Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2025:4492

Опубликовано: 29 июл. 2025
Источник: rocky
Оценка: Moderate

Описание

Moderate: qemu-kvm security update

Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM.

Security Fix(es):

  • QEMU: virtio-net: stack buffer overflow in virtio_net_flush_tx() (CVE-2023-6693)

  • qemu-kvm: net: assertion failure in update_sctp_checksum() (CVE-2024-3567)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 9

НаименованиеАрхитектураРелизRPM
qemu-guest-agentx86_6410.el9_5.3qemu-guest-agent-9.0.0-10.el9_5.3.x86_64.rpm
qemu-imgx86_6410.el9_5.3qemu-img-9.0.0-10.el9_5.3.x86_64.rpm
qemu-kvmx86_6410.el9_5.3qemu-kvm-9.0.0-10.el9_5.3.x86_64.rpm
qemu-kvm-audio-pax86_6410.el9_5.3qemu-kvm-audio-pa-9.0.0-10.el9_5.3.x86_64.rpm
qemu-kvm-block-blkiox86_6410.el9_5.3qemu-kvm-block-blkio-9.0.0-10.el9_5.3.x86_64.rpm
qemu-kvm-block-curlx86_6410.el9_5.3qemu-kvm-block-curl-9.0.0-10.el9_5.3.x86_64.rpm
qemu-kvm-block-rbdx86_6410.el9_5.3qemu-kvm-block-rbd-9.0.0-10.el9_5.3.x86_64.rpm
qemu-kvm-commonx86_6410.el9_5.3qemu-kvm-common-9.0.0-10.el9_5.3.x86_64.rpm
qemu-kvm-corex86_6410.el9_5.3qemu-kvm-core-9.0.0-10.el9_5.3.x86_64.rpm
qemu-kvm-device-display-virtio-gpux86_6410.el9_5.3qemu-kvm-device-display-virtio-gpu-9.0.0-10.el9_5.3.x86_64.rpm

Показывать по

Связанные CVE

Связанные уязвимости

oracle-oval
8 месяцев назад

ELSA-2025-4492: qemu-kvm security update (MODERATE)

CVSS3: 5.5
ubuntu
больше 1 года назад

A flaw was found in QEMU. An assertion failure was present in the update_sctp_checksum() function in hw/net/net_tx_pkt.c when trying to calculate the checksum of a short-sized fragmented packet. This flaw allows a malicious guest to crash QEMU and cause a denial of service condition.

CVSS3: 5.5
redhat
больше 1 года назад

A flaw was found in QEMU. An assertion failure was present in the update_sctp_checksum() function in hw/net/net_tx_pkt.c when trying to calculate the checksum of a short-sized fragmented packet. This flaw allows a malicious guest to crash QEMU and cause a denial of service condition.

CVSS3: 5.5
nvd
больше 1 года назад

A flaw was found in QEMU. An assertion failure was present in the update_sctp_checksum() function in hw/net/net_tx_pkt.c when trying to calculate the checksum of a short-sized fragmented packet. This flaw allows a malicious guest to crash QEMU and cause a denial of service condition.

CVSS3: 5.5
msrc
8 месяцев назад

Описание отсутствует