Type: | SECURITY |
Severity: | MODERATE |
Release Date: | 2015-09-15 |
[1.5.3-86.el7_1.6]
- kvm-rtl8139-avoid-nested-ifs-in-IP-header-parsing-CVE-20.patch [bz#1248764]
- kvm-rtl8139-drop-tautologous-if-ip-.-statement-CVE-2015-.patch [bz#1248764]
- kvm-rtl8139-skip-offload-on-short-Ethernet-IP-header-CVE.patch [bz#1248764]
- kvm-rtl8139-check-IP-Header-Length-field-CVE-2015-5165.patch [bz#1248764]
- kvm-rtl8139-check-IP-Total-Length-field-CVE-2015-5165.patch [bz#1248764]
- kvm-rtl8139-skip-offload-on-short-TCP-header-CVE-2015-51.patch [bz#1248764]
- kvm-rtl8139-check-TCP-Data-Offset-field-CVE-2015-5165.patch [bz#1248764]
- Resolves: bz#1248764
(CVE-2015-5165 qemu-kvm: Qemu: rtl8139 uninitialized heap memory information leakage to guest [rhel-7.1.z])
CVE-2015-5165 |
Release/Architecture | Filename | MD5sum | Superseded By Advisory |
Oracle Linux 7 (x86_64) | qemu-kvm-1.5.3-86.el7_1.6.src.rpm | 69408d577e87fffda0368d94b68e7067 | ELBA-2021-9161 |
libcacard-1.5.3-86.el7_1.6.i686.rpm | 25cd871a3816f809ed08391e01458d72 | ELEA-2020-1159 | |
libcacard-1.5.3-86.el7_1.6.x86_64.rpm | 8d380304a06bad5043c55a62d754a9f2 | ELEA-2020-1159 | |
libcacard-devel-1.5.3-86.el7_1.6.i686.rpm | 86e3f3483ba86ccc76435cf42ea795df | ELEA-2020-1159 | |
libcacard-devel-1.5.3-86.el7_1.6.x86_64.rpm | 6ca1b7f84294abfcdcae6dfe058dc2e8 | ELEA-2020-1159 | |
libcacard-tools-1.5.3-86.el7_1.6.x86_64.rpm | f30770b8a5d249faa0ec178c775fe501 | ELEA-2020-1159 | |
qemu-img-1.5.3-86.el7_1.6.x86_64.rpm | e92688590b197d363fe107ff98bdd770 | ELBA-2021-9161 | |
qemu-kvm-1.5.3-86.el7_1.6.x86_64.rpm | 85b16599ed445ad193d1d6e94f3fc668 | ELBA-2021-9161 | |
qemu-kvm-common-1.5.3-86.el7_1.6.x86_64.rpm | 6b6c81b6eeb988fdb486ffe156a62b04 | ELSA-2021-0347 | |
qemu-kvm-tools-1.5.3-86.el7_1.6.x86_64.rpm | 9c86e934e47dd1ddda54a5a082ac0dcb | ELSA-2021-0347 |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team