Type: | SECURITY |
Severity: | IMPORTANT |
Release Date: | 2015-07-27 |
[1.5.3-86.el7_1.5]
- kvm-i8254-fix-out-of-bounds-memory-access-in-pit_ioport_.patch [bz#1243726]
- Resolves: bz#1243726
(CVE-2015-3214 qemu-kvm: qemu: i8254: out-of-bounds memory access in pit_ioport_read function [rhel-7.1.z])
[1.5.3-86.el7_1.4]
- kvm-ide-Check-array-bounds-before-writing-to-io_buffer-C.patch [bz#1243689]
- kvm-ide-atapi-Fix-START-STOP-UNIT-command-completion.patch [bz#1243689]
- kvm-ide-Clear-DRQ-after-handling-all-expected-accesses.patch [bz#1243689]
- Resolves: bz#1243689
(EMBARGOED CVE-2015-5154 qemu-kvm: qemu: ide: atapi: heap overflow during I/O buffer memory access [rhel-7.1.z])
[1.5.3-86.el7_1.3]
- kvm-atomics-add-explicit-compiler-fence-in-__atomic-memo.patch [bz#1233643]
- Resolves: bz#1233643
([abrt] qemu-kvm: bdrv_error_action(): qemu-kvm killed by SIGABRT)
CVE-2015-3214 |
CVE-2015-5154 |
Release/Architecture | Filename | MD5sum | Superseded By Advisory |
Oracle Linux 7 (x86_64) | qemu-kvm-1.5.3-86.el7_1.5.src.rpm | b01e3ff87c722ebc920b8ea33768abc4 | ELBA-2021-9161 |
libcacard-1.5.3-86.el7_1.5.i686.rpm | 60948063fed68cdaff98e96d6b856ebf | ELEA-2020-1159 | |
libcacard-1.5.3-86.el7_1.5.x86_64.rpm | e7a5eac86fa73f19446694e8def4083e | ELEA-2020-1159 | |
libcacard-devel-1.5.3-86.el7_1.5.i686.rpm | 566ffa58f03605c839713fe1f5cb4305 | ELEA-2020-1159 | |
libcacard-devel-1.5.3-86.el7_1.5.x86_64.rpm | 3a169fad399cc1f186f71b334c21a7b2 | ELEA-2020-1159 | |
libcacard-tools-1.5.3-86.el7_1.5.x86_64.rpm | 33194d7f16a60f3445bef40e961a0384 | ELEA-2020-1159 | |
qemu-img-1.5.3-86.el7_1.5.x86_64.rpm | 6429b927f76192b92f2778dc55a8bc15 | ELBA-2021-9161 | |
qemu-kvm-1.5.3-86.el7_1.5.x86_64.rpm | fe20c9585710a3f110eae1a822f6af2a | ELBA-2021-9161 | |
qemu-kvm-common-1.5.3-86.el7_1.5.x86_64.rpm | 757034029ca1891529c7219dd1cdbf58 | ELSA-2021-0347 | |
qemu-kvm-tools-1.5.3-86.el7_1.5.x86_64.rpm | 7e6fa00a70ca9a38a1658754fdc68874 | ELSA-2021-0347 |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team