OVMSA-2020-0010 - qemu-kvm security update
Type: | SECURITY |
Severity: | IMPORTANT |
Release Date: | 2020-03-12 |
Description
[0.12.1.2-2.506.el6_10.6]
- kvm-Fix-heap-overflow-in-ip_reass-on-big-packet-input.patch [bz#1734747]
- kvm-Using-ip_deq-after-m_free-might-read-pointers-from-a.patch [bz#1749731]
- kvm-tcp_emu-Fix-oob-access.patch [bz#1791558]
- kvm-slirp-use-correct-size-while-emulating-IRC-commands.patch [bz#1791558]
- kvm-slirp-use-correct-size-while-emulating-commands.patch [bz#1791558]
- Resolves: bz#1734747
(CVE-2019-14378 qemu-kvm: QEMU: slirp: heap buffer overflow during packet reassembly [rhel-6.10.z])
- Resolves: bz#1749731
(CVE-2019-15890 qemu-kvm: QEMU: Slirp: use-after-free during packet reassembly [rhel-6])
- Resolves: bz#1791558
(CVE-2020-7039 qemu-kvm: QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu() [rhel-6.10.z])
Related CVEs
Updated Packages
Release/Architecture | Filename | MD5sum | Superseded By Advisory |
|
Oracle VM 3.4 (x86_64) | qemu-kvm-0.12.1.2-2.506.el6_10.6.src.rpm | 3a9acc7d437e6eb21d7bccce883c0cc4 | OVMSA-2020-0043 |
| qemu-img-0.12.1.2-2.506.el6_10.6.x86_64.rpm | a6906aa9eb100ba7ace8aa41115c0e07 | OVMSA-2020-0043 |
This page is generated automatically and has not been checked for errors or omissions. For clarification
or corrections please contact the Oracle Linux ULN team