An update for qemu is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3 and openEuler-22.03-LTS
Security Advisory
openeuler-security@openeuler.org
openEuler security committee
openEuler-SA-2022-1679
Final
1.0
1.0
2022-05-28
Initial
2022-05-28
2022-05-28
openEuler SA Tool V1.0
2022-05-28
qemu security update
An update for qemu is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3 and openEuler-22.03-LTS.
QEMU is a FAST! processor emulator using dynamic translation to achieve good emulation speed.
Security Fix(es):
A DMA reentrancy issue was found in the USB EHCI controller emulation of QEMU. EHCI does not verify if the Buffer Pointer overlaps with its MMIO region when it transfers the USB packets. Crafted content may be written to the controller's registers and trigger undesirable actions (such as reset) while the device is still transferring packets. This can ultimately lead to a use-after-free issue. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition, or potentially execute arbitrary code within the context of the QEMU process on the host. This flaw affects QEMU versions before 7.0.0.(CVE-2021-3750)
An update for qemu is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3 and openEuler-22.03-LTS.
openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
High
qemu
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1679
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2021-3750
https://nvd.nist.gov/vuln/detail/CVE-2021-3750
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP3
openEuler-22.03-LTS
qemu-block-rbd-4.1.0-64.oe1.aarch64.rpm
qemu-block-iscsi-4.1.0-64.oe1.aarch64.rpm
qemu-guest-agent-4.1.0-64.oe1.aarch64.rpm
qemu-debugsource-4.1.0-64.oe1.aarch64.rpm
qemu-block-curl-4.1.0-64.oe1.aarch64.rpm
qemu-4.1.0-64.oe1.aarch64.rpm
qemu-debuginfo-4.1.0-64.oe1.aarch64.rpm
qemu-block-ssh-4.1.0-64.oe1.aarch64.rpm
qemu-img-4.1.0-64.oe1.aarch64.rpm
qemu-debugsource-4.1.0-68.oe1.aarch64.rpm
qemu-block-iscsi-4.1.0-68.oe1.aarch64.rpm
qemu-block-ssh-4.1.0-68.oe1.aarch64.rpm
qemu-debuginfo-4.1.0-68.oe1.aarch64.rpm
qemu-img-4.1.0-68.oe1.aarch64.rpm
qemu-4.1.0-68.oe1.aarch64.rpm
qemu-guest-agent-4.1.0-68.oe1.aarch64.rpm
qemu-block-rbd-4.1.0-68.oe1.aarch64.rpm
qemu-block-curl-4.1.0-68.oe1.aarch64.rpm
qemu-img-6.2.0-35.oe2203.aarch64.rpm
qemu-block-ssh-6.2.0-35.oe2203.aarch64.rpm
qemu-6.2.0-35.oe2203.aarch64.rpm
qemu-debuginfo-6.2.0-35.oe2203.aarch64.rpm
qemu-hw-usb-host-6.2.0-35.oe2203.aarch64.rpm
qemu-block-iscsi-6.2.0-35.oe2203.aarch64.rpm
qemu-block-curl-6.2.0-35.oe2203.aarch64.rpm
qemu-guest-agent-6.2.0-35.oe2203.aarch64.rpm
qemu-block-rbd-6.2.0-35.oe2203.aarch64.rpm
qemu-debugsource-6.2.0-35.oe2203.aarch64.rpm
qemu-help-4.1.0-64.oe1.noarch.rpm
qemu-help-4.1.0-68.oe1.noarch.rpm
qemu-help-6.2.0-35.oe2203.noarch.rpm
qemu-4.1.0-64.oe1.src.rpm
qemu-4.1.0-68.oe1.src.rpm
qemu-6.2.0-35.oe2203.src.rpm
qemu-img-4.1.0-64.oe1.x86_64.rpm
qemu-debuginfo-4.1.0-64.oe1.x86_64.rpm
qemu-block-iscsi-4.1.0-64.oe1.x86_64.rpm
qemu-debugsource-4.1.0-64.oe1.x86_64.rpm
qemu-guest-agent-4.1.0-64.oe1.x86_64.rpm
qemu-block-curl-4.1.0-64.oe1.x86_64.rpm
qemu-4.1.0-64.oe1.x86_64.rpm
qemu-seabios-4.1.0-64.oe1.x86_64.rpm
qemu-block-rbd-4.1.0-64.oe1.x86_64.rpm
qemu-block-ssh-4.1.0-64.oe1.x86_64.rpm
qemu-seabios-4.1.0-68.oe1.x86_64.rpm
qemu-img-4.1.0-68.oe1.x86_64.rpm
qemu-debuginfo-4.1.0-68.oe1.x86_64.rpm
qemu-guest-agent-4.1.0-68.oe1.x86_64.rpm
qemu-debugsource-4.1.0-68.oe1.x86_64.rpm
qemu-block-ssh-4.1.0-68.oe1.x86_64.rpm
qemu-block-rbd-4.1.0-68.oe1.x86_64.rpm
qemu-4.1.0-68.oe1.x86_64.rpm
qemu-block-iscsi-4.1.0-68.oe1.x86_64.rpm
qemu-block-curl-4.1.0-68.oe1.x86_64.rpm
qemu-img-6.2.0-35.oe2203.x86_64.rpm
qemu-block-ssh-6.2.0-35.oe2203.x86_64.rpm
qemu-6.2.0-35.oe2203.x86_64.rpm
qemu-debuginfo-6.2.0-35.oe2203.x86_64.rpm
qemu-hw-usb-host-6.2.0-35.oe2203.x86_64.rpm
qemu-block-iscsi-6.2.0-35.oe2203.x86_64.rpm
qemu-block-curl-6.2.0-35.oe2203.x86_64.rpm
qemu-guest-agent-6.2.0-35.oe2203.x86_64.rpm
qemu-block-rbd-6.2.0-35.oe2203.x86_64.rpm
qemu-debugsource-6.2.0-35.oe2203.x86_64.rpm
qemu-seabios-6.2.0-35.oe2203.x86_64.rpm
A DMA reentrancy issue was found in the USB EHCI controller emulation of QEMU. EHCI does not verify if the Buffer Pointer overlaps with its MMIO region when it transfers the USB packets. Crafted content may be written to the controller s registers and trigger undesirable actions (such as reset) while the device is still transferring packets. This can ultimately lead to a use-after-free issue. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition, or potentially execute arbitrary code within the context of the QEMU process on the host. This flaw affects QEMU versions before 7.0.0.
2022-05-28
CVE-2021-3750
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP3
openEuler-22.03-LTS
High
8.2
AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
qemu security update
2022-05-28
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1679