Описание
ELSA-2025-4492: qemu-kvm security update (MODERATE)
[9.0.0-10.el9_5.3]
- kvm-target-i386-fix-feature-dependency-for-WAITPKG.patch [RHEL-84866]
- Resolves: RHEL-84866 (Live migration after workload update fails with operation failed: guest CPU doesn't match specification: missing features: waitpkg [rhel-9.5.z])
Обновленные пакеты
Oracle Linux 9
Oracle Linux aarch64
qemu-guest-agent
9.0.0-10.el9_5.3
qemu-img
9.0.0-10.el9_5.3
qemu-kvm
9.0.0-10.el9_5.3
qemu-kvm-audio-pa
9.0.0-10.el9_5.3
qemu-kvm-block-blkio
9.0.0-10.el9_5.3
qemu-kvm-block-curl
9.0.0-10.el9_5.3
qemu-kvm-block-rbd
9.0.0-10.el9_5.3
qemu-kvm-common
9.0.0-10.el9_5.3
qemu-kvm-core
9.0.0-10.el9_5.3
qemu-kvm-device-display-virtio-gpu
9.0.0-10.el9_5.3
qemu-kvm-device-display-virtio-gpu-pci
9.0.0-10.el9_5.3
qemu-kvm-device-usb-host
9.0.0-10.el9_5.3
qemu-kvm-device-usb-redirect
9.0.0-10.el9_5.3
qemu-kvm-docs
9.0.0-10.el9_5.3
qemu-kvm-tools
9.0.0-10.el9_5.3
qemu-pr-helper
9.0.0-10.el9_5.3
Oracle Linux x86_64
qemu-guest-agent
9.0.0-10.el9_5.3
qemu-img
9.0.0-10.el9_5.3
qemu-kvm
9.0.0-10.el9_5.3
qemu-kvm-audio-pa
9.0.0-10.el9_5.3
qemu-kvm-block-blkio
9.0.0-10.el9_5.3
qemu-kvm-block-curl
9.0.0-10.el9_5.3
qemu-kvm-block-rbd
9.0.0-10.el9_5.3
qemu-kvm-common
9.0.0-10.el9_5.3
qemu-kvm-core
9.0.0-10.el9_5.3
qemu-kvm-device-display-virtio-gpu
9.0.0-10.el9_5.3
qemu-kvm-device-display-virtio-gpu-pci
9.0.0-10.el9_5.3
qemu-kvm-device-display-virtio-vga
9.0.0-10.el9_5.3
qemu-kvm-device-usb-host
9.0.0-10.el9_5.3
qemu-kvm-device-usb-redirect
9.0.0-10.el9_5.3
qemu-kvm-docs
9.0.0-10.el9_5.3
qemu-kvm-tools
9.0.0-10.el9_5.3
qemu-kvm-ui-egl-headless
9.0.0-10.el9_5.3
qemu-kvm-ui-opengl
9.0.0-10.el9_5.3
qemu-pr-helper
9.0.0-10.el9_5.3
Связанные CVE
Связанные уязвимости
A flaw was found in QEMU. An assertion failure was present in the update_sctp_checksum() function in hw/net/net_tx_pkt.c when trying to calculate the checksum of a short-sized fragmented packet. This flaw allows a malicious guest to crash QEMU and cause a denial of service condition.
A flaw was found in QEMU. An assertion failure was present in the update_sctp_checksum() function in hw/net/net_tx_pkt.c when trying to calculate the checksum of a short-sized fragmented packet. This flaw allows a malicious guest to crash QEMU and cause a denial of service condition.
A flaw was found in QEMU. An assertion failure was present in the update_sctp_checksum() function in hw/net/net_tx_pkt.c when trying to calculate the checksum of a short-sized fragmented packet. This flaw allows a malicious guest to crash QEMU and cause a denial of service condition.
A flaw was found in QEMU. An assertion failure was present in the upda ...