ELSA-2017-0396 - qemu-kvm security and bug fix update
Type: | SECURITY |
Severity: | IMPORTANT |
Release Date: | 2017-03-02 |
Description
[1.5.3-126.el7_3.5]
- kvm-cirrus-fix-patterncopy-checks.patch [bz#1420490]
- kvm-Revert-cirrus-allow-zero-source-pitch-in-pattern-fil.patch [bz#1420490]
- kvm-cirrus-add-blit_is_unsafe-call-to-cirrus_bitblt_cput.patch [bz#1420490]
- Resolves: bz#1420490
(EMBARGOED CVE-2017-2620 qemu-kvm: Qemu: display: cirrus: potential arbitrary code execution via cirrus_bitblt_cputovideo [rhel-7.3.z])
[1.5.3-126.el7_3.4]
- kvm-virtio-blk-Release-s-rq-queue-at-system_reset.patch [bz#1420049]
- kvm-cirrus_vga-fix-off-by-one-in-blit_region_is_unsafe.patch [bz#1418232]
- kvm-display-cirrus-check-vga-bits-per-pixel-bpp-value.patch [bz#1418232]
- kvm-display-cirrus-ignore-source-pitch-value-as-needed-i.patch [bz#1418232]
- kvm-cirrus-handle-negative-pitch-in-cirrus_invalidate_re.patch [bz#1418232]
- kvm-cirrus-allow-zero-source-pitch-in-pattern-fill-rops.patch [bz#1418232]
- kvm-cirrus-fix-blit-address-mask-handling.patch [bz#1418232]
- kvm-cirrus-fix-oob-access-issue-CVE-2017-2615.patch [bz#1418232]
- Resolves: bz#1418232
(CVE-2017-2615 qemu-kvm: Qemu: display: cirrus: oob access while doing bitblt copy backward mode [rhel-7.3.z])
- Resolves: bz#1420049
(system_reset should clear pending request for error (virtio-blk))
Related CVEs
Updated Packages
Release/Architecture | Filename | MD5sum | Superseded By Advisory |
|
Oracle Linux 7 (x86_64) | qemu-kvm-1.5.3-126.el7_3.5.src.rpm | 9f6f36f1cf2fc052138f203b204f6787 | ELBA-2021-9161 |
| qemu-img-1.5.3-126.el7_3.5.x86_64.rpm | 936ea0a91e713a08e0a1005277181470 | ELBA-2021-9161 |
| qemu-kvm-1.5.3-126.el7_3.5.x86_64.rpm | e23b3184fef1740a7b145f992fc7314a | ELBA-2021-9161 |
| qemu-kvm-common-1.5.3-126.el7_3.5.x86_64.rpm | 87544d60064375be38154e861851c1ab | ELSA-2021-0347 |
| qemu-kvm-tools-1.5.3-126.el7_3.5.x86_64.rpm | 1fbe8a561dbbb1716847f5d5ce2db0ba | ELSA-2021-0347 |
This page is generated automatically and has not been checked for errors or omissions. For clarification
or corrections please contact the Oracle Linux ULN team