Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2025-4492

Опубликовано: 06 мая 2025
Источник: oracle-oval
Платформа: Oracle Linux 9

Описание

ELSA-2025-4492: qemu-kvm security update (MODERATE)

[9.0.0-10.el9_5.3]

  • kvm-target-i386-fix-feature-dependency-for-WAITPKG.patch [RHEL-84866]
  • Resolves: RHEL-84866 (Live migration after workload update fails with operation failed: guest CPU doesn't match specification: missing features: waitpkg [rhel-9.5.z])

Обновленные пакеты

Oracle Linux 9

Oracle Linux aarch64

qemu-guest-agent

9.0.0-10.el9_5.3

qemu-img

9.0.0-10.el9_5.3

qemu-kvm

9.0.0-10.el9_5.3

qemu-kvm-audio-pa

9.0.0-10.el9_5.3

qemu-kvm-block-blkio

9.0.0-10.el9_5.3

qemu-kvm-block-curl

9.0.0-10.el9_5.3

qemu-kvm-block-rbd

9.0.0-10.el9_5.3

qemu-kvm-common

9.0.0-10.el9_5.3

qemu-kvm-core

9.0.0-10.el9_5.3

qemu-kvm-device-display-virtio-gpu

9.0.0-10.el9_5.3

qemu-kvm-device-display-virtio-gpu-pci

9.0.0-10.el9_5.3

qemu-kvm-device-usb-host

9.0.0-10.el9_5.3

qemu-kvm-device-usb-redirect

9.0.0-10.el9_5.3

qemu-kvm-docs

9.0.0-10.el9_5.3

qemu-kvm-tools

9.0.0-10.el9_5.3

qemu-pr-helper

9.0.0-10.el9_5.3

Oracle Linux x86_64

qemu-guest-agent

9.0.0-10.el9_5.3

qemu-img

9.0.0-10.el9_5.3

qemu-kvm

9.0.0-10.el9_5.3

qemu-kvm-audio-pa

9.0.0-10.el9_5.3

qemu-kvm-block-blkio

9.0.0-10.el9_5.3

qemu-kvm-block-curl

9.0.0-10.el9_5.3

qemu-kvm-block-rbd

9.0.0-10.el9_5.3

qemu-kvm-common

9.0.0-10.el9_5.3

qemu-kvm-core

9.0.0-10.el9_5.3

qemu-kvm-device-display-virtio-gpu

9.0.0-10.el9_5.3

qemu-kvm-device-display-virtio-gpu-pci

9.0.0-10.el9_5.3

qemu-kvm-device-display-virtio-vga

9.0.0-10.el9_5.3

qemu-kvm-device-usb-host

9.0.0-10.el9_5.3

qemu-kvm-device-usb-redirect

9.0.0-10.el9_5.3

qemu-kvm-docs

9.0.0-10.el9_5.3

qemu-kvm-tools

9.0.0-10.el9_5.3

qemu-kvm-ui-egl-headless

9.0.0-10.el9_5.3

qemu-kvm-ui-opengl

9.0.0-10.el9_5.3

qemu-pr-helper

9.0.0-10.el9_5.3

Связанные CVE

Связанные уязвимости

CVSS3: 5.5
ubuntu
больше 1 года назад

A flaw was found in QEMU. An assertion failure was present in the update_sctp_checksum() function in hw/net/net_tx_pkt.c when trying to calculate the checksum of a short-sized fragmented packet. This flaw allows a malicious guest to crash QEMU and cause a denial of service condition.

CVSS3: 5.5
redhat
больше 1 года назад

A flaw was found in QEMU. An assertion failure was present in the update_sctp_checksum() function in hw/net/net_tx_pkt.c when trying to calculate the checksum of a short-sized fragmented packet. This flaw allows a malicious guest to crash QEMU and cause a denial of service condition.

CVSS3: 5.5
nvd
больше 1 года назад

A flaw was found in QEMU. An assertion failure was present in the update_sctp_checksum() function in hw/net/net_tx_pkt.c when trying to calculate the checksum of a short-sized fragmented packet. This flaw allows a malicious guest to crash QEMU and cause a denial of service condition.

CVSS3: 5.5
msrc
3 месяца назад

Описание отсутствует

CVSS3: 5.5
debian
больше 1 года назад

A flaw was found in QEMU. An assertion failure was present in the upda ...