ELSA-2017-0083 - qemu-kvm security and bug fix update
Type: | SECURITY |
Severity: | LOW |
Release Date: | 2017-01-17 |
Description
[1.5.3-126.el7_3.3]
- kvm-net-check-packet-payload-length.patch [bz#1398217]
- Resolves: bz#1398217
(CVE-2016-2857 qemu-kvm: Qemu: net: out of bounds read in net_checksum_calculate() [rhel-7.3.z])
[1.5.3-126.el7_3.2]
- kvm-virtio-introduce-virtqueue_unmap_sg.patch [bz#1393484]
- kvm-virtio-introduce-virtqueue_discard.patch [bz#1393484]
- kvm-virtio-decrement-vq-inuse-in-virtqueue_discard.patch [bz#1393484]
- kvm-balloon-fix-segfault-and-harden-the-stats-queue.patch [bz#1393484]
- kvm-virtio-balloon-discard-virtqueue-element-on-reset.patch [bz#1393484]
- kvm-virtio-zero-vq-inuse-in-virtio_reset.patch [bz#1393484]
- kvm-virtio-add-virtqueue_rewind.patch [bz#1393484]
- kvm-virtio-balloon-fix-stats-vq-migration.patch [bz#1393484]
- Resolves: bz#1393484
([RHEL7.3] KVM guest shuts itself down after 128th reboot)
[1.5.3-126.el7_3.1]
- kvm-ide-fix-halted-IO-segfault-at-reset.patch [bz#1393042]
- kvm-hw-i386-regenerate-checked-in-AML-payload-RHEL-only.patch [bz#1392027]
- kvm-SPEC-file-flip-the-build-from-IASL-to-checked-in-AML.patch [bz#1392027]
- Resolves: bz#1392027
(shutdown rhel 5.11 guest failed and stop at 'system halted')
- Resolves: bz#1393042
(system_reset should clear pending request for error (IDE))
Related CVEs
Updated Packages
Release/Architecture | Filename | MD5sum | Superseded By Advisory |
|
Oracle Linux 7 (x86_64) | qemu-kvm-1.5.3-126.el7_3.3.src.rpm | 32cd6b57e5f4dff41150a0cca68fd157 | ELBA-2021-9161 |
| qemu-img-1.5.3-126.el7_3.3.x86_64.rpm | 540dc5ccca3b4b54b1c70e766c70fef7 | ELBA-2021-9161 |
| qemu-kvm-1.5.3-126.el7_3.3.x86_64.rpm | 2e3bcc82306cdb16a421ecfa407fd56d | ELBA-2021-9161 |
| qemu-kvm-common-1.5.3-126.el7_3.3.x86_64.rpm | 69a304814203a89e256f4bf0e9531de7 | ELSA-2021-0347 |
| qemu-kvm-tools-1.5.3-126.el7_3.3.x86_64.rpm | 080fffc4f0f16c4621c3087131d24414 | ELSA-2021-0347 |
This page is generated automatically and has not been checked for errors or omissions. For clarification
or corrections please contact the Oracle Linux ULN team