Type: | SECURITY |
Impact: | IMPORTANT |
Release Date: | 2018-07-10 |
[0.12.1.2-2.506.el6_10.1]
- qemu-kvm-i386-define-the-ssbd-CPUID-feature-bit-CVE-2018-3639.patch [bz#1574074]
- qemu-kvm-i386-Define-the-Virt-SSBD-MSR-and-handling-of-it-CVE.patch [bz#1574074]
- qemu-kvm-i386-define-the-AMD-virt-ssbd-CPUID-feature-bit-CVE-.patch [bz#1574074]
- Resolves: bz#1574074
(CVE-2018-3639 qemu-kvm: hw: cpu: speculative store bypass [rhel-6.10.z])
[0.12.1.2-2.506.el6]
- kvm-vga-add-share_surface-flag.patch [bz#1553674]
- kvm-vga-add-sanity-checks.patch [bz#1553674]
- Resolves: bz#1553674
(CVE-2018-7858 qemu-kvm: Qemu: cirrus: OOB access when updating vga display [rhel-6])
[0.12.1.2-2.505.el6]
- kvm-target-i386-add-support-for-SPEC_CTRL-MSR.patch [bz#1525939 bz#1528024]
- kvm-target-i386-cpu-add-new-CPUID-bits-for-indirect-bran.patch [bz#1525939 bz#1528024]
- kvm-target-i386-cpu-add-new-CPU-models-for-indirect-bran.patch [bz#1525939 bz#1528024]
- kvm-cirrus-fix-oob-access-in-mode4and5-write-functions.patch [bz#1501298]
- kvm-vga-stop-passing-pointers-to-vga_draw_line-functions.patch [bz#1486641]
- kvm-vga-check-the-validation-of-memory-addr-when-draw-te.patch [bz#1534692]
- Resolves: bz#1486641
(CVE-2017-13672 qemu-kvm-rhev: Qemu: vga: OOB read access during display update [rhel-6.10])
- Resolves: bz#1501298
(CVE-2017-15289 qemu-kvm: Qemu: cirrus: OOB access issue in mode4and5 write functions [rhel-6.10])
- Resolves: bz#1525939
(CVE-2017-5715 qemu-kvm: hw: cpu: speculative execution branch target injection [rhel-6.10])
- Resolves: bz#1528024
(CVE-2017-5715 qemu-kvm-rhev: hw: cpu: speculative execution branch target injection [rhel-6.10])
- Resolves: bz#1534692
(CVE-2018-5683 qemu-kvm: Qemu: Out-of-bounds read in vga_draw_text routine [rhel-6.10])
- Resolves: bz#1549152
(qemu-kvm-rhev: remove unused patch file [rhel-6.10])
[0.12.1.2-2.504.el6]
- kvm-vnc-apply-display-size-limits.patch [bz#1430616 bz#1430617]
- kvm-fix-cirrus_vga-fix-OOB-read-case-qemu-Segmentation-f.patch [bz#1443448 bz#1443450]
- kvm-cirrus-vnc-zap-bitblit-support-from-console-code.patch [bz#1443448 bz#1443450 bz#1447542 bz#1447545]
- kvm-cirrus-avoid-write-only-variables.patch [bz#1444378 bz#1444380]
- kvm-cirrus-stop-passing-around-dst-pointers-in-the-blitt.patch [bz#1444378 bz#1444380]
- kvm-cirrus-stop-passing-around-src-pointers-in-the-blitt.patch [bz#1444378 bz#1444380]
- kvm-cirrus-fix-off-by-one-in-cirrus_bitblt_rop_bkwd_tran.patch [bz#1444378 bz#1444380]
- kvm-cirrus-fix-PUTPIXEL-macro.patch [bz#1444378 bz#1444380]
- Resolves: bz#1430616
(CVE-2017-2633 qemu-kvm: Qemu: VNC: memory corruption due to unchecked resolution limit [rhel-6.10])
- Resolves: bz#1430617
(CVE-2017-2633 qemu-kvm-rhev: Qemu: VNC: memory corruption due to unchecked resolution limit [rhel-6.10])
- Resolves: bz#1443448
(CVE-2017-7718 qemu-kvm: Qemu: display: cirrus: OOB read access issue [rhel-6.10])
- Resolves: bz#1443450
(CVE-2017-7718 qemu-kvm-rhev: Qemu: display: cirrus: OOB read access issue [rhel-6.10])
