OVMSA-2016-0051

OVMSA-2016-0051 - qemu-kvm security update

Type:SECURITY
Severity:IMPORTANT
Release Date:2016-05-23

Description


[0.12.1.2-2.491.el6_8.1]
- kvm-Add-vga.h-unmodified-from-Linux.patch [bz#1331407]
- kvm-vga.h-remove-unused-stuff-and-reformat.patch [bz#1331407]
- kvm-vga-use-constants-from-vga.h.patch [bz#1331407]
- kvm-vga-Remove-some-should-be-done-in-BIOS-comments.patch [bz#1331407]
- kvm-vga-fix-banked-access-bounds-checking-CVE-2016-3710.patch [bz#1331407]
- kvm-vga-add-vbe_enabled-helper.patch [bz#1331407]
- kvm-vga-factor-out-vga-register-setup.patch [bz#1331407]
- kvm-vga-update-vga-register-setup-on-vbe-changes.patch [bz#1331407]
- kvm-vga-make-sure-vga-register-setup-for-vbe-stays-intac.patch [bz#1331407]
- Resolves: bz#1331407
(EMBARGOED CVE-2016-3710 qemu-kvm: qemu: incorrect banked access bounds checking in vga module [rhel-6.8.z])

[0.12.1.2-2.491.el6]
- Revert 'warning when CPU threads>1 for non-Intel CPUs' fix

[0.12.1.2-2.490.el6]
- kvm-qemu-ga-implement-win32-guest-set-user-password.patch [bz#1174181]
- kvm-util-add-base64-decoding-function.patch [bz#1174181]
- kvm-qga-convert-to-use-error-checked-base64-decode.patch [bz#1174181]
- kvm-qga-use-more-idiomatic-qemu-style-eol-operators.patch [bz#1174181]
- kvm-qga-use-size_t-for-wcslen-return-value.patch [bz#1174181]
- kvm-qga-use-wide-chars-constants-for-wchar_t-comparisons.patch [bz#1174181]
- kvm-qga-fix-off-by-one-length-check.patch [bz#1174181]
- kvm-qga-check-utf8-to-utf16-conversion.patch [bz#1174181]
- Resolves: bz#1174181
(RFE: provide QEMU guest agent command for setting root account password (Linux guest))

[0.12.1.2-2.489.el6]
- kvm-hw-qxl-qxl_send_events-nop-if-stopped.patch [bz#1290743]
- kvm-block-mirror-fix-full-sync-mode-when-target-does-not.patch [bz#971312]
- Resolves: bz#1290743
(qemu-kvm core dumped when repeat system_reset 20 times during guest boot)
- Resolves: bz#971312
(block: Mirroring to raw block device doesn't zero out unused blocks)

* Mon Feb 08 2016 Miroslav Rezanina - Fixed qemu-ga path configuration [bz#1213233]
- Resolves: bz#1213233
([virtagent] The default path '/etc/qemu/fsfreeze-hook' for 'fsfreeze-hook' script doesn't exist)

[0.12.1.2-2.487.el6]
- kvm-virtio-scsi-use-virtqueue_map_sg-when-loading-reques.patch [bz#1249740]
- kvm-scsi-disk-fix-cmd.mode-field-typo.patch [bz#1249740]
- Resolves: bz#1249740
(Segfault occurred at Dst VM while completed migration upon ENOSPC)

[0.12.1.2-2.486.el6]
- kvm-blockdev-Error-out-on-negative-throttling-option-val.patch [bz#1294619]
- kvm-fw_cfg-add-check-to-validate-current-entry-value-CVE.patch [bz#1298046]
- Resolves: bz#1294619
(Guest should failed to boot if set iops,bps to negative number)
- Resolves: bz#1298046
(CVE-2016-1714 qemu-kvm: Qemu: nvram: OOB r/w access in processing firmware configurations [rhel-6.8])

[0.12.1.2-2.485.el6]
- kvm-Change-fsfreeze-hook-default-location.patch [bz#1213233]
- kvm-qxl-replace-pipe-signaling-with-bottom-half.patch [bz#1290743]
- Resolves: bz#1213233
([virtagent] The default path '/etc/qemu/fsfreeze-hook' for 'fsfreeze-hook' script doesn't exist)
- Resolves: bz#1290743
(qemu-kvm core dumped when repeat system_reset 20 times during guest boot)

