Type: | SECURITY |
Impact: | IMPORTANT |
Release Date: | 2017-03-02 |
[1.5.3-126.el7_3.5]
- kvm-cirrus-fix-patterncopy-checks.patch [bz#1420490]
- kvm-Revert-cirrus-allow-zero-source-pitch-in-pattern-fil.patch [bz#1420490]
- kvm-cirrus-add-blit_is_unsafe-call-to-cirrus_bitblt_cput.patch [bz#1420490]
- Resolves: bz#1420490
(EMBARGOED CVE-2017-2620 qemu-kvm: Qemu: display: cirrus: potential arbitrary code execution via cirrus_bitblt_cputovideo [rhel-7.3.z])
[1.5.3-126.el7_3.4]
- kvm-virtio-blk-Release-s-rq-queue-at-system_reset.patch [bz#1420049]
- kvm-cirrus_vga-fix-off-by-one-in-blit_region_is_unsafe.patch [bz#1418232]
- kvm-display-cirrus-check-vga-bits-per-pixel-bpp-value.patch [bz#1418232]
- kvm-display-cirrus-ignore-source-pitch-value-as-needed-i.patch [bz#1418232]
- kvm-cirrus-handle-negative-pitch-in-cirrus_invalidate_re.patch [bz#1418232]
- kvm-cirrus-allow-zero-source-pitch-in-pattern-fill-rops.patch [bz#1418232]
- kvm-cirrus-fix-blit-address-mask-handling.patch [bz#1418232]
- kvm-cirrus-fix-oob-access-issue-CVE-2017-2615.patch [bz#1418232]
- Resolves: bz#1418232
(CVE-2017-2615 qemu-kvm: Qemu: display: cirrus: oob access while doing bitblt copy backward mode [rhel-7.3.z])
- Resolves: bz#1420049
(system_reset should clear pending request for error (virtio-blk))
CVE-2017-2615 |
CVE-2017-2620 |
Release/Architecture | Filename | sha256 | Superseded By Advisory | Channel Label |
Oracle Linux 7 (x86_64) | qemu-kvm-1.5.3-126.el7_3.5.src.rpm | 9e1cfe27285254432827bbf7887c7c73ec58a648cf147b260e0a4edf9d34253c | ELBA-2024-12732 | ol7_x86_64_latest_archive |
qemu-kvm-1.5.3-126.el7_3.5.src.rpm | 9e1cfe27285254432827bbf7887c7c73ec58a648cf147b260e0a4edf9d34253c | ELBA-2024-12732 | ol7_x86_64_u3_patch | |
qemu-img-1.5.3-126.el7_3.5.x86_64.rpm | c4a323b4eb7a1c5651350a5ba43178bb99ecbce0ff5fca71901458b7b2b866ea | ELBA-2024-12732 | ol7_x86_64_latest_archive | |
qemu-img-1.5.3-126.el7_3.5.x86_64.rpm | c4a323b4eb7a1c5651350a5ba43178bb99ecbce0ff5fca71901458b7b2b866ea | ELBA-2024-12732 | ol7_x86_64_u3_patch | |
qemu-kvm-1.5.3-126.el7_3.5.x86_64.rpm | f48e0f1b07b0ca93e8ab0a45066daa3cf409d21877618b9a84fe39b286a21a7b | ELBA-2024-12732 | ol7_x86_64_latest_archive | |
qemu-kvm-1.5.3-126.el7_3.5.x86_64.rpm | f48e0f1b07b0ca93e8ab0a45066daa3cf409d21877618b9a84fe39b286a21a7b | ELBA-2024-12732 | ol7_x86_64_u3_patch | |
qemu-kvm-common-1.5.3-126.el7_3.5.x86_64.rpm | 9dc38dadba3c53d16130a95e349ac55dcf2289584e88078d04bd435c1773e6cb | ELBA-2022-4639 | ol7_x86_64_latest_archive | |
qemu-kvm-common-1.5.3-126.el7_3.5.x86_64.rpm | 9dc38dadba3c53d16130a95e349ac55dcf2289584e88078d04bd435c1773e6cb | ELBA-2022-4639 | ol7_x86_64_u3_patch | |
qemu-kvm-tools-1.5.3-126.el7_3.5.x86_64.rpm | cad08f5f7cb169be95a4663eff06939ac171a2fa2d0f0330ae4ea8db4993ca27 | ELBA-2022-4639 | ol7_x86_64_latest_archive | |
qemu-kvm-tools-1.5.3-126.el7_3.5.x86_64.rpm | cad08f5f7cb169be95a4663eff06939ac171a2fa2d0f0330ae4ea8db4993ca27 | ELBA-2022-4639 | ol7_x86_64_u3_patch |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team