- Resolves: bz#1444378
(CVE-2017-7980 qemu-kvm: Qemu: display: cirrus: OOB r/w access issues in bitblt routines [rhel-6.10])
- Resolves: bz#1444380
(CVE-2017-7980 qemu-kvm-rhev: Qemu: display: cirrus: OOB r/w access issues in bitblt routines [rhel-6.10])
- Resolves: bz#1447542
(CVE-2016-9603 qemu-kvm: Qemu: cirrus: heap buffer overflow via vnc connection [rhel-6.10])
- Resolves: bz#1447545
(CVE-2016-9603 qemu-kvm-rhev: Qemu: cirrus: heap buffer overflow via vnc connection [rhel-6.10])
CVE-2018-7858 |
CVE-2017-13672 |
CVE-2018-3639 |
CVE-2018-5683 |
Release/Architecture | Filename | sha256 | Superseded By Advisory | Channel Label |
Oracle Linux 6 (i386) | qemu-kvm-0.12.1.2-2.506.el6_10.1.src.rpm | 10eefc2e906662e133dfba492625b287c3453ca6a7c1f2fcb32597efc56eed2c | ELSA-2020-4056 | ol6_i386_latest |
qemu-kvm-0.12.1.2-2.506.el6_10.1.src.rpm | 10eefc2e906662e133dfba492625b287c3453ca6a7c1f2fcb32597efc56eed2c | ELSA-2020-4056 | ol6_u10_i386_patch | |
qemu-guest-agent-0.12.1.2-2.506.el6_10.1.i686.rpm | 8f1baf5ed77a7e82a5107064d44eddd9d9dee26e1fc74dbb0c0fb146e0729d5c | ELSA-2020-4056 | ol6_i386_latest | |
qemu-guest-agent-0.12.1.2-2.506.el6_10.1.i686.rpm | 8f1baf5ed77a7e82a5107064d44eddd9d9dee26e1fc74dbb0c0fb146e0729d5c | ELSA-2020-4056 | ol6_u10_i386_patch | |
Oracle Linux 6 (x86_64) | qemu-kvm-0.12.1.2-2.506.el6_10.1.src.rpm | 10eefc2e906662e133dfba492625b287c3453ca6a7c1f2fcb32597efc56eed2c | ELSA-2020-4056 | ol6_u10_x86_64_patch |
qemu-kvm-0.12.1.2-2.506.el6_10.1.src.rpm | 10eefc2e906662e133dfba492625b287c3453ca6a7c1f2fcb32597efc56eed2c | ELSA-2020-4056 | ol6_x86_64_latest | |
qemu-guest-agent-0.12.1.2-2.506.el6_10.1.x86_64.rpm | 4ae245a48d9f84523f3f9f7bb8949be9b114eb08527f04d6e5507dd3d98b87ce | ELSA-2020-4056 | ol6_u10_x86_64_patch | |
qemu-guest-agent-0.12.1.2-2.506.el6_10.1.x86_64.rpm | 4ae245a48d9f84523f3f9f7bb8949be9b114eb08527f04d6e5507dd3d98b87ce | ELSA-2020-4056 | ol6_x86_64_latest | |
qemu-img-0.12.1.2-2.506.el6_10.1.x86_64.rpm | 87a97a18a2a339a6cbd11d1c342c29dc5773561500046694a038eb1016f561fd | ELSA-2020-4056 | ol6_u10_x86_64_patch | |
qemu-img-0.12.1.2-2.506.el6_10.1.x86_64.rpm | 87a97a18a2a339a6cbd11d1c342c29dc5773561500046694a038eb1016f561fd | ELSA-2020-4056 | ol6_x86_64_latest | |
qemu-kvm-0.12.1.2-2.506.el6_10.1.x86_64.rpm | f515b3d1221756c44c6cd0c2902bf5ed7003eb838e64eea35e31959a75232102 | ELSA-2020-4056 | ol6_u10_x86_64_patch | |
qemu-kvm-0.12.1.2-2.506.el6_10.1.x86_64.rpm | f515b3d1221756c44c6cd0c2902bf5ed7003eb838e64eea35e31959a75232102 | ELSA-2020-4056 | ol6_x86_64_latest | |
qemu-kvm-tools-0.12.1.2-2.506.el6_10.1.x86_64.rpm | b51df1e5c91e69350b860903e3ffaba148916fa6f9b8d1c32e2fc94433452277 | ELSA-2020-4056 | ol6_u10_x86_64_patch | |
qemu-kvm-tools-0.12.1.2-2.506.el6_10.1.x86_64.rpm | b51df1e5c91e69350b860903e3ffaba148916fa6f9b8d1c32e2fc94433452277 | ELSA-2020-4056 | ol6_x86_64_latest |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team