ELSA-2017-0454

ELSA-2017-0454 - kvm security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2017-03-07

Description


[83-277.0.1.el5_11]
- Added kvm-add-oracle-workaround-for-libvirt-bug.patch
- Added kvm-Introduce-oel-machine-type.patch

[83-277.el5_11]
- kvm-Fix-hardware-accelerated-video-to-video-copy-on-Cirr.patch [bz#1421564]
- kvm-cirrus_vga-fix-division-by-0-for-color-expansion-rop.patch [bz#1421564]
- kvm-cirrus-fix-blit-region-check.patch [bz#1421564]
- kvm-cirrus-don-t-overflow-CirrusVGAState-cirrus_bltbuf.patch [bz#1421564]
- kvm-cirrus_vga-fix-off-by-one-in-blit_region_is_unsafe.patch [bz#1421564]
- kvm-display-cirrus-check-vga-bits-per-pixel-bpp-value.patch [bz#1421564]
- kvm-display-cirrus-ignore-source-pitch-value-as-needed-i.patch [bz#1421564]
- kvm-cirrus-handle-negative-pitch-in-cirrus_invalidate_re.patch [bz#1421564]
- kvm-cirrus-allow-zero-source-pitch-in-pattern-fill-rops.patch [bz#1421564]
- kvm-cirrus-fix-blit-address-mask-handling.patch [bz#1421564]
- kvm-cirrus-fix-oob-access-issue-CVE-2017-2615.patch [bz#1421564]
- kvm-cirrus-fix-patterncopy-checks.patch [bz#1421564]
- kvm-Revert-cirrus-allow-zero-source-pitch-in-pattern-fil.patch [bz#1421564]
- kvm-cirrus-add-blit_is_unsafe-call-to-cirrus_bitblt_cput.patch [bz#1421564]
- Resolves: bz#1421564
(CVE-2017-2615 kvm: Qemu: display: cirrus: oob access while doing bitblt copy backward mode [rhel-5.11.z])


Related CVEs


CVE-2017-2615
CVE-2017-2620

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 5 (x86_64) kvm-83-277.0.1.el5_11.src.rpm8c41d0a88deb8bfbe3532e24a93e4580bed4aafe016525d25c29529279d9a3b6-ol5_u11_x86_64_patch
kvm-83-277.0.1.el5_11.src.rpm8c41d0a88deb8bfbe3532e24a93e4580bed4aafe016525d25c29529279d9a3b6-ol5_x86_64_latest
kmod-kvm-83-277.0.1.el5_11.x86_64.rpm7e78a09304878da470681dbf9fc605017e571268aa6537b1fc34203fb3a203dd-ol5_u11_x86_64_patch
kmod-kvm-83-277.0.1.el5_11.x86_64.rpm7e78a09304878da470681dbf9fc605017e571268aa6537b1fc34203fb3a203dd-ol5_x86_64_latest
kmod-kvm-debug-83-277.0.1.el5_11.x86_64.rpm76a43ddc908de169df0bc8fc76aa92f836e54ef8025b31d832da35b71c0574f3-ol5_u11_x86_64_patch
kmod-kvm-debug-83-277.0.1.el5_11.x86_64.rpm76a43ddc908de169df0bc8fc76aa92f836e54ef8025b31d832da35b71c0574f3-ol5_x86_64_latest
kvm-83-277.0.1.el5_11.x86_64.rpm3315eb6c1d951fb98757b94da44665c2a1e03b80e4fb4af96796b6f111043546-ol5_u11_x86_64_patch
kvm-83-277.0.1.el5_11.x86_64.rpm3315eb6c1d951fb98757b94da44665c2a1e03b80e4fb4af96796b6f111043546-ol5_x86_64_latest
kvm-qemu-img-83-277.0.1.el5_11.x86_64.rpm2c94a02a073ffa8ba8be8652379803ecc3c44b83171b6d1caa78a7670366332f-ol5_u11_x86_64_patch
kvm-qemu-img-83-277.0.1.el5_11.x86_64.rpm2c94a02a073ffa8ba8be8652379803ecc3c44b83171b6d1caa78a7670366332f-ol5_x86_64_latest
kvm-tools-83-277.0.1.el5_11.x86_64.rpma97154bea985200aa0ca6b588773b08983faf51243ab39bd4c3ebc835a768ad5-ol5_u11_x86_64_patch
kvm-tools-83-277.0.1.el5_11.x86_64.rpma97154bea985200aa0ca6b588773b08983faf51243ab39bd4c3ebc835a768ad5-ol5_x86_64_latest



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete