3-175.el7_9.3]

  • kvm-Suppress-prototype-warning-for-nss-headers.patch [bz#1884997]
  • Resolves: bz#1884997 (qemu-kvm FTBFS on rhel7.9)

[1.5.3-175.el7_9.2]

  • kvm-hw-net-vmxnet_tx_pkt-fix-assertion-failure-in-vmxnet.patch [bz#1860960]
  • kvm-hw-core-loader-Fix-possible-crash-in-rom_copy.patch [bz#1842923]
  • Resolves: bz#1842923 (CVE-2020-13765 qemu-kvm: QEMU: loader: OOB access while loading registered ROM may lead to code execution [rhel-7.9.z])
  • Resolves: bz#1860960 (CVE-2020-16092 qemu-kvm: QEMU: reachable assertion failure in net_tx_pkt_add_raw_fragment() in hw/net/net_tx_pkt.c [rhel-7.9.z])

Обновленные пакеты

Oracle Linux 7

Oracle Linux x86_64

qemu-img

1.5.3-175.el7_9.3

qemu-kvm

1.5.3-175.el7_9.3

qemu-kvm-common

1.5.3-175.el7_9.3

qemu-kvm-tools

1.5.3-175.el7_9.3

Связанные CVE

Связанные уязвимости

CVSS3: 5.6
ubuntu
около 5 лет назад

rom_copy() in hw/core/loader.c in QEMU 4.0 and 4.1.0 does not validate the relationship between two addresses, which allows attackers to trigger an invalid memory copy operation.

CVSS3: 5.6
redhat
около 5 лет назад

rom_copy() in hw/core/loader.c in QEMU 4.0 and 4.1.0 does not validate the relationship between two addresses, which allows attackers to trigger an invalid memory copy operation.

CVSS3: 5.6
nvd
около 5 лет назад

rom_copy() in hw/core/loader.c in QEMU 4.0 and 4.1.0 does not validate the relationship between two addresses, which allows attackers to trigger an invalid memory copy operation.

CVSS3: 5.6
debian
около 5 лет назад

rom_copy() in hw/core/loader.c in QEMU 4.0 and 4.1.0 does not validate ...

CVSS3: 3.8
ubuntu
почти 5 лет назад

In QEMU through 5.0.0, an assertion failure can occur in the network packet processing. This issue affects the e1000e and vmxnet3 network devices. A malicious guest user/process could use this flaw to abort the QEMU process on the host, resulting in a denial of service condition in net_tx_pkt_add_raw_fragment in hw/net/net_tx_pkt.c.