qemu-kvm-1.5.3-175.el7.1
エラータID: AXSA:2020-748:04
リリース日:
2020/10/16 Friday - 06:13
題名:
qemu-kvm-1.5.3-175.el7.1
影響のあるチャネル:
Asianux Server 7 for x86_64
Severity:
High
Description:
以下項目について対処しました。
[Security Fix]
- qemu-kvm の USB エミュレーターには境界外の読み込み/書き込みアクセスの問題があり、
ゲストユーザーが QEMU プロセスをクラッシュさせることでサービス拒否を引き起こしたり、
ホスト上で QEMU プロセスの権限で任意のコードを実行できてしまう脆弱性があります。
(CVE-2020-14364)
- qemu-kvm の ip_input.c 内の ip_reass 関数には解放後使用(use-after-free)の問題があり、
巧妙に細工されたパケットがサービス拒否を引き起こす脆弱性があります。(CVE-2020-1983)
解決策:
パッケージをアップデートしてください。
CVE:
CVE-2020-14364
An out-of-bounds read/write access flaw was found in the USB emulator of the QEMU in versions before 5.2.0. This issue occurs while processing USB packets from a guest when USBDevice 'setup_len' exceeds its 'data_buf[4096]' in the do_token_in, do_token_out routines. This flaw allows a guest user to crash the QEMU process, resulting in a denial of service, or the potential execution of arbitrary code with the privileges of the QEMU process on the host.
An out-of-bounds read/write access flaw was found in the USB emulator of the QEMU in versions before 5.2.0. This issue occurs while processing USB packets from a guest when USBDevice 'setup_len' exceeds its 'data_buf[4096]' in the do_token_in, do_token_out routines. This flaw allows a guest user to crash the QEMU process, resulting in a denial of service, or the potential execution of arbitrary code with the privileges of the QEMU process on the host.
CVE-2020-1983
A use after free vulnerability in ip_reass() in ip_input.c of libslirp 4.2.0 and prior releases allows crafted packets to cause a denial of service.
A use after free vulnerability in ip_reass() in ip_input.c of libslirp 4.2.0 and prior releases allows crafted packets to cause a denial of service.
追加情報:
N/A
ダウンロード:
SRPMS
- qemu-kvm-1.5.3-175.el7.1.src.rpm
MD5: 878cbeb26f24d146e582f1e6e941e1a7
SHA-256: e56488ed3ab68e1bf39f6708967153fd105e86692a4fa2107fc57bfdd8122903
Size: 14.95 MB
Asianux Server 7 for x86_64
- qemu-img-1.5.3-175.el7.1.x86_64.rpm
MD5: 7443ba862c6a284ef662e6afc033d9af
SHA-256: fc85c813f79818e399225e50125a6b3c77bf0d734c56964bebd19db50fb3cacf
Size: 702.68 kB - qemu-kvm-1.5.3-175.el7.1.x86_64.rpm
MD5: e0ff43a0633e935f412297596a366bae
SHA-256: 93c1c5ad096dd7e2f916e9ed9fa64e2aa72db0eeb3c08cfbb233d569ab6511fd
Size: 1.91 MB - qemu-kvm-common-1.5.3-175.el7.1.x86_64.rpm
MD5: c714797b5cbdc8c18fec534743952f72
SHA-256: 4bd4a67809e334f47d1b1b4f96773e881e74efc199fd667ea3cc10e86ef802f1
Size: 438.53 kB - qemu-kvm-tools-1.5.3-175.el7.1.x86_64.rpm
MD5: c377b60983bc6b5edc21f0c5cb4c46fe
SHA-256: ee53d245a215bc27e1942ee56026ee2de6855bf0d65c43426d3065271f2f812e
Size: 236.54 kB