摘要:
qemu security update
安全等级: Medium
公告ID: KylinSec-SA-2024-1543
发布日期: 2024年3月22日
QEMU is a FAST! processor emulator using dynamic translation to achieve good emulation speed.
Security Fix(es):
A DMA reentrancy issue leading to a use-after-free error was found in the e1000e NIC emulation code in QEMU. This issue could allow a privileged guest user to crash the QEMU process on the host, resulting in a denial of service.(CVE-2023-3019)
A flaw was found in the QEMU built-in VNC server while processing ClientCutText messages. The qemu_clipboard_request() function can be reached before vnc_server_cut_text_caps() was called and had the chance to initialize the clipboard peer, leading to a NULL pointer dereference. This could allow a malicious authenticated VNC client to crash QEMU and trigger a denial of service.(CVE-2023-6683)
A stack based buffer overflow was found in the virtio-net device of QEMU. This issue occurs when flushing TX in the virtio_net_flush_tx function if guest features VIRTIO_NET_F_HASH_REPORT, VIRTIO_F_VERSION_1 and VIRTIO_NET_F_MRG_RXBUF are enabled. This could allow a malicious user to overwrite local variables allocated on the stack. Specifically, the `out_sg` variable could be used to read a part of process memory and send it to the wire, causing an information leak.(CVE-2023-6693)
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2023-3019 | KY3.5.2 | qemu | Fixed |
CVE-2023-6683 | KY3.5.2 | qemu | Fixed |
CVE-2023-6693 | KY3.5.2 | qemu | Fixed |
软件名称 | 架构 | 版本号 |
---|---|---|
qemu-help | noarch | 6.2.0-91.ky3_5.kb1 |
qemu-block-ssh | x86_64 | 6.2.0-91.ky3_5.kb1 |
qemu-system-aarch64 | x86_64 | 6.2.0-91.ky3_5.kb1 |
qemu-system-arm | x86_64 | 6.2.0-91.ky3_5.kb1 |
qemu-block-curl | x86_64 | 6.2.0-91.ky3_5.kb1 |
qemu-block-iscsi | x86_64 | 6.2.0-91.ky3_5.kb1 |
qemu-guest-agent | x86_64 | 6.2.0-91.ky3_5.kb1 |
qemu-seabios | x86_64 | 6.2.0-91.ky3_5.kb1 |
qemu-system-riscv | x86_64 | 6.2.0-91.ky3_5.kb1 |
qemu-hw-usb-host | x86_64 | 6.2.0-91.ky3_5.kb1 |
qemu-img | x86_64 | 6.2.0-91.ky3_5.kb1 |
qemu-block-rbd | x86_64 | 6.2.0-91.ky3_5.kb1 |
qemu-system-x86_64 | x86_64 | 6.2.0-91.ky3_5.kb1 |
qemu | x86_64 | 6.2.0-91.ky3_5.kb1 |
qemu-block-curl | aarch64 | 6.2.0-91.ky3_5.kb1 |
qemu-block-ssh | aarch64 | 6.2.0-91.ky3_5.kb1 |
qemu-block-iscsi | aarch64 | 6.2.0-91.ky3_5.kb1 |
qemu-block-rbd | aarch64 | 6.2.0-91.ky3_5.kb1 |
qemu-system-riscv | aarch64 | 6.2.0-91.ky3_5.kb1 |
qemu-img | aarch64 | 6.2.0-91.ky3_5.kb1 |
qemu-system-aarch64 | aarch64 | 6.2.0-91.ky3_5.kb1 |
qemu-hw-usb-host | aarch64 | 6.2.0-91.ky3_5.kb1 |
qemu-system-arm | aarch64 | 6.2.0-91.ky3_5.kb1 |
qemu-guest-agent | aarch64 | 6.2.0-91.ky3_5.kb1 |
qemu | aarch64 | 6.2.0-91.ky3_5.kb1 |
qemu-system-x86_64 | aarch64 | 6.2.0-91.ky3_5.kb1 |
方法一:下载安装包进行升级安装
1、通过下载链接下载需要升级的升级包保存,如 xxx.rpm
2、通过rpm命令升级,如 rpm -Uvh xxx.rpm
方法二:通过软件源进行升级安装
1、保持能够连接上互联网
2、通过yum命令升级指定的包,如 yum install 包名