ELSA-2017-1681

ELSA-2017-1681 - qemu-kvm security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2017-07-05

Description


[1.5.3-126.el7_3.10]
- kvm-nbd-Fully-initialize-client-in-case-of-failed-negoti.patch [bz#1460179]
- kvm-nbd-Fix-regression-on-resiliency-to-port-scan.patch [bz#1460179]
- Resolves: bz#1460179
(CVE-2017-9524 qemu-kvm: Qemu: nbd: segmentation fault due to client non-negotiation [rhel-7.3.z])


Related CVEs


CVE-2017-9524

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 7 (x86_64) qemu-kvm-1.5.3-126.el7_3.10.src.rpm3edd52385084a1db472365f5f4a0b1a33f9fc18195a46489a7aa92e84b0cbb39ELBA-2024-12732ol7_x86_64_latest_archive
qemu-kvm-1.5.3-126.el7_3.10.src.rpm3edd52385084a1db472365f5f4a0b1a33f9fc18195a46489a7aa92e84b0cbb39ELBA-2024-12732ol7_x86_64_u3_patch
qemu-img-1.5.3-126.el7_3.10.x86_64.rpm7fc8af084a5b477fbefcc42f9c73b9662ffd086d502702198f13c3233a33ffc6ELBA-2024-12732ol7_x86_64_latest_archive
qemu-img-1.5.3-126.el7_3.10.x86_64.rpm7fc8af084a5b477fbefcc42f9c73b9662ffd086d502702198f13c3233a33ffc6ELBA-2024-12732ol7_x86_64_u3_patch
qemu-kvm-1.5.3-126.el7_3.10.x86_64.rpm0e038ec819ce0ce47b66bd69548a0fddbbaf1769ed5465fb189779262c10530fELBA-2024-12732ol7_x86_64_latest_archive
qemu-kvm-1.5.3-126.el7_3.10.x86_64.rpm0e038ec819ce0ce47b66bd69548a0fddbbaf1769ed5465fb189779262c10530fELBA-2024-12732ol7_x86_64_u3_patch
qemu-kvm-common-1.5.3-126.el7_3.10.x86_64.rpma6965940e73e4d2a3db4cbfa47496c64d828cb74a2a285f003b8eb6afd32dc74ELBA-2022-4639ol7_x86_64_latest_archive
qemu-kvm-common-1.5.3-126.el7_3.10.x86_64.rpma6965940e73e4d2a3db4cbfa47496c64d828cb74a2a285f003b8eb6afd32dc74ELBA-2022-4639ol7_x86_64_u3_patch
qemu-kvm-tools-1.5.3-126.el7_3.10.x86_64.rpm5609fe4d8137decf0279c8713a2d677f03a81e57ecd7ad6b058895e4423e85f4ELBA-2022-4639ol7_x86_64_latest_archive
qemu-kvm-tools-1.5.3-126.el7_3.10.x86_64.rpm5609fe4d8137decf0279c8713a2d677f03a81e57ecd7ad6b058895e4423e85f4ELBA-2022-4639ol7_x86_64_u3_patch



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete