OESA-2022-1690

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2022-1690
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2022-1690.json
JSON Data
https://api.test.osv.dev/v1/vulns/OESA-2022-1690
Upstream
Published
2022-06-02T11:03:50Z
Modified
2025-08-12T05:05:07.453664Z
Summary
qemu security update
Details

QEMU is a FAST! processor emulator using dynamic translation to achieve good emulation speed.

Security Fix(es):

sdwpaddr in hw/sd/sd.c in QEMU 4.2.0 uses an unvalidated address, which leads to an out-of-bounds read during sdhci_write() operations. A guest OS user can crash the QEMU process.(CVE-2020-13253)

An infinite loop flaw was found in the e1000 NIC emulator of the QEMU. This issue occurs while processing transmits (tx) descriptors in processtxdesc if various descriptor fields are initialized with invalid values. This flaw allows a guest to consume CPU cycles on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.(CVE-2021-20257)

Database specific
{
    "severity": "Medium"
}
References

Affected packages

openEuler:20.03-LTS-SP1 / qemu

Package

Name
qemu
Purl
pkg:rpm/openEuler/qemu&distro=openEuler-20.03-LTS-SP1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.1.0-65.oe1

Ecosystem specific

{
    "src": [
        "qemu-4.1.0-65.oe1.src.rpm"
    ],
    "x86_64": [
        "qemu-block-rbd-4.1.0-65.oe1.x86_64.rpm",
        "qemu-4.1.0-65.oe1.x86_64.rpm",
        "qemu-seabios-4.1.0-65.oe1.x86_64.rpm",
        "qemu-block-iscsi-4.1.0-65.oe1.x86_64.rpm",
        "qemu-block-curl-4.1.0-65.oe1.x86_64.rpm",
        "qemu-guest-agent-4.1.0-65.oe1.x86_64.rpm",
        "qemu-debugsource-4.1.0-65.oe1.x86_64.rpm",
        "qemu-block-ssh-4.1.0-65.oe1.x86_64.rpm",
        "qemu-img-4.1.0-65.oe1.x86_64.rpm",
        "qemu-debuginfo-4.1.0-65.oe1.x86_64.rpm"
    ],
    "aarch64": [
        "qemu-debugsource-4.1.0-65.oe1.aarch64.rpm",
        "qemu-block-rbd-4.1.0-65.oe1.aarch64.rpm",
        "qemu-guest-agent-4.1.0-65.oe1.aarch64.rpm",
        "qemu-img-4.1.0-65.oe1.aarch64.rpm",
        "qemu-block-iscsi-4.1.0-65.oe1.aarch64.rpm",
        "qemu-block-curl-4.1.0-65.oe1.aarch64.rpm",
        "qemu-block-ssh-4.1.0-65.oe1.aarch64.rpm",
        "qemu-debuginfo-4.1.0-65.oe1.aarch64.rpm",
        "qemu-4.1.0-65.oe1.aarch64.rpm"
    ],
    "noarch": [
        "qemu-help-4.1.0-65.oe1.noarch.rpm"
    ]
}

openEuler:20.03-LTS-SP3 / qemu

Package

Name
qemu
Purl
pkg:rpm/openEuler/qemu&distro=openEuler-20.03-LTS-SP3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.1.0-69.oe1

Ecosystem specific

{
    "src": [
        "qemu-4.1.0-69.oe1.src.rpm"
    ],
    "x86_64": [
        "qemu-block-ssh-4.1.0-69.oe1.x86_64.rpm",
        "qemu-guest-agent-4.1.0-69.oe1.x86_64.rpm",
        "qemu-seabios-4.1.0-69.oe1.x86_64.rpm",
        "qemu-debuginfo-4.1.0-69.oe1.x86_64.rpm",
        "qemu-block-iscsi-4.1.0-69.oe1.x86_64.rpm",
        "qemu-4.1.0-69.oe1.x86_64.rpm",
        "qemu-img-4.1.0-69.oe1.x86_64.rpm",
        "qemu-debugsource-4.1.0-69.oe1.x86_64.rpm",
        "qemu-block-curl-4.1.0-69.oe1.x86_64.rpm",
        "qemu-block-rbd-4.1.0-69.oe1.x86_64.rpm"
    ],
    "aarch64": [
        "qemu-guest-agent-4.1.0-69.oe1.aarch64.rpm",
        "qemu-block-rbd-4.1.0-69.oe1.aarch64.rpm",
        "qemu-block-curl-4.1.0-69.oe1.aarch64.rpm",
        "qemu-debuginfo-4.1.0-69.oe1.aarch64.rpm",
        "qemu-block-iscsi-4.1.0-69.oe1.aarch64.rpm",
        "qemu-img-4.1.0-69.oe1.aarch64.rpm",
        "qemu-4.1.0-69.oe1.aarch64.rpm",
        "qemu-block-ssh-4.1.0-69.oe1.aarch64.rpm",
        "qemu-debugsource-4.1.0-69.oe1.aarch64.rpm"
    ],
    "noarch": [
        "qemu-help-4.1.0-69.oe1.noarch.rpm"
    ]
}