ELSA-2017-0309

ELSA-2017-0309 - qemu-kvm security and bug fix update

Type:SECURITY
Impact:IMPORTANT
Release Date:2017-02-23

Description


[0.12.1.2-2.491.el6_8.6]
- kvm-cirrus_vga-fix-division-by-0-for-color-expansion-rop.patch [bz#1418230 bz#1419416]
- kvm-cirrus_vga-fix-off-by-one-in-blit_region_is_unsafe.patch [bz#1418230 bz#1419416]
- kvm-display-cirrus-check-vga-bits-per-pixel-bpp-value.patch [bz#1418230 bz#1419416]
- kvm-display-cirrus-ignore-source-pitch-value-as-needed-i.patch [bz#1418230 bz#1419416]
- kvm-cirrus-handle-negative-pitch-in-cirrus_invalidate_re.patch [bz#1418230 bz#1419416]
- kvm-cirrus-allow-zero-source-pitch-in-pattern-fill-rops.patch [bz#1418230 bz#1419416]
- kvm-cirrus-fix-blit-address-mask-handling.patch [bz#1418230 bz#1419416]
- kvm-cirrus-fix-oob-access-issue-CVE-2017-2615.patch [bz#1418230 bz#1419416]
- Resolves: bz#1418230
(CVE-2017-2615 qemu-kvm: Qemu: display: cirrus: oob access while doing bitblt copy backward mode [rhel-6.8.z])
- Resolves: bz#1419416
(CVE-2017-2615 qemu-kvm-rhev: Qemu: display: cirrus: oob access while doing bitblt copy backward mode [rhel-6.8.z])

[0.12.1.2-2.491.el6_8.5]
- kvm-net-check-packet-payload-length.patch [bz#1398213]
- Resolves: bz#1398213
(CVE-2016-2857 qemu-kvm: Qemu: net: out of bounds read in net_checksum_calculate() [rhel-6.8.z])

[0.12.1.2-2.491.el6.4]
- kvm-virtio-introduce-virtqueue_unmap_sg.patch [bz#1408389]
- kvm-virtio-introduce-virtqueue_discard.patch [bz#1408389]
- kvm-virtio-decrement-vq-inuse-in-virtqueue_discard.patch [bz#1408389]
- kvm-balloon-fix-segfault-and-harden-the-stats-queue.patch [bz#1408389]
- kvm-virtio-balloon-discard-virtqueue-element-on-reset.patch [bz#1408389]
- kvm-virtio-zero-vq-inuse-in-virtio_reset.patch [bz#1408389]
- Resolves: bz#1408389
([RHEL6.8.z] KVM guest shuts itself down after 128th reboot)


Related CVEs


CVE-2017-2615
CVE-2016-2857

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 6 (i386) qemu-kvm-0.12.1.2-2.491.el6_8.6.src.rpmddf6645fdd507c42c21b204cc4eec98211728a3d2db3d4e2060716d8a279b561ELSA-2020-4056ol6_i386_latest_archive
qemu-kvm-0.12.1.2-2.491.el6_8.6.src.rpmddf6645fdd507c42c21b204cc4eec98211728a3d2db3d4e2060716d8a279b561ELSA-2020-4056ol6_u8_i386_patch
qemu-guest-agent-0.12.1.2-2.491.el6_8.6.i686.rpmf1680b37b544e4af46aa0009c5bc880a99ef2cf9ecb4c2a1516f60a2ad884aeaELSA-2020-4056ol6_i386_latest_archive
qemu-guest-agent-0.12.1.2-2.491.el6_8.6.i686.rpmf1680b37b544e4af46aa0009c5bc880a99ef2cf9ecb4c2a1516f60a2ad884aeaELSA-2020-4056ol6_u8_i386_patch
Oracle Linux 6 (x86_64) qemu-kvm-0.12.1.2-2.491.el6_8.6.src.rpmddf6645fdd507c42c21b204cc4eec98211728a3d2db3d4e2060716d8a279b561ELSA-2020-4056ol6_u8_x86_64_patch
qemu-kvm-0.12.1.2-2.491.el6_8.6.src.rpmddf6645fdd507c42c21b204cc4eec98211728a3d2db3d4e2060716d8a279b561ELSA-2020-4056ol6_x86_64_latest_archive
qemu-guest-agent-0.12.1.2-2.491.el6_8.6.x86_64.rpm5a027061ea488798fbda83eb6ab19da3c3069b194b14fd8beb4c2bae11896543ELSA-2020-4056ol6_u8_x86_64_patch
qemu-guest-agent-0.12.1.2-2.491.el6_8.6.x86_64.rpm5a027061ea488798fbda83eb6ab19da3c3069b194b14fd8beb4c2bae11896543ELSA-2020-4056ol6_x86_64_latest_archive
qemu-img-0.12.1.2-2.491.el6_8.6.x86_64.rpmc5a34857ed2c5b055ced950c6b247bb2cf5633f836a1f02e143a901f57e3e7e9ELSA-2020-4056ol6_u8_x86_64_patch
qemu-img-0.12.1.2-2.491.el6_8.6.x86_64.rpmc5a34857ed2c5b055ced950c6b247bb2cf5633f836a1f02e143a901f57e3e7e9ELSA-2020-4056ol6_x86_64_latest_archive
qemu-kvm-0.12.1.2-2.491.el6_8.6.x86_64.rpm52acdb49611ab21ed37cb8fb1fc0270f4214fc2095302f6e8cde6359aa73468aELSA-2020-4056ol6_u8_x86_64_patch
qemu-kvm-0.12.1.2-2.491.el6_8.6.x86_64.rpm52acdb49611ab21ed37cb8fb1fc0270f4214fc2095302f6e8cde6359aa73468aELSA-2020-4056ol6_x86_64_latest_archive
qemu-kvm-tools-0.12.1.2-2.491.el6_8.6.x86_64.rpmf67ed87a7a94beab078b2509cccaf53c8849c687a498805c523f15c7846ac507ELSA-2020-4056ol6_u8_x86_64_patch
qemu-kvm-tools-0.12.1.2-2.491.el6_8.6.x86_64.rpmf67ed87a7a94beab078b2509cccaf53c8849c687a498805c523f15c7846ac507ELSA-2020-4056ol6_x86_64_latest_archive



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete