qemu-kvm-9.0.0-10.el9
エラータID: AXSA:2024-9100:07
Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM.
Security Fix(es):
* QEMU: SR-IOV: improper validation of NumVFs leads to buffer overflow (CVE-2024-26327)
* QEMU: virtio: DMA reentrancy issue leads to double free vulnerability (CVE-2024-3446)
* QEMU: Denial of Service via Improper Synchronization in QEMU NBD Server During Socket Closure (CVE-2024-7409)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the MIRACLE LINUX 9.5 Release Notes linked from the References section.
CVE-2024-26327
An issue was discovered in QEMU 7.1.0 through 8.2.1. register_vfs in hw/pci/pcie_sriov.c mishandles the situation where a guest writes NumVFs greater than TotalVFs, leading to a buffer overflow in VF implementations.
CVE-2024-3446
A double free vulnerability was found in QEMU virtio devices (virtio-gpu, virtio-serial-bus, virtio-crypto), where the mem_reentrancy_guard flag insufficiently protects against DMA reentrancy issues. This issue could allow a malicious privileged guest user to crash the QEMU process on the host, resulting in a denial of service or allow arbitrary code execution within the context of the QEMU process on the host.
CVE-2024-7409
A flaw was found in the QEMU NBD Server. This vulnerability allows a denial of service (DoS) attack via improper synchronization during socket closure when a client keeps a socket open as the server is taken offline.
Update packages.
An issue was discovered in QEMU 7.1.0 through 8.2.1. register_vfs in hw/pci/pcie_sriov.c mishandles the situation where a guest writes NumVFs greater than TotalVFs, leading to a buffer overflow in VF implementations.
A double free vulnerability was found in QEMU virtio devices (virtio-gpu, virtio-serial-bus, virtio-crypto), where the mem_reentrancy_guard flag insufficiently protects against DMA reentrancy issues. This issue could allow a malicious privileged guest user to crash the QEMU process on the host, resulting in a denial of service or allow arbitrary code execution within the context of the QEMU process on the host.
A flaw was found in the QEMU NBD Server. This vulnerability allows a denial of service (DoS) attack via improper synchronization during socket closure when a client keeps a socket open as the server is taken offline.
N/A
SRPMS
- qemu-kvm-9.0.0-10.el9.src.rpm
MD5: d915913f9977aa58108903a28db41cd1
SHA-256: b5d7e0835cb9b2e43372278283b58e206420c02d28f1e7df241be33c7de5fcf0
Size: 124.25 MB
Asianux Server 9 for x86_64
- qemu-guest-agent-9.0.0-10.el9.x86_64.rpm
MD5: 410dfdc9c5f22c5f7d8a7741cb06d791
SHA-256: d45290cdc703d9a16a724814e335e1fee1cd6756b0246418484cd0558cce934c
Size: 499.95 kB - qemu-img-9.0.0-10.el9.x86_64.rpm
MD5: c16773b0fc46a705410dae73b9a5c053
SHA-256: 15cf640f3cb715c62fcb8a64d97f01e09fe8b950f8a127b4086cb3dd1d85e776
Size: 2.50 MB - qemu-kvm-9.0.0-10.el9.x86_64.rpm
MD5: 1060f24963218fa34bb59ffcc47446ab