[0.12.1.2-2.484.el6]
- kvm-qga-flush-explicitly-when-needed.patch [bz#1210246]
- kvm-qga-add-guest-set-user-password-command.patch [bz#1174181]
- kvm-qcow2-Zero-initialise-first-cluster-for-new-images.patch [bz#1223216]
- kvm-Documentation-Warn-against-qemu-img-on-active-image.patch [bz#1297424]
- kvm-target-i386-warns-users-when-CPU-threads-1-for-non-I.patch [bz#1292678]
- kvm-qemu-options-Fix-texinfo-markup.patch [bz#1250442]
- kvm-qga-Fix-memory-allocation-pasto.patch []
- kvm-block-raw-posix-Open-file-descriptor-O_RDWR-to-work-.patch [bz#1268347]
- Resolves: bz#1174181
(RFE: provide QEMU guest agent command for setting root/administrator account password)
- Resolves: bz#1210246
([virtagent]The 'write' content is lost if 'read' it before flush through guest agent)
- Resolves: bz#1223216
(qemu-img can not create qcow2 image when backend is block device)
- Resolves: bz#1250442
(qemu-doc.html bad markup in section 3.3 Invocation)
- Resolves: bz#1268347
(posix_fallocate emulation on NFS fails with Bad file descriptor if fd is opened O_WRONLY)
- Resolves: bz#1292678
(Qemu should report error when cmdline set threads=2 in amd host)
- Resolves: bz#1297424
(Add warning about running qemu-img on active VMs to its manpage)

[0.12.1.2-2.483.el6]
- kvm-rtl8139-Fix-receive-buffer-overflow-check.patch [bz#1262866]
- kvm-rtl8139-Do-not-consume-the-packet-during-overflow-in.patch [bz#1262866]
- Resolves: bz#1262866
([RHEL6] Package is 100% lost when ping from host to Win2012r2 guest with 64000 size)

[0.12.1.2-2.482.el6]
- kvm-qemu-kvm-get-put-MSR_TSC_AUX-across-reset-and-migrat.patch [bz#1265428]
- kvm-qcow2-Discard-VM-state-in-active-L1-after-creating-s.patch [bz#1219908]
- kvm-net-pcnet-add-check-to-validate-receive-data-size-CV.patch [bz#1286597]
- kvm-pcnet-fix-rx-buffer-overflow-CVE-2015-7512.patch [bz#1286567]
- Resolves: bz#1219908
(Writing snapshots with 'virsh snapshot-create-as' command slows as more snapshots are created)
- Resolves: bz#1265428
(contents of MSR_TSC_AUX are not migrated)
- Resolves: bz#1286567
(CVE-2015-7512 qemu-kvm: Qemu: net: pcnet: buffer overflow in non-loopback mode [rhel-6.8])

[0.12.1.2-2.481.el6]
- kvm-net-add-checks-to-validate-ring-buffer-pointers-CVE-.patch [bz#1263275]
- Resolves: bz#1263275
(CVE-2015-5279 qemu-kvm: qemu: Heap overflow vulnerability in ne2000_receive() function [rhel-6.8])

[0.12.1.2-2.480.el6]
- kvm-virtio-rng-fix-segfault-when-adding-a-virtio-pci-rng.patch [bz#1230068]
- kvm-qga-commands-posix-Fix-bug-in-guest-fstrim.patch [bz#1213236]
- kvm-rtl8139-avoid-nested-ifs-in-IP-header-parsing-CVE-20.patch [bz#1248763]
- kvm-rtl8139-drop-tautologous-if-ip-.-statement-CVE-2015-.patch [bz#1248763]
- kvm-rtl8139-skip-offload-on-short-Ethernet-IP-header-CVE.patch [bz#1248763]
- kvm-rtl8139-check-IP-Header-Length-field-CVE-2015-5165.patch [bz#1248763]
- kvm-rtl8139-check-IP-Total-Length-field-CVE-2015-5165.patch [bz#1248763]
- kvm-rtl8139-skip-offload-on-short-TCP-header-CVE-2015-51.patch [bz#1248763]
- kvm-rtl8139-check-TCP-Data-Offset-field-CVE-2015-5165.patch [bz#1248763]
- Resolves: bz#1213236
([virtagent] 'guest-fstrim' failed for guest with os on spapr-vscsi disk)
- Resolves: bz#1230068
(Segmentation fault when re-adding virtio-rng-pci device)
- Resolves: bz#1248763
(CVE-2015-5165 qemu-kvm: Qemu: rtl8139 uninitialized heap memory information leakage to guest [rhel-6.8])


Related CVEs


CVE-2016-3710

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle VM 3.4 (x86_64) qemu-kvm-0.12.1.2-2.491.el6_8.1.src.rpmb3c800298301157b49429c764f5bc4a9OVMSA-2020-0043
qemu-img-0.12.1.2-2.491.el6_8.1.x86_64.rpmd192a8d064b00ccc00f62b3a1ef3fd6aOVMSA-2020-0043



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete