ELSA-2022-9432

ELSA-2022-9432 - qemu security update

Type:SECURITY
Severity:IMPORTANT
Release Date:2022-05-26

Description


[15:4.2.1-17.el7]
- arm/acpi: fix an out of spec _UID for PCI root (Michael S. Tsirkin)
- arm/acpi: fix duplicated _UID of PCI interrupt link devices (Heyi Guo)
- arm/acpi: fix PCI _PRT definition (Heyi Guo)
- docs: fix references to docs/devel/atomics.rst (Stefano Garzarella) [Orabug: 33659123]
- rcu: do not mention atomic_mb_read/set in documentation (Paolo Bonzini) [Orabug: 33659123]
- atomics: update documentation (Paolo Bonzini) [Orabug: 33659123]
- atomics: convert to reStructuredText (Paolo Bonzini) [Orabug: 33659123]
- async: use explicit memory barriers (Paolo Bonzini) [Orabug: 33659123]
- aio-wait: delegate polling of main AioContext if BQL not held (Paolo Bonzini) [Orabug: 33659123]
- qapi: Add '@allow-write-only-overlay' feature for 'blockdev-snapshot' (Peter Krempa) [Orabug: 33888021]
- iotests: Add iothread cases to 155 (Kevin Wolf) [Orabug: 33888021]
- block: Fix cross-AioContext blockdev-snapshot (Kevin Wolf) [Orabug: 33888021]
- iotests: Test mirror with temporarily disabled target backing file (Kevin Wolf) [Orabug: 33888021]
- iotests: Fix run_job() with use_log=False (Kevin Wolf) [Orabug: 33888021]
- block: Relax restrictions for blockdev-snapshot (Kevin Wolf) [Orabug: 33888021]
- block: Make bdrv_get_cumulative_perm() public (Kevin Wolf) [Orabug: 33888021]
- iotests: Use complete_and_wait() in 155 (Max Reitz) [Orabug: 33888021]
- iotests: Support job-complete in run_job() (Kevin Wolf) [Orabug: 33888021]
- linux-headers: update again to 5.8 (Paolo Bonzini) [Orabug: 34022218]
- virtio-net: fix map leaking on error during receive (Jason Wang) [Orabug: 33941879] {CVE-2022-26353}
- vhost-vsock: detach the virqueue element in case of error (Stefano Garzarella) [Orabug: 33941844] {CVE-2022-26354}
- virtio-net: fix use after unmap/free for sg (Jason Wang) [Orabug: 33972912] {CVE-2021-3748}
- migration: Report the error returned when save_live_iterate fails (David Edmondson)


Related CVEs


CVE-2021-3748
CVE-2022-26353
CVE-2022-26354

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 7 (aarch64) qemu-4.2.1-17.el7.src.rpmaa72c3025c5a54da7bf50f027970077c-
ivshmem-tools-4.2.1-17.el7.aarch64.rpm329c36dabb6b4a906bcb79fef367be42-
qemu-4.2.1-17.el7.aarch64.rpm54f47aa3912f88b2cf37e7364260733f-
qemu-block-gluster-4.2.1-17.el7.aarch64.rpm6d7847f5ac764e68ab9542492e614fdb-
qemu-block-iscsi-4.2.1-17.el7.aarch64.rpm5142d2a504b851e0a503265641a2d7e8-
qemu-block-rbd-4.2.1-17.el7.aarch64.rpme2e2e8c18247dfd1606e2e0f0c6ef654-
qemu-common-4.2.1-17.el7.aarch64.rpme73938d78c113bcbe18c1f03f706f971-
qemu-img-4.2.1-17.el7.aarch64.rpm6a4c97fd657815cbbf1c143c98da9710-
qemu-kvm-4.2.1-17.el7.aarch64.rpmc1cde0d7964efc1d8a67e5280d5e87c4-
qemu-kvm-core-4.2.1-17.el7.aarch64.rpmd766d63844de080cd2858c1000054b1e-
qemu-system-aarch64-4.2.1-17.el7.aarch64.rpmdda488ee80efe1600160bed8d0f5034d-
qemu-system-aarch64-core-4.2.1-17.el7.aarch64.rpmbe0e58381dde35acfed5edbba7202b59-
Oracle Linux 7 (x86_64) qemu-4.2.1-17.el7.src.rpmaa72c3025c5a54da7bf50f027970077c-
qemu-4.2.1-17.el7.x86_64.rpm51218935b9b0fd1fe9f0e6d81b18e9bd-
qemu-block-gluster-4.2.1-17.el7.x86_64.rpm352079cfea9e774650ab76eb492adc2f-
qemu-block-iscsi-4.2.1-17.el7.x86_64.rpmaeffe1edf03fd7b732a5eada84b9b9d2-
qemu-block-rbd-4.2.1-17.el7.x86_64.rpm0f44d7c17c5ae832c45e72245ea4ff18-
qemu-common-4.2.1-17.el7.x86_64.rpmc27d689f1b0602a3e9eddf2caab55278-
qemu-img-4.2.1-17.el7.x86_64.rpmf8427cb4423f616d3cb8e779cd6ed222-
qemu-kvm-4.2.1-17.el7.x86_64.rpmf3e16959b1cb3e0f51f8b60928566f6f-
qemu-kvm-core-4.2.1-17.el7.x86_64.rpm264251079c377a47fb40deb149eb626b-
qemu-system-x86-4.2.1-17.el7.x86_64.rpm73ba089fed738b36991d1aefab8a0c35-
qemu-system-x86-core-4.2.1-17.el7.x86_64.rpmd298d481d2353f5d714d74f7c9cd4db6-



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete