Описание
ELSA-2022-9344: qemu security update (IMPORTANT)
[15:4.2.1-16.el7]
- Document CVE-2021-4145 as fixed (Mark Kanda) [Orabug: 33791496] {CVE-2021-4145}
- migration: Tally pre-copy, downtime and post-copy bytes independently (David Edmondson)
- migration: Introduce ram_transferred_add() (David Edmondson)
- ACPI ERST: specification for ERST support (Eric DeVolder)
- ACPI ERST: step 6 of bios-tables-test.c (Eric DeVolder)
- ACPI ERST: bios-tables-test testcase (Eric DeVolder)
- ACPI ERST: qtest for ERST (Eric DeVolder)
- ACPI ERST: create ACPI ERST table for pc/x86 machines (Eric DeVolder)
- ACPI ERST: build the ACPI ERST table (Eric DeVolder)
- ACPI ERST: support for ACPI ERST feature (Eric DeVolder)
- ACPI ERST: header file for ERST (Eric DeVolder)
- ACPI ERST: PCI device_id for ERST (Eric DeVolder)
- ACPI ERST: bios-tables-test.c steps 1 and 2 (Eric DeVolder)
- ACPI: cleanup bios-tables-test state (Eric DeVolder)
- KVM: x86: believe what KVM says about WAITPKG (Paolo Bonzini) [Orabug: 33832295]
- cputlb: destroy CPUTLB with tlb_destroy (Emilio G. Cota) [Orabug: 33428107]
Обновленные пакеты
Oracle Linux 7
Oracle Linux aarch64
ivshmem-tools
4.2.1-16.el7
qemu
4.2.1-16.el7
qemu-block-gluster
4.2.1-16.el7
qemu-block-iscsi
4.2.1-16.el7
qemu-block-rbd
4.2.1-16.el7
qemu-common
4.2.1-16.el7
qemu-img
4.2.1-16.el7
qemu-kvm
4.2.1-16.el7
qemu-kvm-core
4.2.1-16.el7
qemu-system-aarch64
4.2.1-16.el7
qemu-system-aarch64-core
4.2.1-16.el7
Oracle Linux x86_64
qemu
4.2.1-16.el7
qemu-block-gluster
4.2.1-16.el7
qemu-block-iscsi
4.2.1-16.el7
qemu-block-rbd
4.2.1-16.el7
qemu-common
4.2.1-16.el7
qemu-img
4.2.1-16.el7
qemu-kvm
4.2.1-16.el7
qemu-kvm-core
4.2.1-16.el7
qemu-system-x86
4.2.1-16.el7
qemu-system-x86-core
4.2.1-16.el7
Связанные CVE
Связанные уязвимости
A NULL pointer dereference issue was found in the block mirror layer of QEMU in versions prior to 6.2.0. The `self` pointer is dereferenced in mirror_wait_on_conflicts() without ensuring that it's not NULL. A malicious unprivileged user within the guest could use this flaw to crash the QEMU process on the host when writing data reaches the threshold of mirroring node.
A NULL pointer dereference issue was found in the block mirror layer of QEMU in versions prior to 6.2.0. The `self` pointer is dereferenced in mirror_wait_on_conflicts() without ensuring that it's not NULL. A malicious unprivileged user within the guest could use this flaw to crash the QEMU process on the host when writing data reaches the threshold of mirroring node.
A NULL pointer dereference issue was found in the block mirror layer of QEMU in versions prior to 6.2.0. The `self` pointer is dereferenced in mirror_wait_on_conflicts() without ensuring that it's not NULL. A malicious unprivileged user within the guest could use this flaw to crash the QEMU process on the host when writing data reaches the threshold of mirroring node.
A NULL pointer dereference issue was found in the block mirror layer o ...