ELSA-2019-1883

ELSA-2019-1883 - qemu-kvm security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2019-07-30

Description


[1.5.3-160.el7_6.3]
- kvm-slirp-check-sscanf-result-when-emulating-ident.patch [bz#1669067]
- kvm-slirp-fix-big-little-endian-conversion-in-ident-prot.patch [bz#1669067]
- kvm-slirp-ensure-there-is-enough-space-in-mbuf-to-null-t.patch [bz#1669067]
- kvm-slirp-don-t-manipulate-so_rcv-in-tcp_emu.patch [bz#1669067]
- Resolves: bz#1669067
(CVE-2019-6778 qemu-kvm: QEMU: slirp: heap buffer overflow in tcp_emu() [rhel-7.6.z])


Related CVEs


CVE-2019-6778

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 7 (x86_64) qemu-kvm-1.5.3-160.el7_6.3.src.rpmb9e95339c185e9f995aa267f2fda083c6ce8f301a05f5762a6dca1d5d72d9b99ELBA-2024-12732ol7_x86_64_latest
qemu-kvm-1.5.3-160.el7_6.3.src.rpmb9e95339c185e9f995aa267f2fda083c6ce8f301a05f5762a6dca1d5d72d9b99ELBA-2024-12732ol7_x86_64_u6_patch
qemu-img-1.5.3-160.el7_6.3.x86_64.rpm3e8ff13c1fe84de3c0f0af487fc624f309ad82cd95b5979952452c2af8c1de66ELBA-2024-12732ol7_x86_64_latest
qemu-img-1.5.3-160.el7_6.3.x86_64.rpm3e8ff13c1fe84de3c0f0af487fc624f309ad82cd95b5979952452c2af8c1de66ELBA-2024-12732ol7_x86_64_u6_patch
qemu-kvm-1.5.3-160.el7_6.3.x86_64.rpm9ad4ae8d14bd9018e5ee7cecc7933a042f41888b3feda9b7eacee437435648d4ELBA-2024-12732ol7_x86_64_latest
qemu-kvm-1.5.3-160.el7_6.3.x86_64.rpm9ad4ae8d14bd9018e5ee7cecc7933a042f41888b3feda9b7eacee437435648d4ELBA-2024-12732ol7_x86_64_u6_patch
qemu-kvm-common-1.5.3-160.el7_6.3.x86_64.rpm963d22cd00256f21d8d3dc9f5d0f2cecaf6a8c54a48b2ef50bbea04aeccafe46ELBA-2022-4639ol7_x86_64_latest
qemu-kvm-common-1.5.3-160.el7_6.3.x86_64.rpm963d22cd00256f21d8d3dc9f5d0f2cecaf6a8c54a48b2ef50bbea04aeccafe46ELBA-2022-4639ol7_x86_64_u6_patch
qemu-kvm-tools-1.5.3-160.el7_6.3.x86_64.rpm78ff45a87a6e03009bf6fa0148f45ec5671c1f3bf804d076634da1cd33d85741ELBA-2022-4639ol7_x86_64_latest
qemu-kvm-tools-1.5.3-160.el7_6.3.x86_64.rpm78ff45a87a6e03009bf6fa0148f45ec5671c1f3bf804d076634da1cd33d85741ELBA-2022-4639ol7_x86_64_u6_patch



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete