ELSA-2019-2607

ELSA-2019-2607 - qemu-kvm security update

Type:SECURITY
Impact:LOW
Release Date:2019-09-04

Description


[1.5.3-167.el7_7.1]
- kvm-qxl-check-release-info-object.patch [bz#1732337]
- kvm-Fix-heap-overflow-in-ip_reass-on-big-packet-input.patch [bz#1734748]
- Resolves: bz#1732337
(CVE-2019-12155 qemu-kvm: QEMU: qxl: null pointer dereference while releasing spice resources [rhel-7] [rhel-7.7.z])
- Resolves: bz#1734748
(CVE-2019-14378 qemu-kvm: QEMU: slirp: heap buffer overflow during packet reassembly [rhel-7.7.z])


Related CVEs


CVE-2019-12155

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 7 (x86_64) qemu-kvm-1.5.3-167.el7_7.1.src.rpm68a23cf4036ad8aeae08984518e54e219d3db303207a5537a2e76b4fdc341755ELBA-2024-12732ol7_x86_64_latest
qemu-kvm-1.5.3-167.el7_7.1.src.rpm68a23cf4036ad8aeae08984518e54e219d3db303207a5537a2e76b4fdc341755ELBA-2024-12732ol7_x86_64_u7_patch
qemu-img-1.5.3-167.el7_7.1.x86_64.rpmb5462c0b2fbbb10bccf7ffd320891247465a1e86c5eed34e304bfcdad02e47c1ELBA-2024-12732ol7_x86_64_latest
qemu-img-1.5.3-167.el7_7.1.x86_64.rpmb5462c0b2fbbb10bccf7ffd320891247465a1e86c5eed34e304bfcdad02e47c1ELBA-2024-12732ol7_x86_64_u7_patch
qemu-kvm-1.5.3-167.el7_7.1.x86_64.rpm06a5dbcdb4e23297b4039fff6d00b560d1bc57a4c7b761fbf49ccc3f53867297ELBA-2024-12732ol7_x86_64_latest
qemu-kvm-1.5.3-167.el7_7.1.x86_64.rpm06a5dbcdb4e23297b4039fff6d00b560d1bc57a4c7b761fbf49ccc3f53867297ELBA-2024-12732ol7_x86_64_u7_patch
qemu-kvm-common-1.5.3-167.el7_7.1.x86_64.rpmb2028cd4c8a548338f92ab8d1fa54b2a31281c95276edb4392fcf4626c4c347aELBA-2022-4639ol7_x86_64_latest
qemu-kvm-common-1.5.3-167.el7_7.1.x86_64.rpmb2028cd4c8a548338f92ab8d1fa54b2a31281c95276edb4392fcf4626c4c347aELBA-2022-4639ol7_x86_64_u7_patch
qemu-kvm-tools-1.5.3-167.el7_7.1.x86_64.rpm91e8aa0e1c663550f4bae2e58fe77776676dce6a4c444860608092eef789ea4fELBA-2022-4639ol7_x86_64_latest
qemu-kvm-tools-1.5.3-167.el7_7.1.x86_64.rpm91e8aa0e1c663550f4bae2e58fe77776676dce6a4c444860608092eef789ea4fELBA-2022-4639ol7_x86_64_u7_patch



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete