ELSA-2017-0396

ELSA-2017-0396 - qemu-kvm security and bug fix update

Type:SECURITY
Impact:IMPORTANT
Release Date:2017-03-02

Description


[1.5.3-126.el7_3.5]
- kvm-cirrus-fix-patterncopy-checks.patch [bz#1420490]
- kvm-Revert-cirrus-allow-zero-source-pitch-in-pattern-fil.patch [bz#1420490]
- kvm-cirrus-add-blit_is_unsafe-call-to-cirrus_bitblt_cput.patch [bz#1420490]
- Resolves: bz#1420490
(EMBARGOED CVE-2017-2620 qemu-kvm: Qemu: display: cirrus: potential arbitrary code execution via cirrus_bitblt_cputovideo [rhel-7.3.z])

[1.5.3-126.el7_3.4]
- kvm-virtio-blk-Release-s-rq-queue-at-system_reset.patch [bz#1420049]
- kvm-cirrus_vga-fix-off-by-one-in-blit_region_is_unsafe.patch [bz#1418232]
- kvm-display-cirrus-check-vga-bits-per-pixel-bpp-value.patch [bz#1418232]
- kvm-display-cirrus-ignore-source-pitch-value-as-needed-i.patch [bz#1418232]
- kvm-cirrus-handle-negative-pitch-in-cirrus_invalidate_re.patch [bz#1418232]
- kvm-cirrus-allow-zero-source-pitch-in-pattern-fill-rops.patch [bz#1418232]
- kvm-cirrus-fix-blit-address-mask-handling.patch [bz#1418232]
- kvm-cirrus-fix-oob-access-issue-CVE-2017-2615.patch [bz#1418232]
- Resolves: bz#1418232
(CVE-2017-2615 qemu-kvm: Qemu: display: cirrus: oob access while doing bitblt copy backward mode [rhel-7.3.z])
- Resolves: bz#1420049
(system_reset should clear pending request for error (virtio-blk))


Related CVEs


CVE-2017-2615
CVE-2017-2620

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 7 (x86_64) qemu-kvm-1.5.3-126.el7_3.5.src.rpm9e1cfe27285254432827bbf7887c7c73ec58a648cf147b260e0a4edf9d34253cELBA-2024-12732ol7_x86_64_latest_archive
qemu-kvm-1.5.3-126.el7_3.5.src.rpm9e1cfe27285254432827bbf7887c7c73ec58a648cf147b260e0a4edf9d34253cELBA-2024-12732ol7_x86_64_u3_patch
qemu-img-1.5.3-126.el7_3.5.x86_64.rpmc4a323b4eb7a1c5651350a5ba43178bb99ecbce0ff5fca71901458b7b2b866eaELBA-2024-12732ol7_x86_64_latest_archive
qemu-img-1.5.3-126.el7_3.5.x86_64.rpmc4a323b4eb7a1c5651350a5ba43178bb99ecbce0ff5fca71901458b7b2b866eaELBA-2024-12732ol7_x86_64_u3_patch
qemu-kvm-1.5.3-126.el7_3.5.x86_64.rpmf48e0f1b07b0ca93e8ab0a45066daa3cf409d21877618b9a84fe39b286a21a7bELBA-2024-12732ol7_x86_64_latest_archive
qemu-kvm-1.5.3-126.el7_3.5.x86_64.rpmf48e0f1b07b0ca93e8ab0a45066daa3cf409d21877618b9a84fe39b286a21a7bELBA-2024-12732ol7_x86_64_u3_patch
qemu-kvm-common-1.5.3-126.el7_3.5.x86_64.rpm9dc38dadba3c53d16130a95e349ac55dcf2289584e88078d04bd435c1773e6cbELBA-2022-4639ol7_x86_64_latest_archive
qemu-kvm-common-1.5.3-126.el7_3.5.x86_64.rpm9dc38dadba3c53d16130a95e349ac55dcf2289584e88078d04bd435c1773e6cbELBA-2022-4639ol7_x86_64_u3_patch
qemu-kvm-tools-1.5.3-126.el7_3.5.x86_64.rpmcad08f5f7cb169be95a4663eff06939ac171a2fa2d0f0330ae4ea8db4993ca27ELBA-2022-4639ol7_x86_64_latest_archive
qemu-kvm-tools-1.5.3-126.el7_3.5.x86_64.rpmcad08f5f7cb169be95a4663eff06939ac171a2fa2d0f0330ae4ea8db4993ca27ELBA-2022-4639ol7_x86_64_u3_patch



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete