An update for qemu is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3 and openEuler-22.03-LTS Security Advisory openeuler-security@openeuler.org openEuler security committee openEuler-SA-2022-1679 Final 1.0 1.0 2022-05-28 Initial 2022-05-28 2022-05-28 openEuler SA Tool V1.0 2022-05-28 qemu security update An update for qemu is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3 and openEuler-22.03-LTS. QEMU is a FAST! processor emulator using dynamic translation to achieve good emulation speed. Security Fix(es): A DMA reentrancy issue was found in the USB EHCI controller emulation of QEMU. EHCI does not verify if the Buffer Pointer overlaps with its MMIO region when it transfers the USB packets. Crafted content may be written to the controller's registers and trigger undesirable actions (such as reset) while the device is still transferring packets. This can ultimately lead to a use-after-free issue. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition, or potentially execute arbitrary code within the context of the QEMU process on the host. This flaw affects QEMU versions before 7.0.0.(CVE-2021-3750) An update for qemu is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3 and openEuler-22.03-LTS. openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section. High qemu https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1679 https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2021-3750 https://nvd.nist.gov/vuln/detail/CVE-2021-3750 openEuler-20.03-LTS-SP1 openEuler-20.03-LTS-SP3 openEuler-22.03-LTS qemu-block-rbd-4.1.0-64.oe1.aarch64.rpm qemu-block-iscsi-4.1.0-64.oe1.aarch64.rpm qemu-guest-agent-4.1.0-64.oe1.aarch64.rpm qemu-debugsource-4.1.0-64.oe1.aarch64.rpm qemu-block-curl-4.1.0-64.oe1.aarch64.rpm qemu-4.1.0-64.oe1.aarch64.rpm qemu-debuginfo-4.1.0-64.oe1.aarch64.rpm qemu-block-ssh-4.1.0-64.oe1.aarch64.rpm qemu-img-4.1.0-64.oe1.aarch64.rpm qemu-debugsource-4.1.0-68.oe1.aarch64.rpm qemu-block-iscsi-4.1.0-68.oe1.aarch64.rpm qemu-block-ssh-4.1.0-68.oe1.aarch64.rpm qemu-debuginfo-4.1.0-68.oe1.aarch64.rpm qemu-img-4.1.0-68.oe1.aarch64.rpm qemu-4.1.0-68.oe1.aarch64.rpm qemu-guest-agent-4.1.0-68.oe1.aarch64.rpm qemu-block-rbd-4.1.0-68.oe1.aarch64.rpm qemu-block-curl-4.1.0-68.oe1.aarch64.rpm qemu-img-6.2.0-35.oe2203.aarch64.rpm qemu-block-ssh-6.2.0-35.oe2203.aarch64.rpm qemu-6.2.0-35.oe2203.aarch64.rpm qemu-debuginfo-6.2.0-35.oe2203.aarch64.rpm qemu-hw-usb-host-6.2.0-35.oe2203.aarch64.rpm qemu-block-iscsi-6.2.0-35.oe2203.aarch64.rpm qemu-block-curl-6.2.0-35.oe2203.aarch64.rpm qemu-guest-agent-6.2.0-35.oe2203.aarch64.rpm qemu-block-rbd-6.2.0-35.oe2203.aarch64.rpm qemu-debugsource-6.2.0-35.oe2203.aarch64.rpm qemu-help-4.1.0-64.oe1.noarch.rpm qemu-help-4.1.0-68.oe1.noarch.rpm qemu-help-6.2.0-35.oe2203.noarch.rpm qemu-4.1.0-64.oe1.src.rpm qemu-4.1.0-68.oe1.src.rpm qemu-6.2.0-35.oe2203.src.rpm qemu-img-4.1.0-64.oe1.x86_64.rpm qemu-debuginfo-4.1.0-64.oe1.x86_64.rpm qemu-block-iscsi-4.1.0-64.oe1.x86_64.rpm qemu-debugsource-4.1.0-64.oe1.x86_64.rpm qemu-guest-agent-4.1.0-64.oe1.x86_64.rpm qemu-block-curl-4.1.0-64.oe1.x86_64.rpm qemu-4.1.0-64.oe1.x86_64.rpm qemu-seabios-4.1.0-64.oe1.x86_64.rpm qemu-block-rbd-4.1.0-64.oe1.x86_64.rpm qemu-block-ssh-4.1.0-64.oe1.x86_64.rpm qemu-seabios-4.1.0-68.oe1.x86_64.rpm qemu-img-4.1.0-68.oe1.x86_64.rpm qemu-debuginfo-4.1.0-68.oe1.x86_64.rpm qemu-guest-agent-4.1.0-68.oe1.x86_64.rpm qemu-debugsource-4.1.0-68.oe1.x86_64.rpm qemu-block-ssh-4.1.0-68.oe1.x86_64.rpm qemu-block-rbd-4.1.0-68.oe1.x86_64.rpm qemu-4.1.0-68.oe1.x86_64.rpm qemu-block-iscsi-4.1.0-68.oe1.x86_64.rpm qemu-block-curl-4.1.0-68.oe1.x86_64.rpm qemu-img-6.2.0-35.oe2203.x86_64.rpm qemu-block-ssh-6.2.0-35.oe2203.x86_64.rpm qemu-6.2.0-35.oe2203.x86_64.rpm qemu-debuginfo-6.2.0-35.oe2203.x86_64.rpm qemu-hw-usb-host-6.2.0-35.oe2203.x86_64.rpm qemu-block-iscsi-6.2.0-35.oe2203.x86_64.rpm qemu-block-curl-6.2.0-35.oe2203.x86_64.rpm qemu-guest-agent-6.2.0-35.oe2203.x86_64.rpm qemu-block-rbd-6.2.0-35.oe2203.x86_64.rpm qemu-debugsource-6.2.0-35.oe2203.x86_64.rpm qemu-seabios-6.2.0-35.oe2203.x86_64.rpm A DMA reentrancy issue was found in the USB EHCI controller emulation of QEMU. EHCI does not verify if the Buffer Pointer overlaps with its MMIO region when it transfers the USB packets. Crafted content may be written to the controller s registers and trigger undesirable actions (such as reset) while the device is still transferring packets. This can ultimately lead to a use-after-free issue. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition, or potentially execute arbitrary code within the context of the QEMU process on the host. This flaw affects QEMU versions before 7.0.0. 2022-05-28 CVE-2021-3750 openEuler-20.03-LTS-SP1 openEuler-20.03-LTS-SP3 openEuler-22.03-LTS High 8.2 AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H qemu security update 2022-05-28 https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1679