SHA-256: 305d0af24408a574f22900a0235f0cd5c8c36b753169b88fad40f138401e5c3b
Size: 70.44 kB - qemu-kvm-audio-pa-9.0.0-10.el9.x86_64.rpm
MD5: 87a5ac400171f5257b6faa6f1ce28ba8
SHA-256: 72978d3c889e2dd487b1d862519330cd30b2d8e177f475008312c9e0ec85776d
Size: 79.68 kB - qemu-kvm-block-blkio-9.0.0-10.el9.x86_64.rpm
MD5: 2a9d079dd8b138236fe2db8a0527d119
SHA-256: 98d96b1bced53b8edf42844f5f89b9d360f37cfd0297c4598403443ce1eccd32
Size: 82.52 kB - qemu-kvm-block-curl-9.0.0-10.el9.x86_64.rpm
MD5: 0cc831601aba170ad91629e9e1d2a890
SHA-256: cfe242cd1af648095ee8d9c03dd48fb532c4dc3060b62abc2ded89c039af0c67
Size: 81.97 kB - qemu-kvm-block-rbd-9.0.0-10.el9.x86_64.rpm
MD5: 8a31072a2327ecbdd0b4a7d922906334
SHA-256: ae07ec8be1937b230c0255591ae82577223ac359870773f0286196c3b88c08f1
Size: 85.13 kB - qemu-kvm-common-9.0.0-10.el9.x86_64.rpm
MD5: 7f73bd60a62a90ffc25b8e47c2eaa8a6
SHA-256: 4bcda3350eeb10fcfa2dfec0dc9e0c7299afe1e4f451edc4d0f9eecdc557dc19
Size: 691.78 kB - qemu-kvm-core-9.0.0-10.el9.x86_64.rpm
MD5: 00e126d58125ed79813bd2083dfd8970
SHA-256: 089d22d6c8bdeecf2b18973116d9fd559fe36b7b464a48e4c76a1688d3e6215c
Size: 4.87 MB - qemu-kvm-device-display-virtio-gpu-9.0.0-10.el9.x86_64.rpm
MD5: ca43606570f3dd3a69a066d235a02f42
SHA-256: 991a1a89b34ae33140e731c40acffe6e2143218923763002058e36fa63984ab9
Size: 91.20 kB - qemu-kvm-device-display-virtio-gpu-pci-9.0.0-10.el9.x86_64.rpm
MD5: 208fce4a0a09e4e397acacff6e5322fc
SHA-256: f71383517515ac9401c510d5ac2b01113538bdb10d8f9962dc79a6613ce497a6
Size: 74.64 kB - qemu-kvm-device-display-virtio-vga-9.0.0-10.el9.x86_64.rpm
MD5: 70ed57dbfb7d111db13040b356561c24
SHA-256: 663bb6b7187d3d0bc9aad34575c9f82b56f7958ddce4a92820a355053942f818
Size: 76.08 kB - qemu-kvm-device-usb-host-9.0.0-10.el9.x86_64.rpm
MD5: 91a440005be0f3159fd6360998c4521c
SHA-256: 83e9dd2f269506baaebebdf3085e0fe9e5c0bdc915a27e2e4da33a85410bdd72
Size: 88.96 kB - qemu-kvm-device-usb-redirect-9.0.0-10.el9.x86_64.rpm
MD5: e8548e00cd02fd4451f15247eb510102
SHA-256: c4effe9894bfaeff07d132afb1b4d8a21e22d4b20d0654a4cf7dc0b31d6ae7e5
Size: 93.81 kB - qemu-kvm-docs-9.0.0-10.el9.x86_64.rpm
MD5: 2862f59019bcfb24a94469e63c8a76cf
SHA-256: 9bd75aa9276f6ec1eecf93d714f568173d32b7234971005b48e9cab15b61abe5
Size: 1.27 MB - qemu-kvm-tools-9.0.0-10.el9.x86_64.rpm
MD5: f68bbf85c3b2f2044fd4bf38a4c04e60
SHA-256: 0ed5787db795c18befb217a59b329a6f36f38981484f5a284d55b888c5373b20
Size: 594.53 kB - qemu-kvm-ui-egl-headless-9.0.0-10.el9.x86_64.rpm
MD5: 4ec6c6fa44b4717bb7e7cff9fa4fbdba
SHA-256: 41107a931dc072cad75a8ee9a8155436d30eead951e44dfc0478f98c783183d3
Size: 75.40 kB - qemu-kvm-ui-opengl-9.0.0-10.el9.x86_64.rpm
MD5: 987ca4570b033f3811ad7a584b384ed1
SHA-256: 610d576cfe96b511e6cb99b2027497407e945018e9eed848cb0897129e2e2b66
Size: 82.54 kB - qemu-pr-helper-9.0.0-10.el9.x86_64.rpm
MD5: c242ce52c2b1d78ece2260954a1e88f8
SHA-256: a09b057533b7012e3cfbf6d0987a0e63ea187207278492cecc771512f611f7eb
Size: 503.66 kB