Type: | SECURITY |
Impact: | LOW |
Release Date: | 2019-08-13 |
[1.5.3-167.el7]
- Reverting kvm-seccomp-set-the-seccomp-filter-to-all-threads.patch [bz#1618503]
- Resolves: bz#1618503
(qemu-kvm: Qemu: seccomp: blacklist is not applied to all threads [rhel-7])
[1.5.3-166.el7]
- kvm-seccomp-set-the-seccomp-filter-to-all-threads.patch [bz#1618503]
- Resolves: bz#1618503
(qemu-kvm: Qemu: seccomp: blacklist is not applied to all threads [rhel-7])
[1.5.3-165.el7]
- kvm-Fix-eax-for-cpuid-leaf-0x40000000.patch [bz#1709495]
- kvm-slirp-fix-big-little-endian-conversion-in-ident-prot.patch [bz#1669068]
- kvm-slirp-ensure-there-is-enough-space-in-mbuf-to-null-t.patch [bz#1669068]
- kvm-slirp-don-t-manipulate-so_rcv-in-tcp_emu.patch [bz#1669068]
- Resolves: bz#1669068
(CVE-2019-6778 qemu-kvm: QEMU: slirp: heap buffer overflow in tcp_emu() [rhel-7.7])
- Resolves: bz#1709495
(Change CPUID[0x40000000].EAX from 0 to KVM_CPUID_FE...ATURES (0x40000001))
[1.5.3-164.el7]
- kvm-target-i386-define-md-clear-bit-rhel.patch [bz#1693217]
- Resolves: bz#1693217
(CVE-2018-12126 qemu-kvm: hardware: Microarchitectural Store Buffer Data Sampling [rhel-7.7] )
[1.5.3-163.el7]
- kvm-x86-cpu-Enable-CLDEMOTE-Demote-Cache-Line-cpu-featur.patch [bz#1537773]
- kvm-vfio-pci-Lazy-PBA-emulation.patch [bz#1459077]
- kvm-slirp-check-sscanf-result-when-emulating-ident.patch [bz#1689791]
- Resolves: bz#1459077
([Intel 7.7 Bug] QEMU version in RHEL7.4 beta does not support KVM passthrough with WFR card)
- Resolves: bz#1537773
([Intel 7.7 Feat] KVM Enabling SnowRidge new NIs - qemu-kvm)
- Resolves: bz#1689791
(CVE-2019-9824 qemu-kvm: QEMU: Slirp: information leakage in tcp_emu() due to uninitialized stack variables [rhel-7])
[1.5.3-162.el7]
- kvm-i386-Deprecate-arch-facilities-and-make-it-block-liv.patch [bz#1658407]
- kvm-Do-not-build-bluetooth-support.patch [bz#1654627]
- Resolves: bz#1654627
(Qemu: hw: bt: keep bt/* objects from building [rhel-7.7])
- Resolves: bz#1658407
(mode='host-model' VMs include broken 'arch-facilities' flag name [qemu-kvm])
[1.5.3-161.el7]
- kvm-Inhibit-ballooning-during-postcopy.patch [bz#1659229]
- kvm-balloon-Allow-multiple-inhibit-users.patch [bz#1659229]
- kvm-check-KVM_CAP_SYNC_MMU-with-kvm_vm_check_extensi.patch [bz#1659229]
- kvm-Use-inhibit-to-prevent-ballooning-without-synchr.patch [bz#1659229]
- kvm-vfio-Inhibit-ballooning-based-on-group-attachment-to.patch [bz#1659229]
- Resolves: bz#1659229
(Ballooning is incompatible with vfio assigned devices, but not prevented)
CVE-2019-9824 |
Release/Architecture | Filename | sha256 | Superseded By Advisory | Channel Label |
Oracle Linux 7 (x86_64) | qemu-kvm-1.5.3-167.el7.src.rpm | 19c2baa2b0a3f87972eb9266a6f115990332a3923651e2a3c24093b5d900313b | ELBA-2024-12732 | ol7_x86_64_latest |
qemu-kvm-1.5.3-167.el7.src.rpm | 19c2baa2b0a3f87972eb9266a6f115990332a3923651e2a3c24093b5d900313b | ELBA-2024-12732 | ol7_x86_64_u7_base | |
qemu-img-1.5.3-167.el7.x86_64.rpm | 3b53e3970085f3a8fa71e4a38e3cfd08140f5508e7632565b6ab75b3790b99c4 | ELBA-2024-12732 | ol7_x86_64_latest | |
qemu-img-1.5.3-167.el7.x86_64.rpm | 3b53e3970085f3a8fa71e4a38e3cfd08140f5508e7632565b6ab75b3790b99c4 | ELBA-2024-12732 | ol7_x86_64_u7_base | |
qemu-kvm-1.5.3-167.el7.x86_64.rpm | 1413e96c7cd0467e774c76e2a0a8a739d21488e524c7ac7992c81de4a32291b9 | ELBA-2024-12732 | ol7_x86_64_latest | |
qemu-kvm-1.5.3-167.el7.x86_64.rpm | 1413e96c7cd0467e774c76e2a0a8a739d21488e524c7ac7992c81de4a32291b9 | ELBA-2024-12732 | ol7_x86_64_u7_base | |
qemu-kvm-common-1.5.3-167.el7.x86_64.rpm | 72531398bf8b2cdc67de9c39d88f906b64c6d2330ee2b4184b7d420f25479c3f | ELBA-2022-4639 | ol7_x86_64_latest | |
qemu-kvm-common-1.5.3-167.el7.x86_64.rpm | 72531398bf8b2cdc67de9c39d88f906b64c6d2330ee2b4184b7d420f25479c3f | ELBA-2022-4639 | ol7_x86_64_u7_base | |
qemu-kvm-tools-1.5.3-167.el7.x86_64.rpm | a6a12ca519a8f3b30780e7908440acaf10f23e76d8815a05cc4f1d1ebf0ff736 | ELBA-2022-4639 | ol7_x86_64_latest | |
qemu-kvm-tools-1.5.3-167.el7.x86_64.rpm | a6a12ca519a8f3b30780e7908440acaf10f23e76d8815a05cc4f1d1ebf0ff736 | ELBA-2022-4639 | ol7_x86_64_u7_base |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team